General

  • Target

    d4fe627b0bc66a57bfdb76c531c06ce6.exe

  • Size

    1.1MB

  • Sample

    221219-l3ydcshg9x

  • MD5

    d4fe627b0bc66a57bfdb76c531c06ce6

  • SHA1

    1a9ff0a579460a2e90266ebbfbad127514a74e7a

  • SHA256

    9292bc6aec169cc1f3f223470669c6307f1d3e61687544c0a228846c1cf0df97

  • SHA512

    bea169646b86ca0659efe0989856d58098efcc70d8b8953045635ddd7d4293aed656771d8d0a1e5e4e87a4f272b8e6b69f4eeacd7d7f7220d5b6e50535aa2617

  • SSDEEP

    24576:4MsPdMWW1GIdBCSGZtT/EHr0HUqcBfcvGjZzK6r:XngtAHr0HU7cu9zKM

Malware Config

Targets

    • Target

      d4fe627b0bc66a57bfdb76c531c06ce6.exe

    • Size

      1.1MB

    • MD5

      d4fe627b0bc66a57bfdb76c531c06ce6

    • SHA1

      1a9ff0a579460a2e90266ebbfbad127514a74e7a

    • SHA256

      9292bc6aec169cc1f3f223470669c6307f1d3e61687544c0a228846c1cf0df97

    • SHA512

      bea169646b86ca0659efe0989856d58098efcc70d8b8953045635ddd7d4293aed656771d8d0a1e5e4e87a4f272b8e6b69f4eeacd7d7f7220d5b6e50535aa2617

    • SSDEEP

      24576:4MsPdMWW1GIdBCSGZtT/EHr0HUqcBfcvGjZzK6r:XngtAHr0HU7cu9zKM

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks