Analysis

  • max time kernel
    135s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-12-2021 06:56

General

  • Target

    6c6556b6e30b5395351243994b576e9d16d7394d67f36b336e04cf057375a62f.exe

  • Size

    1.8MB

  • MD5

    9581638dd10b0f6cfe0e38d880628564

  • SHA1

    1feab5fea4e9506d3e41a99b532c469b93a78a9c

  • SHA256

    6c6556b6e30b5395351243994b576e9d16d7394d67f36b336e04cf057375a62f

  • SHA512

    28f4a92f81d23eef6ca30cddc793ae4cab20535300690839e0cb1d259a0c4fb8bd396c00bdc5639d8012d15d2eb8defc66c1304c8284a615490259f4a3d7e1c7

Score
10/10

Malware Config

Extracted

Family

danabot

Botnet

4

C2

142.11.244.223:443

192.236.194.72:443

Attributes
  • embedded_hash

    0FA95F120D6EB149A5D48E36BC76879D

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c6556b6e30b5395351243994b576e9d16d7394d67f36b336e04cf057375a62f.exe
    "C:\Users\Admin\AppData\Local\Temp\6c6556b6e30b5395351243994b576e9d16d7394d67f36b336e04cf057375a62f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:600
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\6C6556~1.DLL,s C:\Users\Admin\AppData\Local\Temp\6C6556~1.EXE
      2⤵
      • Loads dropped DLL
      PID:2260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6C6556~1.DLL
    MD5

    db74d5bc0981960940b43b2c3f94ff61

    SHA1

    d71ded369ce768a28d1d0b2f5c501cb5aa30a380

    SHA256

    2ca6d0bc3619d54abb8ab2f08288a3dca5d0280ceefbd0e89feb4d315d73953e

    SHA512

    56afc0ebaf2aa8123abbcd03a1a9db79c48b87aee12227dfcf99755ed29978601c2038ebfbc2b497fd6d850465038855ca89b2fa57674832a0fa916f254e65a5

  • \Users\Admin\AppData\Local\Temp\6C6556~1.DLL
    MD5

    db74d5bc0981960940b43b2c3f94ff61

    SHA1

    d71ded369ce768a28d1d0b2f5c501cb5aa30a380

    SHA256

    2ca6d0bc3619d54abb8ab2f08288a3dca5d0280ceefbd0e89feb4d315d73953e

    SHA512

    56afc0ebaf2aa8123abbcd03a1a9db79c48b87aee12227dfcf99755ed29978601c2038ebfbc2b497fd6d850465038855ca89b2fa57674832a0fa916f254e65a5

  • memory/600-115-0x0000000001060000-0x00000000011F0000-memory.dmp
    Filesize

    1.6MB

  • memory/600-116-0x00000000011F0000-0x0000000001396000-memory.dmp
    Filesize

    1.6MB

  • memory/600-117-0x0000000000400000-0x00000000009C4000-memory.dmp
    Filesize

    5.8MB

  • memory/2260-118-0x0000000000000000-mapping.dmp