General

  • Target

    d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac

  • Size

    311KB

  • Sample

    221219-rpayssac5z

  • MD5

    ff8b0ef6c574e5f6f1fa4c4eb75c637d

  • SHA1

    3263f6595d1329cea9348b34a9857a98998a33c6

  • SHA256

    d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac

  • SHA512

    9c2d049aaf278d86db69256dd312cf34d1d1b6dcabe964b93ab2a29b21f9045bceaaf809b46c92e6c4f5d5f27befda9692712fc23c4d45de2bef147c98708ff4

  • SSDEEP

    6144:zjB1L2OqdTTq9rZ0NCKg4bBYqH4rWlRjO1n:zPHqdTuduLlarW9u

Malware Config

Targets

    • Target

      d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac

    • Size

      311KB

    • MD5

      ff8b0ef6c574e5f6f1fa4c4eb75c637d

    • SHA1

      3263f6595d1329cea9348b34a9857a98998a33c6

    • SHA256

      d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac

    • SHA512

      9c2d049aaf278d86db69256dd312cf34d1d1b6dcabe964b93ab2a29b21f9045bceaaf809b46c92e6c4f5d5f27befda9692712fc23c4d45de2bef147c98708ff4

    • SSDEEP

      6144:zjB1L2OqdTTq9rZ0NCKg4bBYqH4rWlRjO1n:zPHqdTuduLlarW9u

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks