General
-
Target
1a5b51c6da5399571b495e251c10eae4b9875efb0cdc8e76abd699a887abb1b2
-
Size
1MB
-
Sample
220117-11dcqsdad3
-
MD5
67c56114c8ad71ae8d5490f2aed56107
-
SHA1
631459c6a43f3c303d011436d4ad4a620b3ca336
-
SHA256
1a5b51c6da5399571b495e251c10eae4b9875efb0cdc8e76abd699a887abb1b2
-
SHA512
5e652b84508006b8f0cab7b6252a0918dae3fabe48c8ff084d2a4f97ed926532fd60f5c1d9ee0f00d51e8ac25c647948b63aa4689428ab7bd3d19ed13bc65ab9
Static task
static1
Malware Config
Extracted
danabot
4
103.175.16.113:443
103.175.16.114:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
loader
Extracted
danabot
2108
4
103.175.16.113:443
103.175.16.114:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
main
Targets
-
-
Target
1a5b51c6da5399571b495e251c10eae4b9875efb0cdc8e76abd699a887abb1b2
-
Size
1MB
-
MD5
67c56114c8ad71ae8d5490f2aed56107
-
SHA1
631459c6a43f3c303d011436d4ad4a620b3ca336
-
SHA256
1a5b51c6da5399571b495e251c10eae4b9875efb0cdc8e76abd699a887abb1b2
-
SHA512
5e652b84508006b8f0cab7b6252a0918dae3fabe48c8ff084d2a4f97ed926532fd60f5c1d9ee0f00d51e8ac25c647948b63aa4689428ab7bd3d19ed13bc65ab9
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Data from Local System
1Command and Control
Credential Access
Credentials in Files
1Discovery
Query Registry
3System Information Discovery
3Peripheral Device Discovery
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Registry Run Keys / Startup Folder
2Privilege Escalation