General

  • Target

    c31618dee7fb1f9d3b5cdc3fd42a8a498695e062404d1a5244c3b09466e912fc

  • Size

    141KB

  • Sample

    221219-zbrcmabb8z

  • MD5

    f86c1c946568de37415aa5143a5f3e3c

  • SHA1

    b0acff246f9b3de7d9781e0484feed8912283e27

  • SHA256

    704f569522892f986810fc81dda198c9e7dc543634229a5c58f8623c74de0bb0

  • SHA512

    db8252e563a0c9e44edf8209400ae9eb6734ce4b31ac1017e1ef69cf41185cc7a7b7091f74e738bb9576f6ce403245d759f791daf21c6d86ff52ba5fbcc8c6a2

  • SSDEEP

    3072:4CjjHg9L2BkKhrroEmOQWl3tABkXiUlnDbDbE2ALt5Ql5ma7D:Zg9St5ZfD3tAHUlD/g+Lm6D

Malware Config

Targets

    • Target

      c31618dee7fb1f9d3b5cdc3fd42a8a498695e062404d1a5244c3b09466e912fc

    • Size

      214KB

    • MD5

      816287b83f2bcba44a103e227868ef1f

    • SHA1

      4a57ff432e2f83bdbdb5c1d880728e02a47262bb

    • SHA256

      c31618dee7fb1f9d3b5cdc3fd42a8a498695e062404d1a5244c3b09466e912fc

    • SHA512

      0235eaf331a51d8dccb1352769eb72545c36ead5ce5b988a279c795dc840cdc25a750b5b15c185df95fd4523bca45ab843a8f0c89baf4d2bad6ad3e0d5d062ea

    • SSDEEP

      3072:IX4oLOH3aR6hPmyakx2fb+Siha+onfhe+aNRAtOba+oN2ZEzjcbImdzmuX:IIoLOHrhPmmx2T+SMinpex0RNjjcbXF

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks