General

  • Target

    c2b5409cb10d0489b261f73e77d11364efcb183db3ec1d3343ce84d4695058e6

  • Size

    240KB

  • Sample

    221220-szqbxaab98

  • MD5

    04448f21f8abc98dd75a2c1195b1fcb2

  • SHA1

    94672eb3cba64b80cebbbf79e765ee8aad9ba23b

  • SHA256

    c2b5409cb10d0489b261f73e77d11364efcb183db3ec1d3343ce84d4695058e6

  • SHA512

    48ae793a7873e0cc115a82a83a1491478de8c9fd151aaa558c5fcf14d80e2c76e189c5580e0c685c5b48fcae4302c7191df89f3af6c7a6579a1c781c065a2962

  • SSDEEP

    3072:KXJNKp8Lo9A623R5DfbEzoHkT7EaGVGfnkN6ya7b/BlqNHCDml:q+qLCA624YkTwfVG/kmJWCa

Malware Config

Targets

    • Target

      c2b5409cb10d0489b261f73e77d11364efcb183db3ec1d3343ce84d4695058e6

    • Size

      240KB

    • MD5

      04448f21f8abc98dd75a2c1195b1fcb2

    • SHA1

      94672eb3cba64b80cebbbf79e765ee8aad9ba23b

    • SHA256

      c2b5409cb10d0489b261f73e77d11364efcb183db3ec1d3343ce84d4695058e6

    • SHA512

      48ae793a7873e0cc115a82a83a1491478de8c9fd151aaa558c5fcf14d80e2c76e189c5580e0c685c5b48fcae4302c7191df89f3af6c7a6579a1c781c065a2962

    • SSDEEP

      3072:KXJNKp8Lo9A623R5DfbEzoHkT7EaGVGfnkN6ya7b/BlqNHCDml:q+qLCA624YkTwfVG/kmJWCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks