Analysis

  • max time kernel
    1s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2022 20:34

General

  • Target

    c8f1ec2ef618dfcd254f5a9e397b70644b3ba070f0c327bae20a3054df0021c0.dll

  • Size

    6.4MB

  • MD5

    37280de8b448ed3a4358120a40b42872

  • SHA1

    b05209c3bcaac611763369416a18c4b8406c4fa1

  • SHA256

    c8f1ec2ef618dfcd254f5a9e397b70644b3ba070f0c327bae20a3054df0021c0

  • SHA512

    807ba5962fd16b0700121f70a948257e8602a2b7f15f74e871253fc8571e36900915eeecdddab2a3c26364ab9369b2c4386fbb7e2f3135641ef8f1df4784d74c

  • SSDEEP

    98304:zG5fSXz5F5x+3rUQ4Qljsq75Pm9tli8VSP6W:zKfSlLsVPm9tlJW

Score
10/10

Malware Config

Extracted

Family

danabot

Version

1765

Botnet

3

C2

192.236.146.203:443

192.161.48.5:443

192.236.162.42:443

192.3.26.98:443

Attributes
  • embedded_hash

    B2585F6479280F48B64C99F950BBF36D

  • type

    main

rsa_pubkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c8f1ec2ef618dfcd254f5a9e397b70644b3ba070f0c327bae20a3054df0021c0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c8f1ec2ef618dfcd254f5a9e397b70644b3ba070f0c327bae20a3054df0021c0.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 264
        3⤵
        • Program crash
        PID:1608

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1208-54-0x0000000000000000-mapping.dmp
  • memory/1208-55-0x0000000076261000-0x0000000076263000-memory.dmp
    Filesize

    8KB

  • memory/1208-56-0x0000000001F60000-0x00000000025C2000-memory.dmp
    Filesize

    6.4MB

  • memory/1608-57-0x0000000000000000-mapping.dmp