General

  • Target

    0375df4950a841114b927ab0b52a9e237dd61565988233b96de7589be79465d5

  • Size

    1.1MB

  • Sample

    221220-13b8fsbb85

  • MD5

    aa2c4aeb51a56f83a696fdada3056a4e

  • SHA1

    38b9c00bb231b8fbed2661cfbff61bacee81f7a8

  • SHA256

    0375df4950a841114b927ab0b52a9e237dd61565988233b96de7589be79465d5

  • SHA512

    bef5121f9f944a3b70ad80007a2bc9edb841eb69ee33ffa4ff41b6873217869b98f0be475c5ef215937ffa731c483a045a9be4a595cf364cdd7ef176fb3ceb2a

  • SSDEEP

    24576:YVOLo9vAjkR9Jj7p9Y2FyQeyTloIJIZxSmIuu+NI/nNInr:YICojkvJ3RT/32fI/Cnr

Malware Config

Targets

    • Target

      0375df4950a841114b927ab0b52a9e237dd61565988233b96de7589be79465d5

    • Size

      1.1MB

    • MD5

      aa2c4aeb51a56f83a696fdada3056a4e

    • SHA1

      38b9c00bb231b8fbed2661cfbff61bacee81f7a8

    • SHA256

      0375df4950a841114b927ab0b52a9e237dd61565988233b96de7589be79465d5

    • SHA512

      bef5121f9f944a3b70ad80007a2bc9edb841eb69ee33ffa4ff41b6873217869b98f0be475c5ef215937ffa731c483a045a9be4a595cf364cdd7ef176fb3ceb2a

    • SSDEEP

      24576:YVOLo9vAjkR9Jj7p9Y2FyQeyTloIJIZxSmIuu+NI/nNInr:YICojkvJ3RT/32fI/Cnr

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks