General

  • Target

    F8EAD10CD80934A84D94736726E5F3C2098731DF934E5.exe

  • Size

    214KB

  • Sample

    221024-3bzksaahhq

  • MD5

    844d904358f1104737af49ac21057a8a

  • SHA1

    64c86013126bea19c0ae68d583b5bb749039b49d

  • SHA256

    f8ead10cd80934a84d94736726e5f3c2098731df934e5e0765bfedf1cd153201

  • SHA512

    e23e033812d6cb40ca0562be2996418140eae46eb97d379a675ebad6a0232b3aeb7df0f817825eb60994a06ae812a47c683b1110be0fbd792c591c303a2a0ae1

  • SSDEEP

    3072:MGkikefG32ZvztHTe+tDZnzpPbnbv5C8hZb4/FA001jqsxkgaBChcpZa9uD6VdyX:Ip32Jzl6+tDJpzo8jrzigafwVf

Malware Config

Extracted

Family

danabot

Attributes
  • embedded_hash

    569235DCA8F16ED8310BBACCB674F896

  • type

    loader

Extracted

Family

vidar

Version

55.2

Botnet

937

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    937

Targets

    • Target

      F8EAD10CD80934A84D94736726E5F3C2098731DF934E5.exe

    • Size

      214KB

    • MD5

      844d904358f1104737af49ac21057a8a

    • SHA1

      64c86013126bea19c0ae68d583b5bb749039b49d

    • SHA256

      f8ead10cd80934a84d94736726e5f3c2098731df934e5e0765bfedf1cd153201

    • SHA512

      e23e033812d6cb40ca0562be2996418140eae46eb97d379a675ebad6a0232b3aeb7df0f817825eb60994a06ae812a47c683b1110be0fbd792c591c303a2a0ae1

    • SSDEEP

      3072:MGkikefG32ZvztHTe+tDZnzpPbnbv5C8hZb4/FA001jqsxkgaBChcpZa9uD6VdyX:Ip32Jzl6+tDJpzo8jrzigafwVf

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Tasks