General

  • Target

    6787ef5832c890f5d9117f4d8bc85601100e7f236ad5830a4a00e64cb3160d7b

  • Size

    4.4MB

  • Sample

    220319-hkfttaddcr

  • MD5

    bbbf9b08ee68f03a9b314a0bb24493bb

  • SHA1

    b63a49aa78bd940599ef14ad71fa56cb96ae0aff

  • SHA256

    6787ef5832c890f5d9117f4d8bc85601100e7f236ad5830a4a00e64cb3160d7b

  • SHA512

    69449cb2add2fea73be89ead33182580b05f97b94f3ae77867ac44e3a017e360ea317f49c5105e7f8f60d913bc8ec63dd555bd8aab63f0ff2c9ef3ecc9176afd

Malware Config

Extracted

Family

danabot

Version

1732

Botnet

3

C2

23.106.123.249:443

64.188.20.187:443

108.62.118.103:443

104.227.34.227:443

Attributes
  • embedded_hash

    7851EC18309CA04099F7F0BE42FF6C04

  • type

    main

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      6787ef5832c890f5d9117f4d8bc85601100e7f236ad5830a4a00e64cb3160d7b

    • Size

      4.4MB

    • MD5

      bbbf9b08ee68f03a9b314a0bb24493bb

    • SHA1

      b63a49aa78bd940599ef14ad71fa56cb96ae0aff

    • SHA256

      6787ef5832c890f5d9117f4d8bc85601100e7f236ad5830a4a00e64cb3160d7b

    • SHA512

      69449cb2add2fea73be89ead33182580b05f97b94f3ae77867ac44e3a017e360ea317f49c5105e7f8f60d913bc8ec63dd555bd8aab63f0ff2c9ef3ecc9176afd

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • suricata: ET MALWARE Danabot Key Exchange Request

      suricata: ET MALWARE Danabot Key Exchange Request

    • Blocklisted process makes network request

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks