General

  • Target

    a711f944a260e0bbc12c287681296965da7c55253c9c9a92eec3bbe106263474

  • Size

    153KB

  • Sample

    220926-tfwv1sbcd2

  • MD5

    1094a2d4316d48394aa67097384945cd

  • SHA1

    eaaa66053c3f96aaff8ad60dcc127f1e3978cc56

  • SHA256

    a711f944a260e0bbc12c287681296965da7c55253c9c9a92eec3bbe106263474

  • SHA512

    01b7df8e0bcacade5315ad3c328009505fc9c527c081fa869d88387f8e742bcd4ab61f76270a18b6e0664a2842d3a1f0bc9915c83f5546f16cf942bf6cbcc192

  • SSDEEP

    3072:tLKj6Tc51avosE5cnqnye4xqbZBXQBSWFVdw5B:wwoRe6yeD0zFV

Malware Config

Extracted

Family

danabot

C2

198.15.112.179:443

185.62.56.245:443

153.92.223.225:443

192.119.70.159:443

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Extracted

Family

redline

Botnet

insmix

C2

jamesmillion2.xyz:9420

Attributes
  • auth_value

    f388a05524f756108c9e4b0f4c4bafb6

Targets

    • Target

      a711f944a260e0bbc12c287681296965da7c55253c9c9a92eec3bbe106263474

    • Size

      153KB

    • MD5

      1094a2d4316d48394aa67097384945cd

    • SHA1

      eaaa66053c3f96aaff8ad60dcc127f1e3978cc56

    • SHA256

      a711f944a260e0bbc12c287681296965da7c55253c9c9a92eec3bbe106263474

    • SHA512

      01b7df8e0bcacade5315ad3c328009505fc9c527c081fa869d88387f8e742bcd4ab61f76270a18b6e0664a2842d3a1f0bc9915c83f5546f16cf942bf6cbcc192

    • SSDEEP

      3072:tLKj6Tc51avosE5cnqnye4xqbZBXQBSWFVdw5B:wwoRe6yeD0zFV

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks