General

  • Target

    6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3

  • Size

    194KB

  • Sample

    221020-ra56dsgfg7

  • MD5

    e966693dd5e4a21d86078d6f4299a564

  • SHA1

    31e6d5c7b9a1d4d178c219d078c70241449d8b9a

  • SHA256

    6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3

  • SHA512

    9ac0f8a6092aade07ed68e267910f9f637c13dddde8b080ca8f0cd344e14b0f0c49ea39cd66a4c0f19c43828c0b5700348054ee6139c639d21590012e2c8de6d

  • SSDEEP

    3072:3XO53oLPT8sP5lHI3w4f5C1QxkQRC62J7Fpma0KRBiSfK:nW3oLrjDOC1QrRC62Z0IBx

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Extracted

Family

systembc

C2

45.182.189.231:443

Targets

    • Target

      6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3

    • Size

      194KB

    • MD5

      e966693dd5e4a21d86078d6f4299a564

    • SHA1

      31e6d5c7b9a1d4d178c219d078c70241449d8b9a

    • SHA256

      6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3

    • SHA512

      9ac0f8a6092aade07ed68e267910f9f637c13dddde8b080ca8f0cd344e14b0f0c49ea39cd66a4c0f19c43828c0b5700348054ee6139c639d21590012e2c8de6d

    • SSDEEP

      3072:3XO53oLPT8sP5lHI3w4f5C1QxkQRC62J7Fpma0KRBiSfK:nW3oLrjDOC1QrRC62Z0IBx

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks