General

  • Target

    file.exe

  • Size

    211KB

  • Sample

    221011-psb9xsedcr

  • MD5

    dccb3894da2926eef9ec0b6310967c3a

  • SHA1

    26146d192e9bc185df670b8bafa7520ea6edc93d

  • SHA256

    cba1e1b3ae358d0462d8d060079791887499c6fa9ca558582af96fa61cf5d0ff

  • SHA512

    da39ed75d881ebfc468820a59c23b914302b34991cb96f852c8b3206d9a7ee0a7743704653dda13d97ffa3b092faf9b1979bbc17fd7006d18811a36733ef72fd

  • SSDEEP

    3072:3/jg8f8QV27rLq9I2/t84VwXMUbCHAIh2Ht1CrR5dO:3cZtPLq9I2lw8UbTIh2Nsrt

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Targets

    • Target

      file.exe

    • Size

      211KB

    • MD5

      dccb3894da2926eef9ec0b6310967c3a

    • SHA1

      26146d192e9bc185df670b8bafa7520ea6edc93d

    • SHA256

      cba1e1b3ae358d0462d8d060079791887499c6fa9ca558582af96fa61cf5d0ff

    • SHA512

      da39ed75d881ebfc468820a59c23b914302b34991cb96f852c8b3206d9a7ee0a7743704653dda13d97ffa3b092faf9b1979bbc17fd7006d18811a36733ef72fd

    • SSDEEP

      3072:3/jg8f8QV27rLq9I2/t84VwXMUbCHAIh2Ht1CrR5dO:3cZtPLq9I2lw8UbTIh2Nsrt

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks