General

  • Target

    file.exe

  • Size

    128KB

  • Sample

    220927-btjhqsccc8

  • MD5

    3cce7367f243eb4d34e04b27f658dc8d

  • SHA1

    7d954515c3612f574ac6c5f7a674c44dfc023ecd

  • SHA256

    04be226a715297ac67ea6e4b1d7e5426838bd42733ffcdd2359987a2fe6a4c85

  • SHA512

    7bd87f3a0ef561e591523b7f954febcdebd2ca7cfe7f3be613870d80c98b14823d01036b10a0906f36e7917e485875c38bcaf8740e6981a96a27e897b4fb4e0e

  • SSDEEP

    3072:tqvpU9TI56gjU4q/JnEEsSlwbM2iA4K/5x05B:topHAZB7RzA4KB

Malware Config

Extracted

Family

danabot

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Targets

    • Target

      file.exe

    • Size

      128KB

    • MD5

      3cce7367f243eb4d34e04b27f658dc8d

    • SHA1

      7d954515c3612f574ac6c5f7a674c44dfc023ecd

    • SHA256

      04be226a715297ac67ea6e4b1d7e5426838bd42733ffcdd2359987a2fe6a4c85

    • SHA512

      7bd87f3a0ef561e591523b7f954febcdebd2ca7cfe7f3be613870d80c98b14823d01036b10a0906f36e7917e485875c38bcaf8740e6981a96a27e897b4fb4e0e

    • SSDEEP

      3072:tqvpU9TI56gjU4q/JnEEsSlwbM2iA4K/5x05B:topHAZB7RzA4KB

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks