General

  • Target

    4edf038c49138517002ecc7e8e76b92f68ba97a6c5c665a3b1eddf9bdd79bb96

  • Size

    220KB

  • Sample

    221024-3l24nabac2

  • MD5

    3ede64ae017beb5eba84727455e0a62d

  • SHA1

    15f5284852c54f4c82785f4720b435d0aadb0b6b

  • SHA256

    4edf038c49138517002ecc7e8e76b92f68ba97a6c5c665a3b1eddf9bdd79bb96

  • SHA512

    4254755afbcb84473288cf1c97d44c9ced993919cbbeac0feaae3486303b4c1746a1861a0ad944d39382bc06d6e8ea9f284c56b250bbd580c0219d0e32fbaa7a

  • SSDEEP

    3072:9vn/5dmETMMQyOLeewL6s5nmK1vBmW+T+IM863ilNkGhD5Jo/hnT:9v/Cd9LqLmam+t3QTtoJn

Malware Config

Extracted

Family

danabot

Attributes
  • embedded_hash

    569235DCA8F16ED8310BBACCB674F896

  • type

    loader

Extracted

Family

vidar

Version

55.2

Botnet

937

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    937

Targets

    • Target

      4edf038c49138517002ecc7e8e76b92f68ba97a6c5c665a3b1eddf9bdd79bb96

    • Size

      220KB

    • MD5

      3ede64ae017beb5eba84727455e0a62d

    • SHA1

      15f5284852c54f4c82785f4720b435d0aadb0b6b

    • SHA256

      4edf038c49138517002ecc7e8e76b92f68ba97a6c5c665a3b1eddf9bdd79bb96

    • SHA512

      4254755afbcb84473288cf1c97d44c9ced993919cbbeac0feaae3486303b4c1746a1861a0ad944d39382bc06d6e8ea9f284c56b250bbd580c0219d0e32fbaa7a

    • SSDEEP

      3072:9vn/5dmETMMQyOLeewL6s5nmK1vBmW+T+IM863ilNkGhD5Jo/hnT:9v/Cd9LqLmam+t3QTtoJn

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Tasks