General

  • Target

    a1a43bced8befc305406d985748df07d8ee0cfeb1d76a271ec4f5499ea6423fc

  • Size

    311KB

  • Sample

    221219-qt86qaab6w

  • MD5

    382f445fa18126435bbd631d6720bf88

  • SHA1

    4d714a4c71e87dddaea89f8ada74f9feb2e83a6d

  • SHA256

    a1a43bced8befc305406d985748df07d8ee0cfeb1d76a271ec4f5499ea6423fc

  • SHA512

    abf5c104c74aa27f3dab57971820d97a9c25f765e20e273433dafaa1b4a447cd4f781b1f47a6af8c0350c29cf05fe918b807b2d410ae3b500fe2d2876169f978

  • SSDEEP

    6144:k9R3L2Hj5hkGIFcPlS9LP/M1FxPH4rWlRjO1n:kL8j5hkGIF0s9LXmxArW9u

Malware Config

Targets

    • Target

      a1a43bced8befc305406d985748df07d8ee0cfeb1d76a271ec4f5499ea6423fc

    • Size

      311KB

    • MD5

      382f445fa18126435bbd631d6720bf88

    • SHA1

      4d714a4c71e87dddaea89f8ada74f9feb2e83a6d

    • SHA256

      a1a43bced8befc305406d985748df07d8ee0cfeb1d76a271ec4f5499ea6423fc

    • SHA512

      abf5c104c74aa27f3dab57971820d97a9c25f765e20e273433dafaa1b4a447cd4f781b1f47a6af8c0350c29cf05fe918b807b2d410ae3b500fe2d2876169f978

    • SSDEEP

      6144:k9R3L2Hj5hkGIFcPlS9LP/M1FxPH4rWlRjO1n:kL8j5hkGIF0s9LXmxArW9u

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks