General

  • Target

    0efe08102a13cbdac22d1e9a9c0a9f5bdec27da1567d757846260548fe94ff0e

  • Size

    145KB

  • Sample

    221006-ejv1kageeq

  • MD5

    cf79a50fc63695e4fa7130035a8ca63c

  • SHA1

    e0101c3cc801c35c421779fe96cec7fca3825dca

  • SHA256

    0efe08102a13cbdac22d1e9a9c0a9f5bdec27da1567d757846260548fe94ff0e

  • SHA512

    24cd5a0a253f828029e8c974f864165eaab84b0ee5ce1ba46bf09e930af1f2811900946015d82ac61a417adc1088dbfe79adca0e192c13514fb227b9a26e7bbc

  • SSDEEP

    1536:Md1Pbv+9CiRyX9chf+O2w4iB1JzS8hjvD/DHpoYhPiP7HbQCvxzM6qU0rzChfFQX:Md1PbWwOhfIw46FbphPGtu6p0qNjAO

Malware Config

Extracted

Family

danabot

C2

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    EAD30BF58E340E9E105B328F524565E0

  • type

    loader

Targets

    • Target

      0efe08102a13cbdac22d1e9a9c0a9f5bdec27da1567d757846260548fe94ff0e

    • Size

      145KB

    • MD5

      cf79a50fc63695e4fa7130035a8ca63c

    • SHA1

      e0101c3cc801c35c421779fe96cec7fca3825dca

    • SHA256

      0efe08102a13cbdac22d1e9a9c0a9f5bdec27da1567d757846260548fe94ff0e

    • SHA512

      24cd5a0a253f828029e8c974f864165eaab84b0ee5ce1ba46bf09e930af1f2811900946015d82ac61a417adc1088dbfe79adca0e192c13514fb227b9a26e7bbc

    • SSDEEP

      1536:Md1Pbv+9CiRyX9chf+O2w4iB1JzS8hjvD/DHpoYhPiP7HbQCvxzM6qU0rzChfFQX:Md1PbWwOhfIw46FbphPGtu6p0qNjAO

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks