General

  • Target

    1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140

  • Size

    383KB

  • Sample

    221209-r3125sdd57

  • MD5

    cda12bd3ffaf1eee175eeb7e895b644c

  • SHA1

    1f230a3603601471ca4698a3a75b60f18b8b933b

  • SHA256

    1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140

  • SHA512

    190a75649a83bb3a3b315e60d9faebaa04f9fb95a8c389463c51880811c8338f0cc750acac86df045c4da703b3f8a513dd57e81f9d61bdb55d0260f4721f5010

  • SSDEEP

    6144:dfQtL8XSUkX85ZtyClapquB1xqY9xA1hh6K9W9B1gkyded89kTR:dfKgXSlMjtyoapqKDqo8IK9W9B1fzaw

Malware Config

Targets

    • Target

      1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140

    • Size

      383KB

    • MD5

      cda12bd3ffaf1eee175eeb7e895b644c

    • SHA1

      1f230a3603601471ca4698a3a75b60f18b8b933b

    • SHA256

      1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140

    • SHA512

      190a75649a83bb3a3b315e60d9faebaa04f9fb95a8c389463c51880811c8338f0cc750acac86df045c4da703b3f8a513dd57e81f9d61bdb55d0260f4721f5010

    • SSDEEP

      6144:dfQtL8XSUkX85ZtyClapquB1xqY9xA1hh6K9W9B1gkyded89kTR:dfKgXSlMjtyoapqKDqo8IK9W9B1fzaw

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks