General

  • Target

    file.exe

  • Size

    270KB

  • Sample

    221010-k3armabcf8

  • MD5

    7a9c98d7a95f26b155b1f134b40215ec

  • SHA1

    2509f76fee5d5a11acdfb6e63f86b6364ca01a72

  • SHA256

    c70fbaa04edd53c4e28b84e416e9bc3f42a736dff08a47face9f023f46d93384

  • SHA512

    f0e4a7ee48440024d2013ed76bb963a8e44b6ca62c4f9d14925d1e2dae3008c52ad2ae2b79c4fed2afa409dd7bc0bdc0b68e149892860de6eeb0ba296a0d5daa

  • SSDEEP

    3072:OXhodXu6tKUWlYfhO50XuNghWu3jgM84aycoSNsj4Qnhqn/M/h3qpZa9uD6Vdyhh:Wi+cfh5XuNgh/8MNSObnhq/rwVfquS

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Targets

    • Target

      file.exe

    • Size

      270KB

    • MD5

      7a9c98d7a95f26b155b1f134b40215ec

    • SHA1

      2509f76fee5d5a11acdfb6e63f86b6364ca01a72

    • SHA256

      c70fbaa04edd53c4e28b84e416e9bc3f42a736dff08a47face9f023f46d93384

    • SHA512

      f0e4a7ee48440024d2013ed76bb963a8e44b6ca62c4f9d14925d1e2dae3008c52ad2ae2b79c4fed2afa409dd7bc0bdc0b68e149892860de6eeb0ba296a0d5daa

    • SSDEEP

      3072:OXhodXu6tKUWlYfhO50XuNghWu3jgM84aycoSNsj4Qnhqn/M/h3qpZa9uD6Vdyhh:Wi+cfh5XuNgh/8MNSObnhq/rwVfquS

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks