General

  • Target

    57ff8b095742c37f4e1308be1544a7b92e065bbfd63055b2f43764629e4af47a

  • Size

    2.4MB

  • Sample

    220909-lqeqgsghd3

  • MD5

    f229b94308e9900d6834de7db885651d

  • SHA1

    024f195118bf5452c5e3da5a6915768295ae20cf

  • SHA256

    57ff8b095742c37f4e1308be1544a7b92e065bbfd63055b2f43764629e4af47a

  • SHA512

    f8465ce188a2f9130fd4660f37e1f1125a4745c95f4452be2cbee2555c7b56b9ac8825e22ec63eef2bcc746a81378391ce2230b22ada984dfd65f2cbd0145b3b

  • SSDEEP

    49152:MzCGyhEJd+kX7KWTq27R66+DTItNSlzlygePIq50rJm+lX3:MWGyinrKUvt6pDTVlRyPlkdX3

Malware Config

Extracted

Family

danabot

C2

153.92.223.225:443

198.15.112.179:443

185.62.56.245:443

66.85.147.23:443

Attributes
  • embedded_hash

    61A1CB063216C13FFD2E15D7F3F515E2

  • type

    loader

Targets

    • Target

      57ff8b095742c37f4e1308be1544a7b92e065bbfd63055b2f43764629e4af47a

    • Size

      2.4MB

    • MD5

      f229b94308e9900d6834de7db885651d

    • SHA1

      024f195118bf5452c5e3da5a6915768295ae20cf

    • SHA256

      57ff8b095742c37f4e1308be1544a7b92e065bbfd63055b2f43764629e4af47a

    • SHA512

      f8465ce188a2f9130fd4660f37e1f1125a4745c95f4452be2cbee2555c7b56b9ac8825e22ec63eef2bcc746a81378391ce2230b22ada984dfd65f2cbd0145b3b

    • SSDEEP

      49152:MzCGyhEJd+kX7KWTq27R66+DTItNSlzlygePIq50rJm+lX3:MWGyinrKUvt6pDTVlRyPlkdX3

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks