General

  • Target

    15a1e183ccac3134e1a70006bd007874523a0c152a39a0384675461683029c65

  • Size

    311KB

  • Sample

    221219-rdpb2sfb73

  • MD5

    367a5816fc549b3e9cfa01e6b3655c8e

  • SHA1

    d0575587e3e5f527ec584673d64c0c4ba7723e86

  • SHA256

    15a1e183ccac3134e1a70006bd007874523a0c152a39a0384675461683029c65

  • SHA512

    4d8be307b655a0ba75a1f6557ec77b889ceec0d8fc2668e7516cf2df855193a1a3c6caa2d6bf0ba62a05bf6042684de596c4597f48dc95a229b38f35656870c9

  • SSDEEP

    3072:V5dwDTULu5dkSuOByDDbetYcjg4WmxNqnKPpUnqEObBrYNkwH4rOPHFRuUrIb6ub:twD4Luk5dbUVxNqqnbgzH4rWlRjO1n

Malware Config

Targets

    • Target

      15a1e183ccac3134e1a70006bd007874523a0c152a39a0384675461683029c65

    • Size

      311KB

    • MD5

      367a5816fc549b3e9cfa01e6b3655c8e

    • SHA1

      d0575587e3e5f527ec584673d64c0c4ba7723e86

    • SHA256

      15a1e183ccac3134e1a70006bd007874523a0c152a39a0384675461683029c65

    • SHA512

      4d8be307b655a0ba75a1f6557ec77b889ceec0d8fc2668e7516cf2df855193a1a3c6caa2d6bf0ba62a05bf6042684de596c4597f48dc95a229b38f35656870c9

    • SSDEEP

      3072:V5dwDTULu5dkSuOByDDbetYcjg4WmxNqnKPpUnqEObBrYNkwH4rOPHFRuUrIb6ub:twD4Luk5dbUVxNqqnbgzH4rWlRjO1n

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks