General

  • Target

    d38df6ee915a52b52a87ebaf29d7a87f39eda4bb8997500077b638ea4e06da2f

  • Size

    5.5MB

  • Sample

    211224-v2xj4sdfhk

  • MD5

    01b28640e1900218bcc0142cabbe3928

  • SHA1

    3e87b34e61374d8d0108d7e91e46165f14b548cc

  • SHA256

    d38df6ee915a52b52a87ebaf29d7a87f39eda4bb8997500077b638ea4e06da2f

  • SHA512

    086f198c500a929498cd317053a7124378c668ae1f780c67182be0e17aace1f4a50b71d8052651e0761b0c280b526d305ac3ff67153e6a86d169beef7f821e35

Malware Config

Extracted

Family

danabot

Botnet

4

C2

142.11.244.223:443

192.236.194.72:443

Attributes
  • embedded_hash

    0FA95F120D6EB149A5D48E36BC76879D

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Targets

    • Target

      d38df6ee915a52b52a87ebaf29d7a87f39eda4bb8997500077b638ea4e06da2f

    • Size

      5.5MB

    • MD5

      01b28640e1900218bcc0142cabbe3928

    • SHA1

      3e87b34e61374d8d0108d7e91e46165f14b548cc

    • SHA256

      d38df6ee915a52b52a87ebaf29d7a87f39eda4bb8997500077b638ea4e06da2f

    • SHA512

      086f198c500a929498cd317053a7124378c668ae1f780c67182be0e17aace1f4a50b71d8052651e0761b0c280b526d305ac3ff67153e6a86d169beef7f821e35

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot Loader Component

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks