General

  • Target

    a1a43bced8befc305406d985748df07d8ee0cfeb1d76a271ec4f5499ea6423fc

  • Size

    205KB

  • Sample

    221219-t4rwzafe27

  • MD5

    dd259c87767f8bfc21c68af2e44af485

  • SHA1

    28c68a3c925b94fe7ad073857f1dcde089e2f881

  • SHA256

    e47e8b9220ac03ebbde8ac54a581da80039ac4c010bc089d0536b4aa9b9ccf07

  • SHA512

    1f21f1756280fd8920a8983d5d21dc36e63e54c01dcf5722d4d245a9559162dfe5487371ea18381966735c064e652160b82072100edbc65fc61bd0ec908eb4e7

  • SSDEEP

    6144:UE2bocMzWoZzdTQfxPPlS9LP/MBipj9FyAoz9KWhvQS/w:bmaz3DQfxHs9LXkYxFyAoz4WhIS/w

Malware Config

Targets

    • Target

      a1a43bced8befc305406d985748df07d8ee0cfeb1d76a271ec4f5499ea6423fc

    • Size

      311KB

    • MD5

      382f445fa18126435bbd631d6720bf88

    • SHA1

      4d714a4c71e87dddaea89f8ada74f9feb2e83a6d

    • SHA256

      a1a43bced8befc305406d985748df07d8ee0cfeb1d76a271ec4f5499ea6423fc

    • SHA512

      abf5c104c74aa27f3dab57971820d97a9c25f765e20e273433dafaa1b4a447cd4f781b1f47a6af8c0350c29cf05fe918b807b2d410ae3b500fe2d2876169f978

    • SSDEEP

      6144:k9R3L2Hj5hkGIFcPlS9LP/M1FxPH4rWlRjO1n:kL8j5hkGIF0s9LXmxArW9u

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks