General

  • Target

    79178a255065fa70bae805de9df75657b182b54650e81fffe9b36e6c803195a5

  • Size

    1.9MB

  • Sample

    220916-fezcvsefg6

  • MD5

    f42ae357fb68f2b9d5611747b95e2330

  • SHA1

    2378b5297f6aeadd76829279e1f0c7254781c6b8

  • SHA256

    79178a255065fa70bae805de9df75657b182b54650e81fffe9b36e6c803195a5

  • SHA512

    ebaaabacdf3d2cf488f77372ba7c5eea0e6f56ba49bef2e61cdc1884e5d14018c8cb6cab18412077cc87aa54f0aa7788d0ae16645abbf8def267a4b2d7622481

  • SSDEEP

    24576:8n7EK6OHwYgKrpeMIj+haxZu7rhiHv6VMdlT42kx+AU3yoqsr2thynjIk+Wb+Dji:XK4ZK97wHvH/42kanyIVYEX3bt

Malware Config

Extracted

Family

danabot

C2

103.144.139.228:443

213.227.154.98:443

66.85.147.23:443

153.92.223.225:443

Attributes
  • embedded_hash

    A64A3A6ED13022027B84C77D31BE0C74

  • type

    loader

Targets

    • Target

      79178a255065fa70bae805de9df75657b182b54650e81fffe9b36e6c803195a5

    • Size

      1.9MB

    • MD5

      f42ae357fb68f2b9d5611747b95e2330

    • SHA1

      2378b5297f6aeadd76829279e1f0c7254781c6b8

    • SHA256

      79178a255065fa70bae805de9df75657b182b54650e81fffe9b36e6c803195a5

    • SHA512

      ebaaabacdf3d2cf488f77372ba7c5eea0e6f56ba49bef2e61cdc1884e5d14018c8cb6cab18412077cc87aa54f0aa7788d0ae16645abbf8def267a4b2d7622481

    • SSDEEP

      24576:8n7EK6OHwYgKrpeMIj+haxZu7rhiHv6VMdlT42kx+AU3yoqsr2thynjIk+Wb+Dji:XK4ZK97wHvH/42kanyIVYEX3bt

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks