General

  • Target

    0ccbca4c551b10c2a00b4b069d710aaef8a974c07d9e1aa50c4c8e642f3f36c2

  • Size

    199KB

  • Sample

    220924-g3122acadp

  • MD5

    e99a7215d3e4440121fc13aafbd94305

  • SHA1

    caa12e3d5c201bbc2b461280905454e272f13e3f

  • SHA256

    0ccbca4c551b10c2a00b4b069d710aaef8a974c07d9e1aa50c4c8e642f3f36c2

  • SHA512

    7b5d6fc300be021c8bd73b1e44a8dcf31f8bfa9218daa7e98db4926e8865ae894836b2c4512fb93c1c91f56fba40a46417f108d3241250ec961d20c5ae8594aa

  • SSDEEP

    3072:Cwd/3CQMLltiZkTe6H85VbW91cCwVP/4tNOrVBZqUvW7/Pkk4x:C4K/LlTvLcCwBwkrXvW

Malware Config

Extracted

Family

danabot

C2

198.15.112.179:443

185.62.56.245:443

153.92.223.225:443

192.119.70.159:443

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Targets

    • Target

      0ccbca4c551b10c2a00b4b069d710aaef8a974c07d9e1aa50c4c8e642f3f36c2

    • Size

      199KB

    • MD5

      e99a7215d3e4440121fc13aafbd94305

    • SHA1

      caa12e3d5c201bbc2b461280905454e272f13e3f

    • SHA256

      0ccbca4c551b10c2a00b4b069d710aaef8a974c07d9e1aa50c4c8e642f3f36c2

    • SHA512

      7b5d6fc300be021c8bd73b1e44a8dcf31f8bfa9218daa7e98db4926e8865ae894836b2c4512fb93c1c91f56fba40a46417f108d3241250ec961d20c5ae8594aa

    • SSDEEP

      3072:Cwd/3CQMLltiZkTe6H85VbW91cCwVP/4tNOrVBZqUvW7/Pkk4x:C4K/LlTvLcCwBwkrXvW

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks