General

  • Target

    4162582a729874d7ae84b69bb265fcc1a26ef2635de322bc60c18db397f20912

  • Size

    1.1MB

  • Sample

    221220-mjzmracd8s

  • MD5

    be1369ec379e0ec8dd84be3d5a26ac00

  • SHA1

    ee6832ff5c366b22291778d8c314f0d4ec6b1225

  • SHA256

    4162582a729874d7ae84b69bb265fcc1a26ef2635de322bc60c18db397f20912

  • SHA512

    4b1546ac4017772a97d5c16be5be988ce31f64161a4df2ed39d4fcab6590616f8268f8cc3d193a9b50c0ebecf7505a445554a5897dd5ff29f1eda6437194b171

  • SSDEEP

    24576:TuVphQcMt0PVCry56Ck+ghSeqNXT2v1fxOdmpCWYLkur4+g:TCpTBsNCMfZ1fgdZwX

Malware Config

Targets

    • Target

      4162582a729874d7ae84b69bb265fcc1a26ef2635de322bc60c18db397f20912

    • Size

      1.1MB

    • MD5

      be1369ec379e0ec8dd84be3d5a26ac00

    • SHA1

      ee6832ff5c366b22291778d8c314f0d4ec6b1225

    • SHA256

      4162582a729874d7ae84b69bb265fcc1a26ef2635de322bc60c18db397f20912

    • SHA512

      4b1546ac4017772a97d5c16be5be988ce31f64161a4df2ed39d4fcab6590616f8268f8cc3d193a9b50c0ebecf7505a445554a5897dd5ff29f1eda6437194b171

    • SSDEEP

      24576:TuVphQcMt0PVCry56Ck+ghSeqNXT2v1fxOdmpCWYLkur4+g:TCpTBsNCMfZ1fgdZwX

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

2
T1114

Tasks