General

  • Target

    3168462b40b11698b32fa1f90b8d684cba056ff88837ad67efad1d203641deec

  • Size

    979KB

  • Sample

    220226-k5mh7sbefm

  • MD5

    adc8c26038ab606b280ce3ea693b5bc4

  • SHA1

    b2a2a0c749adb844e94b33c141e3044387b688b2

  • SHA256

    3168462b40b11698b32fa1f90b8d684cba056ff88837ad67efad1d203641deec

  • SHA512

    d0e46ebf72244663c58a320d81e631f731a3ab84bd9e9be05e69259fa0d7166d6213b9c61e4f8e6dde0400f94a92afdbcee36190d97ef141e0ec4cad7797c70c

Malware Config

Extracted

Family

danabot

C2

5.61.58.130

2.56.213.39

2.56.212.4

5.61.56.192

rsa_pubkey.plain

Targets

    • Target

      3168462b40b11698b32fa1f90b8d684cba056ff88837ad67efad1d203641deec

    • Size

      979KB

    • MD5

      adc8c26038ab606b280ce3ea693b5bc4

    • SHA1

      b2a2a0c749adb844e94b33c141e3044387b688b2

    • SHA256

      3168462b40b11698b32fa1f90b8d684cba056ff88837ad67efad1d203641deec

    • SHA512

      d0e46ebf72244663c58a320d81e631f731a3ab84bd9e9be05e69259fa0d7166d6213b9c61e4f8e6dde0400f94a92afdbcee36190d97ef141e0ec4cad7797c70c

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks