General

  • Target

    d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac

  • Size

    206KB

  • Sample

    221219-t1cb4sfd98

  • MD5

    697bbbd8c112c48c7ef5429a2e189a47

  • SHA1

    7ca5e93129388771f7df13fd87d66db0e6f37d1d

  • SHA256

    c61a373a25cc312fc92b0ec3fb7d2d0d0f6d7ea0498db4f4c382eadf053323f2

  • SHA512

    477cbd76ac745f64d33ef1f8b83a6dee15472439063eb3ea3baa7d49853d25d033e918cac6772b465a6f8ec1544b91acd7bfa23982b5df298035cbac9c6286ab

  • SSDEEP

    3072:T1eK2F/szRcjUOp01Ph5FvI99rZ0N66SraY6GxvVT7BZgsoxADLMXaXr:Tsh0Rjbjq9rZ0NCHvVTUvxMr

Malware Config

Targets

    • Target

      d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac

    • Size

      311KB

    • MD5

      ff8b0ef6c574e5f6f1fa4c4eb75c637d

    • SHA1

      3263f6595d1329cea9348b34a9857a98998a33c6

    • SHA256

      d75b501a09398280bf6e9250ac56763182136b4980d86e43c93d0ad8fa9981ac

    • SHA512

      9c2d049aaf278d86db69256dd312cf34d1d1b6dcabe964b93ab2a29b21f9045bceaaf809b46c92e6c4f5d5f27befda9692712fc23c4d45de2bef147c98708ff4

    • SSDEEP

      6144:zjB1L2OqdTTq9rZ0NCKg4bBYqH4rWlRjO1n:zPHqdTuduLlarW9u

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks