General

  • Target

    b37a57c505e70d01d3b135a7a578652d.exe

  • Size

    1.1MB

  • Sample

    221220-lxskxscd2t

  • MD5

    b37a57c505e70d01d3b135a7a578652d

  • SHA1

    558ff0476094928488e2104c30f7d51526842f98

  • SHA256

    36cfa0e234d289738ca43878f695c4ed58de0e2db30edb6521d96c881ab14c7f

  • SHA512

    62aa6d56c0dec7b43b9c44e60c68b4e56173e4910828f07e9769b2c19621eb1cc7ae6ef76509e56136622c90cd8b8510b28b4c4d5a528100691a1a279c2b1d9d

  • SSDEEP

    24576:F5G1C2Ade8gBYEwNFZhyAPIRO5zruI+OUgjkL2GBWbFHQI:O1C2omSNFq2+I2ISggL2sIH

Malware Config

Targets

    • Target

      b37a57c505e70d01d3b135a7a578652d.exe

    • Size

      1.1MB

    • MD5

      b37a57c505e70d01d3b135a7a578652d

    • SHA1

      558ff0476094928488e2104c30f7d51526842f98

    • SHA256

      36cfa0e234d289738ca43878f695c4ed58de0e2db30edb6521d96c881ab14c7f

    • SHA512

      62aa6d56c0dec7b43b9c44e60c68b4e56173e4910828f07e9769b2c19621eb1cc7ae6ef76509e56136622c90cd8b8510b28b4c4d5a528100691a1a279c2b1d9d

    • SSDEEP

      24576:F5G1C2Ade8gBYEwNFZhyAPIRO5zruI+OUgjkL2GBWbFHQI:O1C2omSNFq2+I2ISggL2sIH

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks