General

  • Target

    file.exe

  • Size

    276KB

  • Sample

    221010-nhpxlabgfn

  • MD5

    8a16ba45656454f73c16169a88d867fd

  • SHA1

    cbd09b4d43c2acf42c87d9a6554fc7287d2cf52f

  • SHA256

    94a24841df9e30fab797665446d3ebbf9af6c8157a99d4c3f7afbe64d58777c6

  • SHA512

    de459bfe8839ab647921fb1d6a8e97fafa99a8f56d6e79ca50665c962f4e4751c2c7fda71e5e30b36c5780b6cbded1590775cd1ccea804891cbeaa270b98df43

  • SSDEEP

    6144:sFV1oU2xqOUjJn3CP4XI5obljmGrwVfquS:sFgU28OUSh+dd

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Extracted

Family

systembc

C2

45.182.189.231:443

Targets

    • Target

      file.exe

    • Size

      276KB

    • MD5

      8a16ba45656454f73c16169a88d867fd

    • SHA1

      cbd09b4d43c2acf42c87d9a6554fc7287d2cf52f

    • SHA256

      94a24841df9e30fab797665446d3ebbf9af6c8157a99d4c3f7afbe64d58777c6

    • SHA512

      de459bfe8839ab647921fb1d6a8e97fafa99a8f56d6e79ca50665c962f4e4751c2c7fda71e5e30b36c5780b6cbded1590775cd1ccea804891cbeaa270b98df43

    • SSDEEP

      6144:sFV1oU2xqOUjJn3CP4XI5obljmGrwVfquS:sFgU28OUSh+dd

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks