General

  • Target

    2f08de61aae3a2c7b34bfa21e4bd138d9ec818ba1ba3b531b8ea1fa13e7625da

  • Size

    216KB

  • Sample

    221220-xd65raaf76

  • MD5

    2df3c5eee27ffa84116b3d4cbe2a8362

  • SHA1

    407d21ac10a6e9a3355106f69251e987628a8257

  • SHA256

    2f08de61aae3a2c7b34bfa21e4bd138d9ec818ba1ba3b531b8ea1fa13e7625da

  • SHA512

    7d2e9ac61b85a1b8b01310323070483290a1a5bc8c9be6d30d4058e9db2c2d3bca21998ed4d961f7b97a009784f5c4d7f3b10d4bc84873210a6ca8cc31ebe491

  • SSDEEP

    3072:v7DhL7HoV5Ea+4+F1voPBN6RRM327/Z8ATMpU2PZShVeX7b/DP4aENHCDml:jdLT9T1v0NoM3O/ZmpU0ZyVevLP6Ca

Malware Config

Targets

    • Target

      2f08de61aae3a2c7b34bfa21e4bd138d9ec818ba1ba3b531b8ea1fa13e7625da

    • Size

      216KB

    • MD5

      2df3c5eee27ffa84116b3d4cbe2a8362

    • SHA1

      407d21ac10a6e9a3355106f69251e987628a8257

    • SHA256

      2f08de61aae3a2c7b34bfa21e4bd138d9ec818ba1ba3b531b8ea1fa13e7625da

    • SHA512

      7d2e9ac61b85a1b8b01310323070483290a1a5bc8c9be6d30d4058e9db2c2d3bca21998ed4d961f7b97a009784f5c4d7f3b10d4bc84873210a6ca8cc31ebe491

    • SSDEEP

      3072:v7DhL7HoV5Ea+4+F1voPBN6RRM327/Z8ATMpU2PZShVeX7b/DP4aENHCDml:jdLT9T1v0NoM3O/ZmpU0ZyVevLP6Ca

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks