General

  • Target

    b911d8dc00380696ca821a1ef90a5aede46ddc20ee7e459e4edc8583108ad34e

  • Size

    243KB

  • Sample

    221025-m2rd4acddr

  • MD5

    e8b18e3aa941a9eccdd8a2b2f86b611c

  • SHA1

    41a186b412a0f796baae314a4479890453fc46d1

  • SHA256

    b911d8dc00380696ca821a1ef90a5aede46ddc20ee7e459e4edc8583108ad34e

  • SHA512

    a7cbe8fcd2874784ac967a251830a2335e4b32eebf48686477c9655f6387652672e0aed7c351fbdf06d8ced10a59186be0b5bc5581df943f2a73141654aa3ee1

  • SSDEEP

    3072:/XrbPdMLPg6lVKmdX5Ov6VNJ8z/4I30Vjn89r1e9kqdcNC7E1p3Koah4M7WMpij:vndMLnKmerw+1MG6cdWmPI2

Malware Config

Extracted

Family

danabot

C2

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    569235DCA8F16ED8310BBACCB674F896

  • type

    loader

Extracted

Family

vidar

Version

55.2

Botnet

937

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    937

Targets

    • Target

      b911d8dc00380696ca821a1ef90a5aede46ddc20ee7e459e4edc8583108ad34e

    • Size

      243KB

    • MD5

      e8b18e3aa941a9eccdd8a2b2f86b611c

    • SHA1

      41a186b412a0f796baae314a4479890453fc46d1

    • SHA256

      b911d8dc00380696ca821a1ef90a5aede46ddc20ee7e459e4edc8583108ad34e

    • SHA512

      a7cbe8fcd2874784ac967a251830a2335e4b32eebf48686477c9655f6387652672e0aed7c351fbdf06d8ced10a59186be0b5bc5581df943f2a73141654aa3ee1

    • SSDEEP

      3072:/XrbPdMLPg6lVKmdX5Ov6VNJ8z/4I30Vjn89r1e9kqdcNC7E1p3Koah4M7WMpij:vndMLnKmerw+1MG6cdWmPI2

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Tasks