General

  • Target

    85fc00cd373580ff152c181e4ccf12f9bcd2df6a716a0952cbbf8252d6b33486

  • Size

    5.9MB

  • Sample

    240701-ysjhns1ajp

  • MD5

    61f67b134cee1f90ff97aeb9230409d7

  • SHA1

    a0297a19487ef861c36485231920be809a759d13

  • SHA256

    85fc00cd373580ff152c181e4ccf12f9bcd2df6a716a0952cbbf8252d6b33486

  • SHA512

    5c037018731c5e2439a7e2105bf0bfd8fd4a61a93aa1ad26dfbecbd30c67eca62a6c5b5637793a2988ab5533a6fd83f14c80e6b6c419d0085dd77d4a313f87ee

  • SSDEEP

    98304:8GREmNruWZtR7cOjO2ep2X0IbHcgdwZ+KWZegWtvPC3nM5boKeHpGrpoVtm5G:VREQuotR4OjO2O0XM+degWs3nM5bqHpb

Malware Config

Extracted

Family

danabot

Version

1765

Botnet

3

C2

192.3.26.98:443

192.236.146.203:443

142.44.224.16:443

192.161.48.5:443

Attributes
  • embedded_hash

    B2585F6479280F48B64C99F950BBF36D

  • type

    main

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      85fc00cd373580ff152c181e4ccf12f9bcd2df6a716a0952cbbf8252d6b33486

    • Size

      5.9MB

    • MD5

      61f67b134cee1f90ff97aeb9230409d7

    • SHA1

      a0297a19487ef861c36485231920be809a759d13

    • SHA256

      85fc00cd373580ff152c181e4ccf12f9bcd2df6a716a0952cbbf8252d6b33486

    • SHA512

      5c037018731c5e2439a7e2105bf0bfd8fd4a61a93aa1ad26dfbecbd30c67eca62a6c5b5637793a2988ab5533a6fd83f14c80e6b6c419d0085dd77d4a313f87ee

    • SSDEEP

      98304:8GREmNruWZtR7cOjO2ep2X0IbHcgdwZ+KWZegWtvPC3nM5boKeHpGrpoVtm5G:VREQuotR4OjO2O0XM+degWs3nM5bqHpb

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks