General

  • Target

    d4010f789559c6c981ab6d80854e9576

  • Size

    5.7MB

  • Sample

    240318-t69vkadc85

  • MD5

    d4010f789559c6c981ab6d80854e9576

  • SHA1

    598209c8242bba79d090feb16a80c1326a5617aa

  • SHA256

    10eb11561e10d9c483b9acee032cdcfb5ee6218901de951029ddb740b5a99784

  • SHA512

    438f238feed48a3bab69ca918ed249e6b7e18e558855fa53283f81097754f350e6f448008d3d1a7d1710319b44fba6a2bbf6019664d09a7bc97ba915d559f0e5

  • SSDEEP

    98304:Of6tnZpeMrxxvx714CQQC5KShg5CrW7x6oAiSwD9xde38LB+:BZpeMNxp71xQNoIqoyD9xdg8LB+

Malware Config

Extracted

Family

danabot

Version

1827

Botnet

3

C2

23.106.123.249:443

23.106.123.141:443

23.254.225.170:443

134.119.186.216:443

Attributes
  • embedded_hash

    AEF96B4D339B580ABB737F203C2D0F52

  • type

    main

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      d4010f789559c6c981ab6d80854e9576

    • Size

      5.7MB

    • MD5

      d4010f789559c6c981ab6d80854e9576

    • SHA1

      598209c8242bba79d090feb16a80c1326a5617aa

    • SHA256

      10eb11561e10d9c483b9acee032cdcfb5ee6218901de951029ddb740b5a99784

    • SHA512

      438f238feed48a3bab69ca918ed249e6b7e18e558855fa53283f81097754f350e6f448008d3d1a7d1710319b44fba6a2bbf6019664d09a7bc97ba915d559f0e5

    • SSDEEP

      98304:Of6tnZpeMrxxvx714CQQC5KShg5CrW7x6oAiSwD9xde38LB+:BZpeMNxp71xQNoIqoyD9xdg8LB+

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks