Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 06:19

General

  • Target

    2c8fc7cfebf05ab52955db21e2807256543ffd0bf672f61e47ee42f2e7d670deN.dll

  • Size

    1.9MB

  • MD5

    20a58094055840a032989729b247a550

  • SHA1

    fe18635b3dbc0fd3de4d64b17ea6e2b1091f516f

  • SHA256

    2c8fc7cfebf05ab52955db21e2807256543ffd0bf672f61e47ee42f2e7d670de

  • SHA512

    5af5409a7a5b8e90b3a7faa9a673d625547763113ebfcf3dfea5020c7107810d2278a0ab3c6117fd4cbab815813e68cd270706294090b74ed7a6229294ad7c6c

  • SSDEEP

    49152:6QU1aLhQhG5NUAgoOa8nBc0SmmdWwMLwktw4B/ekqfn8+nFFQCxEsJwKQN:6faNQh+NUABO/c0Y9Adokqf8+gqJW

Malware Config

Extracted

Family

danabot

Botnet

40

C2

185.117.90.36:443

193.42.36.59:443

193.56.146.53:443

185.106.123.228:443

Attributes
  • embedded_hash

    07284E2A3AB3C2E1FFFBD425849BE150

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 2 IoCs
  • Danabot family
  • Blocklisted process makes network request 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2c8fc7cfebf05ab52955db21e2807256543ffd0bf672f61e47ee42f2e7d670deN.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2c8fc7cfebf05ab52955db21e2807256543ffd0bf672f61e47ee42f2e7d670deN.dll,#1
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:4392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4392-0-0x00000000022E0000-0x00000000024D4000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-2-0x00000000022E0000-0x00000000024D4000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-3-0x00000000024B5000-0x00000000024BB000-memory.dmp

    Filesize

    24KB

  • memory/4392-4-0x00000000022E0000-0x00000000024D4000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-5-0x00000000022E0000-0x00000000024D4000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-9-0x00000000022E0000-0x00000000024D4000-memory.dmp

    Filesize

    2.0MB