General

  • Target

    file.exe

  • Size

    215KB

  • Sample

    221220-t2jgtaac94

  • MD5

    112e838468228d577926f084a7950a04

  • SHA1

    f502734b1274fd8f2044d09f1312ab5641901552

  • SHA256

    20b5fb49c28e86e3fe71b9d15b37dae3a41f49b19a5a5e556a87d375232b15e6

  • SHA512

    30e7b865322ef9c62f05b63cfd68e29ec402acb6e49c731fbadad4055c6de1760418430870c9cc47cd8377cd90f0028ccea430f3481a93954fdfcdd7489b762b

  • SSDEEP

    3072:acqRLCjezN5Q6pZB74PvuG7b/pnUk5NHCDml:pmLCjEB0jxUGCa

Malware Config

Targets

    • Target

      file.exe

    • Size

      215KB

    • MD5

      112e838468228d577926f084a7950a04

    • SHA1

      f502734b1274fd8f2044d09f1312ab5641901552

    • SHA256

      20b5fb49c28e86e3fe71b9d15b37dae3a41f49b19a5a5e556a87d375232b15e6

    • SHA512

      30e7b865322ef9c62f05b63cfd68e29ec402acb6e49c731fbadad4055c6de1760418430870c9cc47cd8377cd90f0028ccea430f3481a93954fdfcdd7489b762b

    • SSDEEP

      3072:acqRLCjezN5Q6pZB74PvuG7b/pnUk5NHCDml:pmLCjEB0jxUGCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks