Resubmissions

29/09/2021, 10:05 UTC

210929-l4j75aefbp 10

General

  • Target

    baabe38154bc2271d603513346457154.exe

  • Size

    1.1MB

  • Sample

    210929-l4j75aefbp

  • MD5

    baabe38154bc2271d603513346457154

  • SHA1

    86ebdcd4ba7e7985c80f3897d5adba2d2c923d52

  • SHA256

    0c1978c1bc51c425f13e670074ddfd36d3e6e458dab5bcb1527c2b37953e13d6

  • SHA512

    149c353564df264c5d7f32f072fdcdc91e0c0ee12fe0508968003a887412fa9d47204abadc9d8c61cb955bdc1e3335db8f6f334a7838f62f95d3f28d8d576502

Malware Config

Extracted

Family

danabot

Version

2052

Botnet

4

C2

142.11.192.232:443

192.119.110.73:443

142.11.242.31:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

rsa_privkey.plain
1
-----BEGIN PRIVATE KEY-----
2
MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAK7NhBHmf3G58ne6
3
VqOLX8rg2TOnl2vnHexeChhJkRk5UFUK7X8a5lsBK0EWyeis9IiZDMd3i+ty9AgH
4
PbTUXhifd0553mynSz+29NSzZFFWVvnElfs2Vo7ySRF2SkA54GBsVwVzlXaIIFSg
5
/OYuoFufcBi59C/rdqig70ZNEta3AgMBAAECfwz5M9QgR1Upd9Vq/wMkVPe5uGUd
6
Cx/3B0GDuTwUObClkFC/fuDwHiii7ZLnHhUmwP9iXJBxTvEqlvIBl5LUMCeEOvEp
7
yz4P6b/zKhc4m+X77eEQUVBvLJ6MlDX8c91ks0k8iaX5RRFWUTZ+YaaJbDkupLWC
8
1ALSHGXjoCRLmRECQQDH6kbUOTtxXLn61Wa+imGBe/LNAJBPdG8BltNSvmOVVWla
9
DnNZ8t5/XYFm+faZEIKOKIelS8YQHt6tbmAMDIrfAkEA39exgMglrRl6G5glZK/n
10
1y22OEz0+z+34I0OGptX+z5xL5r2/8p06KB3dV9PAF0vO37tUMnM5yxrolgPvcuH
rsa_pubkey.plain
1
-----BEGIN PUBLIC KEY-----
2
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPvYED31s9p4zf6GMtg/u+PcE3
3
nZfynudhDfv9UkUfPbos2SlZ26IDACG5/jQNYcToWrfJiUO9rHtvi2OvyMM0sHdJ
4
KQVRs5DsWW+z2cSr3feptw4M2MoUKzr9hDPum7mJDoHCnp1QQ88CXGRFUkIgeDWQ
5
xtcCtZrs2sSQRqUMiwIDAQAB
6
-----END PUBLIC KEY-----

Targets

    • Target

      baabe38154bc2271d603513346457154.exe

    • Size

      1.1MB

    • MD5

      baabe38154bc2271d603513346457154

    • SHA1

      86ebdcd4ba7e7985c80f3897d5adba2d2c923d52

    • SHA256

      0c1978c1bc51c425f13e670074ddfd36d3e6e458dab5bcb1527c2b37953e13d6

    • SHA512

      149c353564df264c5d7f32f072fdcdc91e0c0ee12fe0508968003a887412fa9d47204abadc9d8c61cb955bdc1e3335db8f6f334a7838f62f95d3f28d8d576502

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot Loader Component

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.