General

  • Target

    dana2_main_module.dll

  • Size

    14.9MB

  • Sample

    220106-qkhmeabcd2

  • MD5

    ccc1cb042ebb862832cc9f593c83a840

  • SHA1

    ffdb2747bbfca03ea0b469a11926957f79a6fe18

  • SHA256

    4fa6dcec96075d9e5a69d728d69b1e32fd59be3598742221a3704505fc073935

  • SHA512

    4ddeed3a27ecb84905f79281bb2c27089351bc09266090acfaa0082eefdaeabcb95eb0657d824b9da4ce9787679c123107b92ad1007ca3c5def132468e37d4e2

Malware Config

Extracted

Family

danabot

Version

2108

Botnet

4

C2

142.11.244.223:443

192.236.194.72:443

192.119.110.4:443

Attributes
  • embedded_hash

    8357B947FCA843DB2D85EC29EDCDEF3C

  • type

    main

rsa_privkey.plain
rsa_pubkey.plain

Targets

    • Target

      dana2_main_module.dll

    • Size

      14.9MB

    • MD5

      ccc1cb042ebb862832cc9f593c83a840

    • SHA1

      ffdb2747bbfca03ea0b469a11926957f79a6fe18

    • SHA256

      4fa6dcec96075d9e5a69d728d69b1e32fd59be3598742221a3704505fc073935

    • SHA512

      4ddeed3a27ecb84905f79281bb2c27089351bc09266090acfaa0082eefdaeabcb95eb0657d824b9da4ce9787679c123107b92ad1007ca3c5def132468e37d4e2

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks