General

  • Target

    b596fe7648820623b127a3480b32e29dce554070b2ae937bf44aa48cfdfc38cd.exe

  • Size

    187KB

  • Sample

    221027-stx5kaceg7

  • MD5

    1957b86311185b6a9ff469549f344f0e

  • SHA1

    856ad8ec7cb29afb040ed5ab1b636fc63065417b

  • SHA256

    b596fe7648820623b127a3480b32e29dce554070b2ae937bf44aa48cfdfc38cd

  • SHA512

    50ba25f4619a5626fe86ac591ad0b662d4d16aac75d76b593862e53c522cdadf20744c75f1788b8a9b42904393fec6e026781ea84e670ebf4d7c8434c8c7069b

  • SSDEEP

    3072:zSIQysnL0CgXV5eMrvJ14H8krHt35RU4JCDKvyfTDQ54BN3g/Pk44x:UL0XGMF14HDU4EfnQ5c

Malware Config

Extracted

Family

danabot

C2

172.86.120.215:443

213.227.155.103:443

103.187.26.147:443

172.86.120.138:443

Attributes
  • embedded_hash

    BBBB0DB8CB7E6D152424535822E445A7

  • type

    loader

Targets

    • Target

      b596fe7648820623b127a3480b32e29dce554070b2ae937bf44aa48cfdfc38cd.exe

    • Size

      187KB

    • MD5

      1957b86311185b6a9ff469549f344f0e

    • SHA1

      856ad8ec7cb29afb040ed5ab1b636fc63065417b

    • SHA256

      b596fe7648820623b127a3480b32e29dce554070b2ae937bf44aa48cfdfc38cd

    • SHA512

      50ba25f4619a5626fe86ac591ad0b662d4d16aac75d76b593862e53c522cdadf20744c75f1788b8a9b42904393fec6e026781ea84e670ebf4d7c8434c8c7069b

    • SSDEEP

      3072:zSIQysnL0CgXV5eMrvJ14H8krHt35RU4JCDKvyfTDQ54BN3g/Pk44x:UL0XGMF14HDU4EfnQ5c

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks