Analysis

  • max time kernel
    204s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 20:30

General

  • Target

    032c92718337d1071e3e95daac92c4e4.dll

  • Size

    1.4MB

  • MD5

    032c92718337d1071e3e95daac92c4e4

  • SHA1

    44efa024618bbf10ac6ccd4dbd2a14a3bf22fee5

  • SHA256

    5f24bfbea3a3c8babe23db472dc1f31910d9f4ecb362867a6ea1848f0f467c1c

  • SHA512

    d166dfec51b5db403b067f973ea686f69617bff9774cbe85a71f945f7285841907c8b9ce692ae80a35f4e0d8306df9a8364581ce6a58cd0f6ab4b52fbede524e

  • SSDEEP

    24576:YxlVtq2A7bquAuEIJQeQLQy3ke5s4rss/iKXpPetx3T1dISeQI4UdwAh:YxvtOTAxPLzr/iswj1qSA

Score
10/10

Malware Config

Extracted

Family

danabot

Botnet

11

C2

164.90.206.160:443

13.53.138.59:443

68.183.95.230:443

Attributes
  • embedded_hash

    2501517960E51AB60E0F53A71826CB28

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 13 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\032c92718337d1071e3e95daac92c4e4.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\032c92718337d1071e3e95daac92c4e4.dll
      2⤵
        PID:5060

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5060-0-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-1-0x00000000006F0000-0x00000000006F1000-memory.dmp
      Filesize

      4KB

    • memory/5060-2-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-3-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-4-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-5-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-6-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-7-0x00000000006F0000-0x00000000006F1000-memory.dmp
      Filesize

      4KB

    • memory/5060-8-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-9-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-10-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-11-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-12-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-13-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-14-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB

    • memory/5060-15-0x0000000010000000-0x0000000010170000-memory.dmp
      Filesize

      1.4MB