General

  • Target

    1addd16c4c3a5faaf16a1fff892d6a01d9cc5820b680d0958023cccc0eac304c

  • Size

    255KB

  • Sample

    221025-s7h8kadba8

  • MD5

    ea62511ffc140ad81f6ad4519bb68d9d

  • SHA1

    c59a03bb252dd358c405781a7dacbebe5cd166d3

  • SHA256

    1addd16c4c3a5faaf16a1fff892d6a01d9cc5820b680d0958023cccc0eac304c

  • SHA512

    d8c1b21ef4816ecd377b379e9d82e270097127ee284412390c615935896f03b797b641177c4ac9944e6c5d5f01ea49ed899054846d4d18927ec267e098027604

  • SSDEEP

    3072:NXVc3ffKbL2SSy1Q+fPA84RWz9ruWENQVUtGKFRWpmw:Ji3CLEkQ+fPA83zzYQVU0KzWpN

Malware Config

Extracted

Family

danabot

Attributes
  • embedded_hash

    569235DCA8F16ED8310BBACCB674F896

  • type

    loader

Extracted

Family

vidar

Version

55.2

Botnet

937

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    937

Targets

    • Target

      1addd16c4c3a5faaf16a1fff892d6a01d9cc5820b680d0958023cccc0eac304c

    • Size

      255KB

    • MD5

      ea62511ffc140ad81f6ad4519bb68d9d

    • SHA1

      c59a03bb252dd358c405781a7dacbebe5cd166d3

    • SHA256

      1addd16c4c3a5faaf16a1fff892d6a01d9cc5820b680d0958023cccc0eac304c

    • SHA512

      d8c1b21ef4816ecd377b379e9d82e270097127ee284412390c615935896f03b797b641177c4ac9944e6c5d5f01ea49ed899054846d4d18927ec267e098027604

    • SSDEEP

      3072:NXVc3ffKbL2SSy1Q+fPA84RWz9ruWENQVUtGKFRWpmw:Ji3CLEkQ+fPA83zzYQVU0KzWpN

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Tasks