General

  • Target

    fccea4f3d6ebae2f1c65af24a68585e8170c3a0e60cfbb0a639f02345c1a3098

  • Size

    217KB

  • Sample

    221018-bmm8caebel

  • MD5

    f771ba77542c6f19cade962fb4543ab6

  • SHA1

    2f8844c1d368bce620a2761b35288498f51bc95e

  • SHA256

    fccea4f3d6ebae2f1c65af24a68585e8170c3a0e60cfbb0a639f02345c1a3098

  • SHA512

    9dfcfe72a5c43ad395b290c04dce71f4b8a27a2cd1bd24b01d5fd5923f5b2dc02702f964b081113a0bc1d9b236340e161f0adc16f947a0968bc9e6ea835ed4fd

  • SSDEEP

    3072:h/EphVY6tjOSazEGm7cgiL7VG6naXkFALxFIPD4Xu0wtabJM9wVTjuJ+EjaL:hMps6xGmQnL7A6nW1aPDWBJM9wVTbr

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Targets

    • Target

      fccea4f3d6ebae2f1c65af24a68585e8170c3a0e60cfbb0a639f02345c1a3098

    • Size

      217KB

    • MD5

      f771ba77542c6f19cade962fb4543ab6

    • SHA1

      2f8844c1d368bce620a2761b35288498f51bc95e

    • SHA256

      fccea4f3d6ebae2f1c65af24a68585e8170c3a0e60cfbb0a639f02345c1a3098

    • SHA512

      9dfcfe72a5c43ad395b290c04dce71f4b8a27a2cd1bd24b01d5fd5923f5b2dc02702f964b081113a0bc1d9b236340e161f0adc16f947a0968bc9e6ea835ed4fd

    • SSDEEP

      3072:h/EphVY6tjOSazEGm7cgiL7VG6naXkFALxFIPD4Xu0wtabJM9wVTjuJ+EjaL:hMps6xGmQnL7A6nW1aPDWBJM9wVTbr

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks