General

  • Target

    6sqtt_07072022_103144.vbs

  • Size

    8KB

  • Sample

    220709-hgb2fscecm

  • MD5

    6ebff0e37948aa39e62905c59795ab31

  • SHA1

    985d46dce1d208445d3e54be9ce8a6d2e7843823

  • SHA256

    039d264f6276dcbde5ddcc40808ccc215a914cbd0bbcc67e317d9cb92d7b9020

  • SHA512

    fe4440f7824017317b74974b318a58251ed6756049cfd05de9dda5d9b379ba6dd637e59fee3ca996712ae3442cdd54fd190cf208ad20d92a4c5a67111b7d78e6

Malware Config

Extracted

Family

danabot

C2

100.0.0.0:5148

58.50.42.34:13886

26.18.10.2:5662

60.52.44.36:14400

Attributes
  • embedded_hash

    zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz

  • type

    loader

Targets

    • Target

      6sqtt_07072022_103144.vbs

    • Size

      8KB

    • MD5

      6ebff0e37948aa39e62905c59795ab31

    • SHA1

      985d46dce1d208445d3e54be9ce8a6d2e7843823

    • SHA256

      039d264f6276dcbde5ddcc40808ccc215a914cbd0bbcc67e317d9cb92d7b9020

    • SHA512

      fe4440f7824017317b74974b318a58251ed6756049cfd05de9dda5d9b379ba6dd637e59fee3ca996712ae3442cdd54fd190cf208ad20d92a4c5a67111b7d78e6

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

2
T1114

Tasks