3c652e59c845cb56e05c3a733c8fe69cd2b221caa97163bc6c34188ceca80c39

General
Target

3c652e59c845cb56e05c3a733c8fe69cd2b221caa97163bc6c34188ceca80c39

Size

1MB

Sample

220117-1ffblacfg3

Score
10 /10
MD5

9cfc084f1d179442058a82259a414984

SHA1

4b0a400655a9545f7ba95640afe395b7d076d48c

SHA256

3c652e59c845cb56e05c3a733c8fe69cd2b221caa97163bc6c34188ceca80c39

SHA512

4cb0fbd8b91ce3e3da9a1950b63bf4204d3bf0dd651009987453f15499d1b9c28f33180fd13fc957f7e63d7c72a78b757eec9a3d7d2dff0a7f755218257b4241

Malware Config

Extracted

Family danabot
Botnet 4
C2

103.175.16.113:443

103.175.16.114:443

Attributes
embedded_hash
422236FD601D11EE82825A484D26DD6F
type
loader
rsa_pubkey.plain
rsa_privkey.plain

Extracted

Family danabot
Version 2108
Botnet 4
C2

103.175.16.113:443

103.175.16.114:443

Attributes
embedded_hash
422236FD601D11EE82825A484D26DD6F
type
main
rsa_privkey.plain
rsa_pubkey.plain
Targets
Target

3c652e59c845cb56e05c3a733c8fe69cd2b221caa97163bc6c34188ceca80c39

MD5

9cfc084f1d179442058a82259a414984

Filesize

1MB

Score
10/10
SHA1

4b0a400655a9545f7ba95640afe395b7d076d48c

SHA256

3c652e59c845cb56e05c3a733c8fe69cd2b221caa97163bc6c34188ceca80c39

SHA512

4cb0fbd8b91ce3e3da9a1950b63bf4204d3bf0dd651009987453f15499d1b9c28f33180fd13fc957f7e63d7c72a78b757eec9a3d7d2dff0a7f755218257b4241

Tags

Signatures

  • Danabot

    Description

    Danabot is a modular banking Trojan that has been linked with other malware.

    Tags

  • Danabot Loader Component

  • Blocklisted process makes network request

  • Sets DLL path for service in the registry

    Tags

    TTPs

    Registry Run Keys / Startup FolderModify Registry
  • Sets service image path in registry

    Tags

    TTPs

    Registry Run Keys / Startup FolderModify Registry
  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Enumerates connected drives

    Description

    Attempts to read the root path of hard drives other than the default C: drive.

    TTPs

    Query RegistryPeripheral Device DiscoverySystem Information Discovery
  • Drops file in System32 directory

  • Suspicious use of SetThreadContext

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Execution
      Exfiltration
        Impact
          Initial Access
            Lateral Movement
              Privilege Escalation
                Tasks

                static1

                behavioral2

                1/10