General

  • Target

    186efc26ace999808724cecc29182a6a348c0c4de8e18cbd40041dae2221ea77.a3x

  • Size

    4.3MB

  • Sample

    241204-ypeqbatqcm

  • MD5

    08c6a7bcd8945856dfcc5bf247049586

  • SHA1

    ada4b5594a44eba87d3afc23f182f452ba0dc7c9

  • SHA256

    186efc26ace999808724cecc29182a6a348c0c4de8e18cbd40041dae2221ea77

  • SHA512

    9089fa2655390bfe335a654743c718bc743a10ce042874c09e9093b6eab706c6a756a9b977c9f49874637f5ca99a112fc893dfcd9ab4582f9a5304a8a86de148

  • SSDEEP

    98304:iwAdbxY2G3T5moaWIlyhe2UwB9W4WlTAXZRolhmwmxIXjuSA:IdFRINmoUyhd5BwvTAXZRolhmwmxIXj2

Malware Config

Extracted

Family

danabot

C2

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • type

    loader

Targets

    • Target

      186efc26ace999808724cecc29182a6a348c0c4de8e18cbd40041dae2221ea77.a3x

    • Size

      4.3MB

    • MD5

      08c6a7bcd8945856dfcc5bf247049586

    • SHA1

      ada4b5594a44eba87d3afc23f182f452ba0dc7c9

    • SHA256

      186efc26ace999808724cecc29182a6a348c0c4de8e18cbd40041dae2221ea77

    • SHA512

      9089fa2655390bfe335a654743c718bc743a10ce042874c09e9093b6eab706c6a756a9b977c9f49874637f5ca99a112fc893dfcd9ab4582f9a5304a8a86de148

    • SSDEEP

      98304:iwAdbxY2G3T5moaWIlyhe2UwB9W4WlTAXZRolhmwmxIXjuSA:IdFRINmoUyhd5BwvTAXZRolhmwmxIXj2

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot family

    • A potential corporate email address has been identified in the URL: [email protected]

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks