General

  • Target

    96b638420a725c8f6f02e8e3195fd8ef5698c28ce6032cb55e377027c5095c27

  • Size

    220KB

  • Sample

    221221-hmbb4sbg69

  • MD5

    afdb8706762df1a5b0ea28c272931e08

  • SHA1

    706712d5a9780aeca9a054bb0e1e5e6f5975aba7

  • SHA256

    96b638420a725c8f6f02e8e3195fd8ef5698c28ce6032cb55e377027c5095c27

  • SHA512

    b7a15b52e4cab219e31007dce7139a97265c9a706b66f815049a3d7a777d2ad1a34c6e83f0ddac02456f15a338dc7cd3408dddbe433fed928f3d6fabb92a205d

  • SSDEEP

    3072:qpqFpLpqwt154VDl3sUuBFrK+wWOjO621wLV7b/lFikrNHCDml:fHLpqwWN27VKhWOi1whtF7Ca

Malware Config

Targets

    • Target

      96b638420a725c8f6f02e8e3195fd8ef5698c28ce6032cb55e377027c5095c27

    • Size

      220KB

    • MD5

      afdb8706762df1a5b0ea28c272931e08

    • SHA1

      706712d5a9780aeca9a054bb0e1e5e6f5975aba7

    • SHA256

      96b638420a725c8f6f02e8e3195fd8ef5698c28ce6032cb55e377027c5095c27

    • SHA512

      b7a15b52e4cab219e31007dce7139a97265c9a706b66f815049a3d7a777d2ad1a34c6e83f0ddac02456f15a338dc7cd3408dddbe433fed928f3d6fabb92a205d

    • SSDEEP

      3072:qpqFpLpqwt154VDl3sUuBFrK+wWOjO621wLV7b/lFikrNHCDml:fHLpqwWN27VKhWOi1whtF7Ca

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks