General

  • Target

    3e387a837ea0f8488bc6430c1d47612313f8b244d9a81cfebefa09be25d850d9

  • Size

    5.9MB

  • Sample

    230129-tt369ade59

  • MD5

    167ea8cb30c273667ea31eb0917b25fd

  • SHA1

    cb907c9e9a9011c33c703cd7315c863b234f4500

  • SHA256

    3e387a837ea0f8488bc6430c1d47612313f8b244d9a81cfebefa09be25d850d9

  • SHA512

    2a4a57ac9fac9180dc37b42520535f1318fe148371f9a02036877dbfff6161ee64398ad9a91f318345f37c8638a2d48b06cf121f64a760b03b69ed9f2acb2987

  • SSDEEP

    98304:9Xq/0xl4LDZWv0VpJ7YEe/IzvMMi+vloeNHhMJZ3UpzwqN069ad0/hDKlbgij:Ju0QLVu0JUtIzntoe8JZkGCp40stgi

Malware Config

Extracted

Family

danabot

Version

1765

Botnet

3

C2

192.236.146.203:443

192.3.26.98:443

192.236.162.42:443

192.161.48.5:443

Attributes
  • embedded_hash

    B2585F6479280F48B64C99F950BBF36D

  • type

    main

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      3e387a837ea0f8488bc6430c1d47612313f8b244d9a81cfebefa09be25d850d9

    • Size

      5.9MB

    • MD5

      167ea8cb30c273667ea31eb0917b25fd

    • SHA1

      cb907c9e9a9011c33c703cd7315c863b234f4500

    • SHA256

      3e387a837ea0f8488bc6430c1d47612313f8b244d9a81cfebefa09be25d850d9

    • SHA512

      2a4a57ac9fac9180dc37b42520535f1318fe148371f9a02036877dbfff6161ee64398ad9a91f318345f37c8638a2d48b06cf121f64a760b03b69ed9f2acb2987

    • SSDEEP

      98304:9Xq/0xl4LDZWv0VpJ7YEe/IzvMMi+vloeNHhMJZ3UpzwqN069ad0/hDKlbgij:Ju0QLVu0JUtIzntoe8JZkGCp40stgi

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks