General

  • Target

    395b5e4af742a9f0c076a9284ec1055534db8b73c2f366baeb3704f66be2630e

  • Size

    213KB

  • Sample

    221217-2zf8nsch3y

  • MD5

    48015076b53a1d6da69aca715ea8c3b5

  • SHA1

    5f9c3c6923d55169647bb4e12f03b7beb758c305

  • SHA256

    395b5e4af742a9f0c076a9284ec1055534db8b73c2f366baeb3704f66be2630e

  • SHA512

    c08408068a6ed0b6d0c46de928e03ba507d97fccfbd4dcbf15966bbed075708f3caf37332056f750022ddbbe6943571ac56aa30d07e6338a7dd296c019920d06

  • SSDEEP

    3072:85/R6huLlodxZwR185iIxROnVL3M2+QCz8/g3xoylk1obG3ERWR3Le:m/R+uLlobE8UUYjM2Hg3CylUU0V6

Malware Config

Extracted

Family

danabot

C2

23.236.181.126:443

123.253.35.251:443

66.85.173.3:443

Attributes
  • embedded_hash

    8F56CD73F6B5CD5D7B17B0BA61E70A82

  • type

    loader

Targets

    • Target

      395b5e4af742a9f0c076a9284ec1055534db8b73c2f366baeb3704f66be2630e

    • Size

      213KB

    • MD5

      48015076b53a1d6da69aca715ea8c3b5

    • SHA1

      5f9c3c6923d55169647bb4e12f03b7beb758c305

    • SHA256

      395b5e4af742a9f0c076a9284ec1055534db8b73c2f366baeb3704f66be2630e

    • SHA512

      c08408068a6ed0b6d0c46de928e03ba507d97fccfbd4dcbf15966bbed075708f3caf37332056f750022ddbbe6943571ac56aa30d07e6338a7dd296c019920d06

    • SSDEEP

      3072:85/R6huLlodxZwR185iIxROnVL3M2+QCz8/g3xoylk1obG3ERWR3Le:m/R+uLlobE8UUYjM2Hg3CylUU0V6

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks