General

  • Target

    b3a1633cf2b87e4084d7c61a92a36c8c5fca4c926a7eed0916653712618033b1

  • Size

    1.1MB

  • Sample

    221219-ydrkqsfh62

  • MD5

    0632c99ab43231f1f8b7c7f6bc8e30d8

  • SHA1

    ea284fc244536dd7f1ef4990879a554cd1375671

  • SHA256

    b3a1633cf2b87e4084d7c61a92a36c8c5fca4c926a7eed0916653712618033b1

  • SHA512

    56dc4e12f80d175901acf8be0d3fa9512ce581774caaa6593a49b1369219022ebfa098e1ba47930f7619174f7afa4b0155bcac4d83162841b40899458cd1c643

  • SSDEEP

    24576:hqWuDPN+TiDuI5YjWNLsWU+ZeUCzhaaaQpGwFP:Ici0jaLelVEnQpxFP

Malware Config

Targets

    • Target

      b3a1633cf2b87e4084d7c61a92a36c8c5fca4c926a7eed0916653712618033b1

    • Size

      1.1MB

    • MD5

      0632c99ab43231f1f8b7c7f6bc8e30d8

    • SHA1

      ea284fc244536dd7f1ef4990879a554cd1375671

    • SHA256

      b3a1633cf2b87e4084d7c61a92a36c8c5fca4c926a7eed0916653712618033b1

    • SHA512

      56dc4e12f80d175901acf8be0d3fa9512ce581774caaa6593a49b1369219022ebfa098e1ba47930f7619174f7afa4b0155bcac4d83162841b40899458cd1c643

    • SSDEEP

      24576:hqWuDPN+TiDuI5YjWNLsWU+ZeUCzhaaaQpGwFP:Ici0jaLelVEnQpxFP

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks