General

  • Target

    file.exe

  • Size

    310KB

  • Sample

    221219-rgqdhsfb84

  • MD5

    f14580f740879c9230c6279de9884f5f

  • SHA1

    34bbebb5cde36964e902c0aba70c971f207efa05

  • SHA256

    f99d35d14e88e96a1aeb242b4d7aae7f187a43e6b986e3ce55826e0c3c840d72

  • SHA512

    f73ce4acabdc3f761d54c6b77dd088b435ee0de35a6b6de2aab625c2aada603c358ee78a8c82144b5b975aec45cf4f68d93a9430568f12dc2a919a3a88a35dfc

  • SSDEEP

    6144:H5zL35k5l27GmrryI0p5lGa0H4rWlRjO1n:HBj5k5QqmKnrlGaXrW9u

Malware Config

Targets

    • Target

      file.exe

    • Size

      310KB

    • MD5

      f14580f740879c9230c6279de9884f5f

    • SHA1

      34bbebb5cde36964e902c0aba70c971f207efa05

    • SHA256

      f99d35d14e88e96a1aeb242b4d7aae7f187a43e6b986e3ce55826e0c3c840d72

    • SHA512

      f73ce4acabdc3f761d54c6b77dd088b435ee0de35a6b6de2aab625c2aada603c358ee78a8c82144b5b975aec45cf4f68d93a9430568f12dc2a919a3a88a35dfc

    • SSDEEP

      6144:H5zL35k5l27GmrryI0p5lGa0H4rWlRjO1n:HBj5k5QqmKnrlGaXrW9u

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks