General

  • Target

    36962dbe21b03b6b13e7a6e607f908eb54c0fa8d511d3d522fcb31322c938007

  • Size

    204KB

  • Sample

    221219-vmpkysaf2x

  • MD5

    2c5372d943ff6468d07537c13e6a5e5a

  • SHA1

    84ff2dff916915793dc4c5b6f7975eed0132026e

  • SHA256

    f5a5e36a899f791fc1b32b50e2f6753ef2e00eab0bfbcc2e544cbed2b190e2c6

  • SHA512

    bba41d0e27930ecd59cdb136798bf6861e0e6bce4ed9d460d08082d93c734f4ef70ab8d91b0b29165d4921b5a12ed9e3a59bd281a0494de5b175d3b5f832f528

  • SSDEEP

    6144:46z2COoEoMDPc7K+/eWOGkLcobPHaxzLnMSwBOf6KD:Rz2RvRDPGKXbBoobP6FMSwBOV

Malware Config

Targets

    • Target

      36962dbe21b03b6b13e7a6e607f908eb54c0fa8d511d3d522fcb31322c938007

    • Size

      310KB

    • MD5

      c6d5caf032d4435e71637bd333f174fb

    • SHA1

      1971852a4bedd32ac3a74d7a9600dcb369e71cce

    • SHA256

      36962dbe21b03b6b13e7a6e607f908eb54c0fa8d511d3d522fcb31322c938007

    • SHA512

      7a7176c80ade6000dbb7a4b94cb11f229b360ea8adab69d829cf24541d5f364e9f6143a697f1c839336da98261f9a038aacc4c463b90d67bb2fba56158d8144e

    • SSDEEP

      6144:+gxRLtYltAaD+/eWOGkLc3zJJaRH4rWlRjO1n:+qRpYlt5DXbBotJayrW9u

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks