General

  • Target

    file.exe

  • Size

    214KB

  • Sample

    221220-3g5zraed7t

  • MD5

    168f9418034bd4ed5728657910737ff4

  • SHA1

    7511894928184597bfb51851f5e74a43cfd240c9

  • SHA256

    b8f9bcf94da3070b449eb9965aaa953ddf57e84f299a0b4f3c3e565cfb0a9827

  • SHA512

    3c647d08bd4c38e3877074003ac770d114d84d30ea551100700c2f8db7c233871e817d4d7b6e1c2e1352a6e6271cb7d3b850cd2da0904644cd2365ae79e94f8c

  • SSDEEP

    3072:GXlg1LFkzHV5RZDHsjsEr3vglr0uVFyTZEhBoPQW67b/ASU3NHCDml:4KLFkXDHhELEFyT4GRqYZ9Ca

Malware Config

Targets

    • Target

      file.exe

    • Size

      214KB

    • MD5

      168f9418034bd4ed5728657910737ff4

    • SHA1

      7511894928184597bfb51851f5e74a43cfd240c9

    • SHA256

      b8f9bcf94da3070b449eb9965aaa953ddf57e84f299a0b4f3c3e565cfb0a9827

    • SHA512

      3c647d08bd4c38e3877074003ac770d114d84d30ea551100700c2f8db7c233871e817d4d7b6e1c2e1352a6e6271cb7d3b850cd2da0904644cd2365ae79e94f8c

    • SSDEEP

      3072:GXlg1LFkzHV5RZDHsjsEr3vglr0uVFyTZEhBoPQW67b/ASU3NHCDml:4KLFkXDHhELEFyT4GRqYZ9Ca

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks