General

  • Target

    52a4ac130352fd65ad0f411799d74abe.bin

  • Size

    1005KB

  • Sample

    221220-am6h9agd77

  • MD5

    52a4ac130352fd65ad0f411799d74abe

  • SHA1

    bb2d4993fc3cf1b110e81a68a26c606f71c10c3e

  • SHA256

    1880b1a25e05835f30fb291b7871e594a85aec146c659ee32b8ab4f950635a4f

  • SHA512

    2115c912a44b6e881558c6c593bf480882bdcddadb7401a1cea0841946f848865992287429eaf4d2950fb1f2753b903a5e58cafb9c5b7b06e909def98673bfbf

  • SSDEEP

    24576:CYzxn6MvPWzlhSOjIi4K4dWRT63gqYbXF:CMxJvSIi4ipX

Malware Config

Targets

    • Target

      52a4ac130352fd65ad0f411799d74abe.bin

    • Size

      1005KB

    • MD5

      52a4ac130352fd65ad0f411799d74abe

    • SHA1

      bb2d4993fc3cf1b110e81a68a26c606f71c10c3e

    • SHA256

      1880b1a25e05835f30fb291b7871e594a85aec146c659ee32b8ab4f950635a4f

    • SHA512

      2115c912a44b6e881558c6c593bf480882bdcddadb7401a1cea0841946f848865992287429eaf4d2950fb1f2753b903a5e58cafb9c5b7b06e909def98673bfbf

    • SSDEEP

      24576:CYzxn6MvPWzlhSOjIi4K4dWRT63gqYbXF:CMxJvSIi4ipX

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks