General

  • Target

    90ee20a62bdeebc3dd489ed275e9b8da56638bf19e44bed8c43e7e4bc9e12f97

  • Size

    2.6MB

  • Sample

    220524-s7wtnagde7

  • MD5

    95e5ade6dc73995c3aead518331fc6d1

  • SHA1

    99f3f68704a6c2c5e5cdda3eeff3122fc78a2ae4

  • SHA256

    90ee20a62bdeebc3dd489ed275e9b8da56638bf19e44bed8c43e7e4bc9e12f97

  • SHA512

    8d56b8152740684f508629b644cc133a99e84e24cafa00b1a81ab91f6cbcba587022cca3323ce7739b65284c38c534822b974ab0330ab50d9a682b509e5942e3

Malware Config

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Targets

    • Target

      90ee20a62bdeebc3dd489ed275e9b8da56638bf19e44bed8c43e7e4bc9e12f97

    • Size

      2.6MB

    • MD5

      95e5ade6dc73995c3aead518331fc6d1

    • SHA1

      99f3f68704a6c2c5e5cdda3eeff3122fc78a2ae4

    • SHA256

      90ee20a62bdeebc3dd489ed275e9b8da56638bf19e44bed8c43e7e4bc9e12f97

    • SHA512

      8d56b8152740684f508629b644cc133a99e84e24cafa00b1a81ab91f6cbcba587022cca3323ce7739b65284c38c534822b974ab0330ab50d9a682b509e5942e3

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks