General
-
Target
wallpaper (1).jpg
-
Size
28KB
-
Sample
240508-vfxmzsgf96
-
MD5
bdd8868b21390b0f69a5a0dc956a492e
-
SHA1
c1aab129d3c0f73a143fbbce40de80b12cc4a003
-
SHA256
4165a8ea1f11af46b2ac475c41bce70b498007c31e366707c81c8890afdd77e4
-
SHA512
865347cc8637c1282aa737c1012ee05ddd2e50b255b75191f0179f7b28ee04e2fe00320b51f8cb5a9e3de640528531726a296f0b30b16b828451e7d42864362e
-
SSDEEP
384:glIaWtdyGKa+GorT05y/KVNC1+YwcPPmAJyyZsw4575Dwf9fsdYHl5Bp1GlT7EHj:kInd52yCPPPm97mFkmLp1m7ED
Static task
static1
Behavioral task
behavioral1
Sample
wallpaper (1).jpg
Resource
win7-20240419-en
Malware Config
Extracted
danabot
51.178.195.151
51.222.39.81
149.255.35.125
38.68.50.179
51.77.7.204
Targets
-
-
Target
wallpaper (1).jpg
-
Size
28KB
-
MD5
bdd8868b21390b0f69a5a0dc956a492e
-
SHA1
c1aab129d3c0f73a143fbbce40de80b12cc4a003
-
SHA256
4165a8ea1f11af46b2ac475c41bce70b498007c31e366707c81c8890afdd77e4
-
SHA512
865347cc8637c1282aa737c1012ee05ddd2e50b255b75191f0179f7b28ee04e2fe00320b51f8cb5a9e3de640528531726a296f0b30b16b828451e7d42864362e
-
SSDEEP
384:glIaWtdyGKa+GorT05y/KVNC1+YwcPPmAJyyZsw4575Dwf9fsdYHl5Bp1GlT7EHj:kInd52yCPPPm97mFkmLp1m7ED
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RevengeRat Executable
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers new Windows logon scripts automatically executed at logon.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Boot or Logon Initialization Scripts
1Logon Script (Windows)
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Boot or Logon Initialization Scripts
1Logon Script (Windows)
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
3Scripting
1