General

  • Target

    tmp

  • Size

    1.1MB

  • Sample

    221220-pffftacf2w

  • MD5

    be1369ec379e0ec8dd84be3d5a26ac00

  • SHA1

    ee6832ff5c366b22291778d8c314f0d4ec6b1225

  • SHA256

    4162582a729874d7ae84b69bb265fcc1a26ef2635de322bc60c18db397f20912

  • SHA512

    4b1546ac4017772a97d5c16be5be988ce31f64161a4df2ed39d4fcab6590616f8268f8cc3d193a9b50c0ebecf7505a445554a5897dd5ff29f1eda6437194b171

  • SSDEEP

    24576:TuVphQcMt0PVCry56Ck+ghSeqNXT2v1fxOdmpCWYLkur4+g:TCpTBsNCMfZ1fgdZwX

Malware Config

Targets

    • Target

      tmp

    • Size

      1.1MB

    • MD5

      be1369ec379e0ec8dd84be3d5a26ac00

    • SHA1

      ee6832ff5c366b22291778d8c314f0d4ec6b1225

    • SHA256

      4162582a729874d7ae84b69bb265fcc1a26ef2635de322bc60c18db397f20912

    • SHA512

      4b1546ac4017772a97d5c16be5be988ce31f64161a4df2ed39d4fcab6590616f8268f8cc3d193a9b50c0ebecf7505a445554a5897dd5ff29f1eda6437194b171

    • SSDEEP

      24576:TuVphQcMt0PVCry56Ck+ghSeqNXT2v1fxOdmpCWYLkur4+g:TCpTBsNCMfZ1fgdZwX

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks