Resubmissions

03-05-2022 13:04

220503-qbdbbshfdk 8

25-04-2022 15:50

220425-s9x5haggej 8

Analysis

  • max time kernel
    144s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-05-2022 13:04

General

  • Target

    201715e350439f6d19ce61769e5bb8d5.exe

  • Size

    1.0MB

  • MD5

    201715e350439f6d19ce61769e5bb8d5

  • SHA1

    38f5365dfe6d9d31d75b5637ddcbdb8db8cb35c6

  • SHA256

    35bb9fb5b4801c32caa7c9b1d178f6a11d88cf849394333d450d9fc36dac0c1f

  • SHA512

    32eaa99506f68b8a9f814f795fc0f10fa426ff91f10cb0ea3ae5684a5b468fcf066bc05c3b1146f649e310813d0a32e4d1b6d86ac761ca07914ab3c14e2a8c72

Score
10/10

Malware Config

Extracted

Family

danabot

Botnet

6

C2

192.236.160.249:443

104.168.234.51:443

23.254.161.215:443

192.236.147.212:443

Attributes
  • embedded_hash

    A471231BC0846BE9EFCDD39DCBA967C5

  • type

    loader

Extracted

Family

danabot

Attributes
  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 5 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\201715e350439f6d19ce61769e5bb8d5.exe
    "C:\Users\Admin\AppData\Local\Temp\201715e350439f6d19ce61769e5bb8d5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:1644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1644-91-0x0000000000090000-0x0000000000094000-memory.dmp

    Filesize

    16KB

  • memory/1644-98-0x0000000000140000-0x0000000000144000-memory.dmp

    Filesize

    16KB

  • memory/1644-99-0x0000000000190000-0x0000000000194000-memory.dmp

    Filesize

    16KB

  • memory/1644-90-0x0000000000080000-0x0000000000084000-memory.dmp

    Filesize

    16KB

  • memory/1644-97-0x0000000000130000-0x0000000000134000-memory.dmp

    Filesize

    16KB

  • memory/1644-59-0x00000000001C0000-0x00000000001C4000-memory.dmp

    Filesize

    16KB

  • memory/1644-61-0x00000000001C0000-0x00000000001C4000-memory.dmp

    Filesize

    16KB

  • memory/1644-96-0x0000000000120000-0x0000000000124000-memory.dmp

    Filesize

    16KB

  • memory/1644-100-0x00000000001A0000-0x00000000001A4000-memory.dmp

    Filesize

    16KB

  • memory/1644-95-0x00000000000D0000-0x00000000000D4000-memory.dmp

    Filesize

    16KB

  • memory/1644-92-0x00000000000A0000-0x00000000000A4000-memory.dmp

    Filesize

    16KB

  • memory/1644-93-0x00000000000B0000-0x00000000000B4000-memory.dmp

    Filesize

    16KB

  • memory/1644-94-0x00000000000C0000-0x00000000000C4000-memory.dmp

    Filesize

    16KB

  • memory/1936-55-0x0000000000400000-0x0000000000636000-memory.dmp

    Filesize

    2.2MB

  • memory/1936-54-0x0000000001F20000-0x0000000001FFF000-memory.dmp

    Filesize

    892KB

  • memory/1936-58-0x0000000074DD1000-0x0000000074DD3000-memory.dmp

    Filesize

    8KB

  • memory/1936-57-0x0000000002000000-0x000000000222A000-memory.dmp

    Filesize

    2.2MB

  • memory/1936-56-0x0000000001F20000-0x0000000001FFF000-memory.dmp

    Filesize

    892KB

  • memory/1936-89-0x0000000000400000-0x0000000000636000-memory.dmp

    Filesize

    2.2MB