General

  • Target

    89c0a751facb90a840b384987b7b823a24c85db3150b5cd18d513173f65c649e

  • Size

    311KB

  • Sample

    221219-qyhjkaab7w

  • MD5

    994cba1dd7bf6a44edbe7511570b2cc8

  • SHA1

    ac0e2b8d764ffd29fd54d38a49a40dfc17e9d853

  • SHA256

    89c0a751facb90a840b384987b7b823a24c85db3150b5cd18d513173f65c649e

  • SHA512

    fb46540438f686e8e73725040d7557f235869da9b700132bcbebac1be2432bcb2065b5cb4e604cb1ce304770f623046ceea3670787d573a9720941f16998ebc9

  • SSDEEP

    3072:MKwsk/ULB4dK7SCByDX2pSshod3XNiDnVRMtlsU7TxoDH4rOPHFRuUrIb6u8qn13:ss1LB/ON23oJXNisllxoDH4rWlRjO1n

Malware Config

Targets

    • Target

      89c0a751facb90a840b384987b7b823a24c85db3150b5cd18d513173f65c649e

    • Size

      311KB

    • MD5

      994cba1dd7bf6a44edbe7511570b2cc8

    • SHA1

      ac0e2b8d764ffd29fd54d38a49a40dfc17e9d853

    • SHA256

      89c0a751facb90a840b384987b7b823a24c85db3150b5cd18d513173f65c649e

    • SHA512

      fb46540438f686e8e73725040d7557f235869da9b700132bcbebac1be2432bcb2065b5cb4e604cb1ce304770f623046ceea3670787d573a9720941f16998ebc9

    • SSDEEP

      3072:MKwsk/ULB4dK7SCByDX2pSshod3XNiDnVRMtlsU7TxoDH4rOPHFRuUrIb6u8qn13:ss1LB/ON23oJXNisllxoDH4rWlRjO1n

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks