Resubmissions

04-03-2024 07:39

240304-jg8k4aeb56 10

04-03-2024 07:33

240304-jd2ndada41 10

04-03-2024 07:16

240304-h3sw4acf8v 10

General

  • Target

    YE.jpg

  • Size

    1.9MB

  • Sample

    240304-jd2ndada41

  • MD5

    db00d76d920d8d9e1a01a0d278d64f0f

  • SHA1

    321535469be98ff53be76621c10027ab0d14bc15

  • SHA256

    806fb0b10366bb1923a9d4e4545ab76d589a1848eb758c978bc349ca86b22c54

  • SHA512

    86950248bed2ad1199d9ded6f74318fe86ee52af99b420dff9101839c9757f816b7629b251fcd867078082a3db48deeb8a1925b2ef73dd0ebae646bac4a62676

  • SSDEEP

    49152:pzMD+O974EJW3DyQFXC2p1WuO9WYFNmPR4X50IepawQWAs:pzMDXCiQXFhytNwc50pawQG

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://erpoweredent.at/3/zte.dll

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Targets

    • Target

      YE.jpg

    • Size

      1.9MB

    • MD5

      db00d76d920d8d9e1a01a0d278d64f0f

    • SHA1

      321535469be98ff53be76621c10027ab0d14bc15

    • SHA256

      806fb0b10366bb1923a9d4e4545ab76d589a1848eb758c978bc349ca86b22c54

    • SHA512

      86950248bed2ad1199d9ded6f74318fe86ee52af99b420dff9101839c9757f816b7629b251fcd867078082a3db48deeb8a1925b2ef73dd0ebae646bac4a62676

    • SSDEEP

      49152:pzMD+O974EJW3DyQFXC2p1WuO9WYFNmPR4X50IepawQWAs:pzMDXCiQXFhytNwc50pawQG

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks