General

  • Target

    0c2ffbb3fc66c6a22f7895748a1a97284268997d874fbdf033e99b0358e37e9d

  • Size

    268KB

  • Sample

    221027-lgx6gabfg6

  • MD5

    9c8900b6654f3e29b300b5c98e766287

  • SHA1

    88c8d9e9760112f75450d9b7356a12a00a275e21

  • SHA256

    0c2ffbb3fc66c6a22f7895748a1a97284268997d874fbdf033e99b0358e37e9d

  • SHA512

    d15b1c6bdb63ea4dafc65f875bd71f1ee0ed788d606a45482d92bf8d06e674ddf989e17aad5a86400a7ca818cefeb288313939831af9674be0b18e55a8503687

  • SSDEEP

    3072:UXiTm93Q/81BSxMK7lseRU/tiI4i0olaYim3P8Jq3+f2WC+pz81W6FzQoRm0KK:QQm9ouKp81iIFaKP8Jqu+6z0W0r

Malware Config

Extracted

Family

danabot

C2

172.86.120.215:443

213.227.155.103:443

103.187.26.147:443

172.86.120.138:443

Attributes
  • embedded_hash

    BBBB0DB8CB7E6D152424535822E445A7

  • type

    loader

Extracted

Family

systembc

C2

45.182.189.231:443

Targets

    • Target

      0c2ffbb3fc66c6a22f7895748a1a97284268997d874fbdf033e99b0358e37e9d

    • Size

      268KB

    • MD5

      9c8900b6654f3e29b300b5c98e766287

    • SHA1

      88c8d9e9760112f75450d9b7356a12a00a275e21

    • SHA256

      0c2ffbb3fc66c6a22f7895748a1a97284268997d874fbdf033e99b0358e37e9d

    • SHA512

      d15b1c6bdb63ea4dafc65f875bd71f1ee0ed788d606a45482d92bf8d06e674ddf989e17aad5a86400a7ca818cefeb288313939831af9674be0b18e55a8503687

    • SSDEEP

      3072:UXiTm93Q/81BSxMK7lseRU/tiI4i0olaYim3P8Jq3+f2WC+pz81W6FzQoRm0KK:QQm9ouKp81iIFaKP8Jqu+6z0W0r

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks