Resubmissions

03-05-2022 13:05

220503-qbj4wafba7 8

20-04-2022 06:43

220420-hgxcdshgam 8

Analysis

  • max time kernel
    140s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-05-2022 13:05

General

  • Target

    8fba92e7730c734197c8e5977533df77.exe

  • Size

    975KB

  • MD5

    8fba92e7730c734197c8e5977533df77

  • SHA1

    8106d808d0199d230b5943f15b1d85d05334d3ea

  • SHA256

    72cb26ac08fa4ba35112a093b506eb97f730537f9a011a20ad8049d4da6fcb77

  • SHA512

    ab1e7246e219b63b65082de10be4f6880bee0e1b04a50722bb7a1b8cfa81853a5793f581decfc43b5f1cf02d01fdd4fa3bc047cbc28afc0f37f6f87b75b397bb

Score
10/10

Malware Config

Extracted

Family

danabot

Attributes
  • type

    loader

Extracted

Family

danabot

Botnet

7

C2

192.236.176.108:443

23.254.209.218:443

Attributes
  • embedded_hash

    7E121872EDA1FC9ABB4099F6D6AE1D49

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 5 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fba92e7730c734197c8e5977533df77.exe
    "C:\Users\Admin\AppData\Local\Temp\8fba92e7730c734197c8e5977533df77.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/560-120-0x0000000000400000-0x00000000005F6000-memory.dmp
    Filesize

    2.0MB

  • memory/560-116-0x0000000001D90000-0x0000000001E57000-memory.dmp
    Filesize

    796KB

  • memory/560-55-0x0000000075701000-0x0000000075703000-memory.dmp
    Filesize

    8KB

  • memory/560-54-0x0000000001D90000-0x0000000001E57000-memory.dmp
    Filesize

    796KB

  • memory/560-117-0x0000000001F90000-0x000000000217A000-memory.dmp
    Filesize

    1.9MB

  • memory/940-128-0x0000000000190000-0x0000000000193000-memory.dmp
    Filesize

    12KB

  • memory/940-124-0x0000000000150000-0x0000000000153000-memory.dmp
    Filesize

    12KB

  • memory/940-58-0x00000000002B0000-0x00000000002B3000-memory.dmp
    Filesize

    12KB

  • memory/940-129-0x00000000001A0000-0x00000000001A3000-memory.dmp
    Filesize

    12KB

  • memory/940-56-0x00000000002B0000-0x00000000002B3000-memory.dmp
    Filesize

    12KB

  • memory/940-118-0x00000000000D0000-0x00000000000D3000-memory.dmp
    Filesize

    12KB

  • memory/940-122-0x0000000000130000-0x0000000000133000-memory.dmp
    Filesize

    12KB

  • memory/940-114-0x0000000000000000-mapping.dmp
  • memory/940-125-0x0000000000160000-0x0000000000163000-memory.dmp
    Filesize

    12KB

  • memory/940-123-0x0000000000140000-0x0000000000143000-memory.dmp
    Filesize

    12KB

  • memory/940-126-0x0000000000170000-0x0000000000173000-memory.dmp
    Filesize

    12KB

  • memory/940-127-0x0000000000180000-0x0000000000183000-memory.dmp
    Filesize

    12KB

  • memory/940-121-0x00000000000C0000-0x00000000000C3000-memory.dmp
    Filesize

    12KB

  • memory/940-130-0x00000000001B0000-0x00000000001B3000-memory.dmp
    Filesize

    12KB

  • memory/940-119-0x00000000000E0000-0x00000000000E3000-memory.dmp
    Filesize

    12KB