General

  • Target

    file.exe

  • Size

    214KB

  • Sample

    221220-r8qhladc4x

  • MD5

    9ac92f2a0c65c0ef8577af9f7ce31bf5

  • SHA1

    1a00e61a3b11d82ccfa26fdcc297bcec9c04da46

  • SHA256

    a2a56847c92e2742c52820dd151144878df54d947725c737e94332857b88c581

  • SHA512

    e5594fdd7aae6dec4d92a16fe47e53068427c4af711321f18bca8d9d756544dce9598b010a8435a9074c95efab974f5a41e7d2c48f5debe4913b88eaab22d3dc

  • SSDEEP

    3072:NALLoo7R3C/pSGzGoJTrfOUL7PWz7b/tFdwpKWRNHCDml:aLoxhBTrfOWDWjLdwpKkCa

Malware Config

Targets

    • Target

      file.exe

    • Size

      214KB

    • MD5

      9ac92f2a0c65c0ef8577af9f7ce31bf5

    • SHA1

      1a00e61a3b11d82ccfa26fdcc297bcec9c04da46

    • SHA256

      a2a56847c92e2742c52820dd151144878df54d947725c737e94332857b88c581

    • SHA512

      e5594fdd7aae6dec4d92a16fe47e53068427c4af711321f18bca8d9d756544dce9598b010a8435a9074c95efab974f5a41e7d2c48f5debe4913b88eaab22d3dc

    • SSDEEP

      3072:NALLoo7R3C/pSGzGoJTrfOUL7PWz7b/tFdwpKWRNHCDml:aLoxhBTrfOWDWjLdwpKkCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks