General

  • Target

    8fb660e69bc27c2fe492b68ca49f9d26f7a7df09f9e88fed1bcbada3ae156648

  • Size

    2.8MB

  • Sample

    220731-hehffsdhck

  • MD5

    a6b44040c4be7e9f321c0d691041d14a

  • SHA1

    c8e9a0b07eb80326556b13d08be0df77593456e4

  • SHA256

    8fb660e69bc27c2fe492b68ca49f9d26f7a7df09f9e88fed1bcbada3ae156648

  • SHA512

    dcdf6555c085d16e47265f56496b6ee459ecbd64207f070155ece317c842c322cad17a480a2d50635f880564f3c4692478e1976ace77f1fa0025224afdb69e2e

Malware Config

Extracted

Family

azorult

C2

http://waresustem.live/index.php

Extracted

Family

danabot

C2

111.16.115.107

45.77.40.71

219.38.42.24

36.161.165.12

111.93.37.5

185.25.165.125

95.179.168.37

2.148.32.114

77.80.160.106

81.202.212.201

rsa_pubkey.plain

Targets

    • Target

      8fb660e69bc27c2fe492b68ca49f9d26f7a7df09f9e88fed1bcbada3ae156648

    • Size

      2.8MB

    • MD5

      a6b44040c4be7e9f321c0d691041d14a

    • SHA1

      c8e9a0b07eb80326556b13d08be0df77593456e4

    • SHA256

      8fb660e69bc27c2fe492b68ca49f9d26f7a7df09f9e88fed1bcbada3ae156648

    • SHA512

      dcdf6555c085d16e47265f56496b6ee459ecbd64207f070155ece317c842c322cad17a480a2d50635f880564f3c4692478e1976ace77f1fa0025224afdb69e2e

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks