General

  • Target

    efea506aa6c712ac7962165447a333bdab624754e6eb313def41fca4777e84c9

  • Size

    1.3MB

  • Sample

    221027-sqzh8acfdp

  • MD5

    dc66de46dd397c1e800638e1bcf5021d

  • SHA1

    120d14d14478f8d14611d04b5dc2645c7a4d63e7

  • SHA256

    efea506aa6c712ac7962165447a333bdab624754e6eb313def41fca4777e84c9

  • SHA512

    ff2710cf22f3daaf2ab575a0d2bab995d8f3383d9f3f12e36c6c398c1d9a5c8faf4d5ad084d636e4f86388ce4275a2c926af603dcd0f3b9425b6bf9d7aa45217

  • SSDEEP

    24576:a9NtRjf+f3mBI/mPU37QO4AdxmUq2omqBoI+0l7lI2U9HoP:a9NffKOI/fxhomCrxW2kIP

Score
10/10

Malware Config

Extracted

Family

danabot

C2

172.86.120.215:443

213.227.155.103:443

103.187.26.147:443

172.86.120.138:443

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    BBBB0DB8CB7E6D152424535822E445A7

  • type

    loader

Targets

    • Target

      efea506aa6c712ac7962165447a333bdab624754e6eb313def41fca4777e84c9

    • Size

      1.3MB

    • MD5

      dc66de46dd397c1e800638e1bcf5021d

    • SHA1

      120d14d14478f8d14611d04b5dc2645c7a4d63e7

    • SHA256

      efea506aa6c712ac7962165447a333bdab624754e6eb313def41fca4777e84c9

    • SHA512

      ff2710cf22f3daaf2ab575a0d2bab995d8f3383d9f3f12e36c6c398c1d9a5c8faf4d5ad084d636e4f86388ce4275a2c926af603dcd0f3b9425b6bf9d7aa45217

    • SSDEEP

      24576:a9NtRjf+f3mBI/mPU37QO4AdxmUq2omqBoI+0l7lI2U9HoP:a9NffKOI/fxhomCrxW2kIP

    Score
    10/10
    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

Tasks