General

  • Target

    f82079c0756f06680dd0da0618a472eee85039919822ae1d546978c0fe6b430c

  • Size

    1.1MB

  • Sample

    221219-v8yezsfe92

  • MD5

    09820e3c483fdefb775e97e64055c183

  • SHA1

    23d1de77e96c1b267b960384c7e10fcfdeb78e87

  • SHA256

    f82079c0756f06680dd0da0618a472eee85039919822ae1d546978c0fe6b430c

  • SHA512

    f71c1110ff85f00601916ce1f5f7c76c8317c901b3ea17eaf2d002f008207e5b30dce9a23c96a085403a5f4d84489d0532d26708bce985158b74edc0a9867fa3

  • SSDEEP

    24576:ot09dV2QV1my1LY/q6dixoxFhVJRPDN5Ed2Zw9KUK8J0OfhwFP:P2lC6dixoxr9PDNOmkK8gFP

Malware Config

Targets

    • Target

      f82079c0756f06680dd0da0618a472eee85039919822ae1d546978c0fe6b430c

    • Size

      1.1MB

    • MD5

      09820e3c483fdefb775e97e64055c183

    • SHA1

      23d1de77e96c1b267b960384c7e10fcfdeb78e87

    • SHA256

      f82079c0756f06680dd0da0618a472eee85039919822ae1d546978c0fe6b430c

    • SHA512

      f71c1110ff85f00601916ce1f5f7c76c8317c901b3ea17eaf2d002f008207e5b30dce9a23c96a085403a5f4d84489d0532d26708bce985158b74edc0a9867fa3

    • SSDEEP

      24576:ot09dV2QV1my1LY/q6dixoxFhVJRPDN5Ed2Zw9KUK8J0OfhwFP:P2lC6dixoxr9PDNOmkK8gFP

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks