General

  • Target

    e10e524376993002807d36593f7fb97f0203623c29e8733e32aeb04e62eb4d79

  • Size

    201KB

  • Sample

    220925-f6dv8sefhq

  • MD5

    144df80e10790dcb68df7d335521c9d3

  • SHA1

    85308a025c878a77c6fc852ab241b423edb909b5

  • SHA256

    e10e524376993002807d36593f7fb97f0203623c29e8733e32aeb04e62eb4d79

  • SHA512

    a5570857d1931618d5bde0f40982d02f907fa87435e663b268d5743af8134cb8fcd069143d3c3ccf1a36d30321f2d1014bc705a0400b15b0152f15299a5ba114

  • SSDEEP

    3072:6mECZLDWJvBbN5vqEhtZpN9KSHc6V8VbY72hABlt/rsH/PkIXx:pLDGBrZ4SvSFY72+t/rs

Malware Config

Extracted

Family

danabot

C2

198.15.112.179:443

185.62.56.245:443

153.92.223.225:443

192.119.70.159:443

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Targets

    • Target

      e10e524376993002807d36593f7fb97f0203623c29e8733e32aeb04e62eb4d79

    • Size

      201KB

    • MD5

      144df80e10790dcb68df7d335521c9d3

    • SHA1

      85308a025c878a77c6fc852ab241b423edb909b5

    • SHA256

      e10e524376993002807d36593f7fb97f0203623c29e8733e32aeb04e62eb4d79

    • SHA512

      a5570857d1931618d5bde0f40982d02f907fa87435e663b268d5743af8134cb8fcd069143d3c3ccf1a36d30321f2d1014bc705a0400b15b0152f15299a5ba114

    • SSDEEP

      3072:6mECZLDWJvBbN5vqEhtZpN9KSHc6V8VbY72hABlt/rsH/PkIXx:pLDGBrZ4SvSFY72+t/rs

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks