General

  • Target

    0ab2ff1dd74db5573f8fb5653bf9278698f98b4b9bfb8a9b6207fa7b876ea339

  • Size

    240KB

  • Sample

    221220-tnydtadd4x

  • MD5

    5131d1f852996c05688e24ab683decaf

  • SHA1

    081263a58c85d8ecbcf959569fdbdc113c870c1f

  • SHA256

    0ab2ff1dd74db5573f8fb5653bf9278698f98b4b9bfb8a9b6207fa7b876ea339

  • SHA512

    dbaf5b340f33da77a817d9a9728a844fde5d1345f59a76cfc5bb54c72e33ecec4282d92c93e6fd62d047af0b974d7d44b7480599e9c8d91a3b16117b20b40aa2

  • SSDEEP

    3072:iXRfpUSLD+IFLR5uiAbUDAFFBVEuXHYNA07b/TUf9cnMU5hpYNHCDml:ihDLD+IFmieAKl3YKcrTF5hpSCa

Malware Config

Targets

    • Target

      0ab2ff1dd74db5573f8fb5653bf9278698f98b4b9bfb8a9b6207fa7b876ea339

    • Size

      240KB

    • MD5

      5131d1f852996c05688e24ab683decaf

    • SHA1

      081263a58c85d8ecbcf959569fdbdc113c870c1f

    • SHA256

      0ab2ff1dd74db5573f8fb5653bf9278698f98b4b9bfb8a9b6207fa7b876ea339

    • SHA512

      dbaf5b340f33da77a817d9a9728a844fde5d1345f59a76cfc5bb54c72e33ecec4282d92c93e6fd62d047af0b974d7d44b7480599e9c8d91a3b16117b20b40aa2

    • SSDEEP

      3072:iXRfpUSLD+IFLR5uiAbUDAFFBVEuXHYNA07b/TUf9cnMU5hpYNHCDml:ihDLD+IFmieAKl3YKcrTF5hpSCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks