General

  • Target

    1de2b42c0729af10d2f0762591e4b4d6c6a2461214b29263799f4234800aa818

  • Size

    215KB

  • Sample

    221220-yt5gjaah69

  • MD5

    74f8cd9fcfd6ce91d2d909d195d5b7e3

  • SHA1

    0f4d1c2fb9359cf196d7c50b7348d79f07d9b100

  • SHA256

    1de2b42c0729af10d2f0762591e4b4d6c6a2461214b29263799f4234800aa818

  • SHA512

    eeaff658ef13cb097d4541978a7af57fbb34ce767897925dc5dcf6420c09571cb9aced3c176d11a860caa6e7484356ea81cf50a9b9d8b8bb2bc9e7e82a961643

  • SSDEEP

    3072:rFtwLvlPTCV57kAwK97s1qFvml2aKTohcWo7b/rXq0NHCDml:hWLvxIGqdn7scWYmGCa

Malware Config

Targets

    • Target

      1de2b42c0729af10d2f0762591e4b4d6c6a2461214b29263799f4234800aa818

    • Size

      215KB

    • MD5

      74f8cd9fcfd6ce91d2d909d195d5b7e3

    • SHA1

      0f4d1c2fb9359cf196d7c50b7348d79f07d9b100

    • SHA256

      1de2b42c0729af10d2f0762591e4b4d6c6a2461214b29263799f4234800aa818

    • SHA512

      eeaff658ef13cb097d4541978a7af57fbb34ce767897925dc5dcf6420c09571cb9aced3c176d11a860caa6e7484356ea81cf50a9b9d8b8bb2bc9e7e82a961643

    • SSDEEP

      3072:rFtwLvlPTCV57kAwK97s1qFvml2aKTohcWo7b/rXq0NHCDml:hWLvxIGqdn7scWYmGCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks