General

  • Target

    15a2fb61538cecd91d79b1e0520e786313149fd99555796f81aa2d559ac0a5bc

  • Size

    2.4MB

  • Sample

    221218-tmha7scg24

  • MD5

    b493001ef6bf98292b0b89900f66f489

  • SHA1

    a11333fc3d44993631089092cbc2a9cfb015bb20

  • SHA256

    15a2fb61538cecd91d79b1e0520e786313149fd99555796f81aa2d559ac0a5bc

  • SHA512

    64b9423246dc01761bea88dd381773cab864c6dabd7c2c17b7b7ffe0c066c78ecbc6eed892f83a5b1efd30cd1036c4cc9b0f5950beef2887d6443688141fb23f

  • SSDEEP

    49152:mcMdEeQrxPGoSMoeYirnUfm8X67MDfL/EV5V4:mU94o3Lng5XKMDDy5V

Malware Config

Extracted

Family

danabot

C2

23.236.181.126:443

123.253.35.251:443

66.85.173.3:443

Attributes
  • embedded_hash

    8F56CD73F6B5CD5D7B17B0BA61E70A82

  • type

    loader

Targets

    • Target

      15a2fb61538cecd91d79b1e0520e786313149fd99555796f81aa2d559ac0a5bc

    • Size

      2.4MB

    • MD5

      b493001ef6bf98292b0b89900f66f489

    • SHA1

      a11333fc3d44993631089092cbc2a9cfb015bb20

    • SHA256

      15a2fb61538cecd91d79b1e0520e786313149fd99555796f81aa2d559ac0a5bc

    • SHA512

      64b9423246dc01761bea88dd381773cab864c6dabd7c2c17b7b7ffe0c066c78ecbc6eed892f83a5b1efd30cd1036c4cc9b0f5950beef2887d6443688141fb23f

    • SSDEEP

      49152:mcMdEeQrxPGoSMoeYirnUfm8X67MDfL/EV5V4:mU94o3Lng5XKMDDy5V

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks