General

  • Target

    e4d9db2c0a37eb4a6d9e16a1d149d2a3de304bf2058f5a75ddf9027b187761e8.exe

  • Size

    215KB

  • Sample

    221014-17zjjsegdr

  • MD5

    512f1687b938e673c3b8b05e73e9905f

  • SHA1

    07ec16b0df79c000a7f65eafc2861c9f25369a62

  • SHA256

    e4d9db2c0a37eb4a6d9e16a1d149d2a3de304bf2058f5a75ddf9027b187761e8

  • SHA512

    6b2e31052eff9aed46be53a3bd98815039cd6cc563e04b527d99ef7324450151641259b82530162b6736983f3f76bae4d3d4c0a7ab99479c3277117d4c132587

  • SSDEEP

    3072:YoSPImZE0KVCLS/Inxt8dk6n8JdVXN2rVNW4pr5SMVORWdhxBUFxO:Y6OtLSgnk8TVXgrVjp5ScOYTUH

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Targets

    • Target

      e4d9db2c0a37eb4a6d9e16a1d149d2a3de304bf2058f5a75ddf9027b187761e8.exe

    • Size

      215KB

    • MD5

      512f1687b938e673c3b8b05e73e9905f

    • SHA1

      07ec16b0df79c000a7f65eafc2861c9f25369a62

    • SHA256

      e4d9db2c0a37eb4a6d9e16a1d149d2a3de304bf2058f5a75ddf9027b187761e8

    • SHA512

      6b2e31052eff9aed46be53a3bd98815039cd6cc563e04b527d99ef7324450151641259b82530162b6736983f3f76bae4d3d4c0a7ab99479c3277117d4c132587

    • SSDEEP

      3072:YoSPImZE0KVCLS/Inxt8dk6n8JdVXN2rVNW4pr5SMVORWdhxBUFxO:Y6OtLSgnk8TVXgrVjp5ScOYTUH

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks