General

  • Target

    393b1c22fbd0d7b17d059365da39cc641f33bc0fb23c2ae1b296938945ed9962

  • Size

    305KB

  • Sample

    221219-y2vbjabb5y

  • MD5

    6bfc17a28aa01afc3c7cb24f0154220a

  • SHA1

    c69bafa22ca6ec3b8f68bc30fa41e9c07e0b7ed4

  • SHA256

    393b1c22fbd0d7b17d059365da39cc641f33bc0fb23c2ae1b296938945ed9962

  • SHA512

    000dad200e390812e7ed44811701ad31bd4ef831278807f8576e9f5a136d0eeacd591889204158f8502d4faccf96ffa5eff3c511358cfc625f34a93fe21c7cbf

  • SSDEEP

    6144:ILefDAuyxoFK7wFCiEAJdNBOyBU63QZImQKG0:IqDAJx2GXAhMsQZW

Malware Config

Targets

    • Target

      393b1c22fbd0d7b17d059365da39cc641f33bc0fb23c2ae1b296938945ed9962

    • Size

      305KB

    • MD5

      6bfc17a28aa01afc3c7cb24f0154220a

    • SHA1

      c69bafa22ca6ec3b8f68bc30fa41e9c07e0b7ed4

    • SHA256

      393b1c22fbd0d7b17d059365da39cc641f33bc0fb23c2ae1b296938945ed9962

    • SHA512

      000dad200e390812e7ed44811701ad31bd4ef831278807f8576e9f5a136d0eeacd591889204158f8502d4faccf96ffa5eff3c511358cfc625f34a93fe21c7cbf

    • SSDEEP

      6144:ILefDAuyxoFK7wFCiEAJdNBOyBU63QZImQKG0:IqDAJx2GXAhMsQZW

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks