General

  • Target

    d00026dde6dabd602275dc27d67b0796009cc8daa7a560829299abc327e9d744

  • Size

    2.4MB

  • Sample

    221218-pb241sbh38

  • MD5

    457815e2d7d4312d942a90f08ae31b46

  • SHA1

    ead9852021f47092aed31847a6c5d0f1bd196c99

  • SHA256

    d00026dde6dabd602275dc27d67b0796009cc8daa7a560829299abc327e9d744

  • SHA512

    255ab3b524b60935d2a89b743f641e9ab4b15eb392445294de78bbda3723adfdec9d5b65be75ee6914069a2e3451908caf6cf1ad2583c71110d9c2075518fde7

  • SSDEEP

    49152:WVstoKaS3xQLNKb9fPNvTVURjDmgH/yAt32CiwGjJfW5P:gsfh3xQLyT+JnH6At32Cildfi

Malware Config

Extracted

Family

danabot

C2

23.236.181.126:443

123.253.35.251:443

66.85.173.3:443

Attributes
  • embedded_hash

    8F56CD73F6B5CD5D7B17B0BA61E70A82

  • type

    loader

Targets

    • Target

      d00026dde6dabd602275dc27d67b0796009cc8daa7a560829299abc327e9d744

    • Size

      2.4MB

    • MD5

      457815e2d7d4312d942a90f08ae31b46

    • SHA1

      ead9852021f47092aed31847a6c5d0f1bd196c99

    • SHA256

      d00026dde6dabd602275dc27d67b0796009cc8daa7a560829299abc327e9d744

    • SHA512

      255ab3b524b60935d2a89b743f641e9ab4b15eb392445294de78bbda3723adfdec9d5b65be75ee6914069a2e3451908caf6cf1ad2583c71110d9c2075518fde7

    • SSDEEP

      49152:WVstoKaS3xQLNKb9fPNvTVURjDmgH/yAt32CiwGjJfW5P:gsfh3xQLyT+JnH6At32Cildfi

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks