General

  • Target

    57d4d742672d0b1a350de9a156f806404a137fe73c32363df3976a5205cade21

  • Size

    1.1MB

  • Sample

    221219-qyp9eaab7x

  • MD5

    076f3ebdf25ab73e33b760c7171db59a

  • SHA1

    76ec6960e35a5b4adb6886479355c9a93bddcc00

  • SHA256

    57d4d742672d0b1a350de9a156f806404a137fe73c32363df3976a5205cade21

  • SHA512

    8e40439ec3331b877b81ee3daf15bc647cdb00092e7d50bd5df47f322d200ea1e6e3e3d8cb3951c9d8d253ae8e56de0102f98f330a29d4ba950739feb7dddba5

  • SSDEEP

    24576:4OFFu0weNWrOmuiRPMRf5EM0w8jwJyKfs9YL0hPrUNhEh8W9:4Rde0OpiRkRfGdjRYIhPQI8W9

Malware Config

Targets

    • Target

      57d4d742672d0b1a350de9a156f806404a137fe73c32363df3976a5205cade21

    • Size

      1.1MB

    • MD5

      076f3ebdf25ab73e33b760c7171db59a

    • SHA1

      76ec6960e35a5b4adb6886479355c9a93bddcc00

    • SHA256

      57d4d742672d0b1a350de9a156f806404a137fe73c32363df3976a5205cade21

    • SHA512

      8e40439ec3331b877b81ee3daf15bc647cdb00092e7d50bd5df47f322d200ea1e6e3e3d8cb3951c9d8d253ae8e56de0102f98f330a29d4ba950739feb7dddba5

    • SSDEEP

      24576:4OFFu0weNWrOmuiRPMRf5EM0w8jwJyKfs9YL0hPrUNhEh8W9:4Rde0OpiRkRfGdjRYIhPQI8W9

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks