General

  • Target

    dfef29259364341a9475d0d5008fc3700a76e4aa57e529c823e47a8349318c41

  • Size

    1.1MB

  • Sample

    221220-rwx2xaaa54

  • MD5

    c2c8c8b30c7424edb560260d88765b78

  • SHA1

    5dfe2e9f27884922bacac628c8a160c2b4aef57a

  • SHA256

    dfef29259364341a9475d0d5008fc3700a76e4aa57e529c823e47a8349318c41

  • SHA512

    a6700c62ecc52ac93486c7160ae03b9b7b3f81b0fef7f8330d3b8171cbb8a49c7deb6b7f893dd3b648951b61263d50462ac443c200ce224230d5b5e3600a952e

  • SSDEEP

    24576:YJRACgLoI1NKdK1EPT4p0S/uICN5a7NGMPhwJPN/1amk8rs:dCgLoI/iAIS/uYZZwhamF

Malware Config

Targets

    • Target

      dfef29259364341a9475d0d5008fc3700a76e4aa57e529c823e47a8349318c41

    • Size

      1.1MB

    • MD5

      c2c8c8b30c7424edb560260d88765b78

    • SHA1

      5dfe2e9f27884922bacac628c8a160c2b4aef57a

    • SHA256

      dfef29259364341a9475d0d5008fc3700a76e4aa57e529c823e47a8349318c41

    • SHA512

      a6700c62ecc52ac93486c7160ae03b9b7b3f81b0fef7f8330d3b8171cbb8a49c7deb6b7f893dd3b648951b61263d50462ac443c200ce224230d5b5e3600a952e

    • SSDEEP

      24576:YJRACgLoI1NKdK1EPT4p0S/uICN5a7NGMPhwJPN/1amk8rs:dCgLoI/iAIS/uYZZwhamF

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks