General

  • Target

    9fc95335912d87705bc6a4061137a19df8c49580984f67379c0e4546ff760799

  • Size

    202KB

  • Sample

    220925-v95wfsgggp

  • MD5

    a54b703b766de6ed72ebda2a886eedc3

  • SHA1

    723b89605e159ceff06790b5d12864c94d07831e

  • SHA256

    9fc95335912d87705bc6a4061137a19df8c49580984f67379c0e4546ff760799

  • SHA512

    eed57fd31db277786b3190301b3a1c0fa29c0347e62799c2cd38efc6a892d5b60a41286703b89c35657351e8d75d87d20b993a92c7144a31cbbdc5de50ca68f8

  • SSDEEP

    3072:kgz30vrPEz5EJoXhfyhZivm5KLzP8fNSaBwOaegQN/PkuXx:k7aRFv4KLz8NSBOVh

Malware Config

Extracted

Family

danabot

C2

198.15.112.179:443

185.62.56.245:443

153.92.223.225:443

192.119.70.159:443

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Targets

    • Target

      9fc95335912d87705bc6a4061137a19df8c49580984f67379c0e4546ff760799

    • Size

      202KB

    • MD5

      a54b703b766de6ed72ebda2a886eedc3

    • SHA1

      723b89605e159ceff06790b5d12864c94d07831e

    • SHA256

      9fc95335912d87705bc6a4061137a19df8c49580984f67379c0e4546ff760799

    • SHA512

      eed57fd31db277786b3190301b3a1c0fa29c0347e62799c2cd38efc6a892d5b60a41286703b89c35657351e8d75d87d20b993a92c7144a31cbbdc5de50ca68f8

    • SSDEEP

      3072:kgz30vrPEz5EJoXhfyhZivm5KLzP8fNSaBwOaegQN/PkuXx:k7aRFv4KLz8NSBOVh

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks