General

  • Target

    9c2408b21ec7b0e1a5e2d324b1098086ba6112d3fd380648992306c20a6bbe55

  • Size

    2.4MB

  • Sample

    220908-erwxtsagaj

  • MD5

    eb9c57de0d6e051f9cc977007395a853

  • SHA1

    c894e9313912d973f827ff1bb5c21d440f1a646d

  • SHA256

    9c2408b21ec7b0e1a5e2d324b1098086ba6112d3fd380648992306c20a6bbe55

  • SHA512

    67adb50be456509df1a7e3c6ea326f7782969923dc57a385d5714b9a342a2c77f024c366c8fca8a7e54b040b5d00b1d9810ab86df39a47242ddc4a1f1034ac6e

  • SSDEEP

    49152:pE+MIJ7D/Os614al6pf+Mc76nHnHfM64JazWZunKarP8AS3ba:pEJ0escl8E7anYJazPK68a

Malware Config

Extracted

Family

danabot

C2

153.92.223.225:443

198.15.112.179:443

185.62.56.245:443

66.85.147.23:443

Attributes
  • embedded_hash

    61A1CB063216C13FFD2E15D7F3F515E2

  • type

    loader

Targets

    • Target

      9c2408b21ec7b0e1a5e2d324b1098086ba6112d3fd380648992306c20a6bbe55

    • Size

      2.4MB

    • MD5

      eb9c57de0d6e051f9cc977007395a853

    • SHA1

      c894e9313912d973f827ff1bb5c21d440f1a646d

    • SHA256

      9c2408b21ec7b0e1a5e2d324b1098086ba6112d3fd380648992306c20a6bbe55

    • SHA512

      67adb50be456509df1a7e3c6ea326f7782969923dc57a385d5714b9a342a2c77f024c366c8fca8a7e54b040b5d00b1d9810ab86df39a47242ddc4a1f1034ac6e

    • SSDEEP

      49152:pE+MIJ7D/Os614al6pf+Mc76nHnHfM64JazWZunKarP8AS3ba:pEJ0escl8E7anYJazPK68a

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks