General

  • Target

    2eef0e11d2a80a59af4884cf4596936f64ffe04385c81d691f642f6a5f12518e

  • Size

    220KB

  • Sample

    221221-ben5nsee41

  • MD5

    1b3296feebd7acbb95209850fe0240a0

  • SHA1

    f9c3aa88204b11032c5befab17ea3af0ba4b5ec4

  • SHA256

    2eef0e11d2a80a59af4884cf4596936f64ffe04385c81d691f642f6a5f12518e

  • SHA512

    0e79d43822842362a3203a8e39f96736da787fe38aa1907ab885f5c362d6cdb828cba8f3274ffdb042eacf020af671e0c5fd61e74e7d42de576d59e195233ecc

  • SSDEEP

    3072:cELVLUN1156byKcxTvjjpkSLcjYCxMsehlV7b/99RONHCDml:55LUNkbEvXpkSLc0gMseh7F9yCa

Malware Config

Targets

    • Target

      2eef0e11d2a80a59af4884cf4596936f64ffe04385c81d691f642f6a5f12518e

    • Size

      220KB

    • MD5

      1b3296feebd7acbb95209850fe0240a0

    • SHA1

      f9c3aa88204b11032c5befab17ea3af0ba4b5ec4

    • SHA256

      2eef0e11d2a80a59af4884cf4596936f64ffe04385c81d691f642f6a5f12518e

    • SHA512

      0e79d43822842362a3203a8e39f96736da787fe38aa1907ab885f5c362d6cdb828cba8f3274ffdb042eacf020af671e0c5fd61e74e7d42de576d59e195233ecc

    • SSDEEP

      3072:cELVLUN1156byKcxTvjjpkSLcjYCxMsehlV7b/99RONHCDml:55LUNkbEvXpkSLc0gMseh7F9yCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks