Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    6dec47104bb3dfc775630ee988ce2a55caf83041630d4d208d09c7570fe6dd37

  • Size

    249KB

  • Sample

    220915-n66j9agfgj

  • MD5

    104f9b7ac89f724233c6d3f0f0a5a4cf

  • SHA1

    235a2421f23182bbc19cd0f16a050c748daac6ef

  • SHA256

    6dec47104bb3dfc775630ee988ce2a55caf83041630d4d208d09c7570fe6dd37

  • SHA512

    dd02192055b09ab7e7c03d6267650b0b4c1f8539fd83c1e4a972098ef3b19d158e3bbef4584b6d020332db4b19bd8f31823d8c942641d06f87602497fc00a878

  • SSDEEP

    6144:3ns2IzXL2cionM3RwjsBTQWJD0PSNZzniga:3nZyXqci3TQWaP8Ji

Malware Config

Extracted

Family

danabot

C2

103.144.139.228:443

213.227.154.98:443

66.85.147.23:443

153.92.223.225:443

Attributes
  • embedded_hash

    A64A3A6ED13022027B84C77D31BE0C74

  • type

    loader

Targets

    • Target

      6dec47104bb3dfc775630ee988ce2a55caf83041630d4d208d09c7570fe6dd37

    • Size

      249KB

    • MD5

      104f9b7ac89f724233c6d3f0f0a5a4cf

    • SHA1

      235a2421f23182bbc19cd0f16a050c748daac6ef

    • SHA256

      6dec47104bb3dfc775630ee988ce2a55caf83041630d4d208d09c7570fe6dd37

    • SHA512

      dd02192055b09ab7e7c03d6267650b0b4c1f8539fd83c1e4a972098ef3b19d158e3bbef4584b6d020332db4b19bd8f31823d8c942641d06f87602497fc00a878

    • SSDEEP

      6144:3ns2IzXL2cionM3RwjsBTQWJD0PSNZzniga:3nZyXqci3TQWaP8Ji

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks