General
-
Target
deploy.ps1
-
Size
8KB
-
Sample
250119-l3h9fatqbk
-
MD5
8204fecf61d58baa25cea9e97c894bc3
-
SHA1
bedf0300880e5f5cdd1643abdff6789ee50db35a
-
SHA256
0e284d3446eef106b1557f50bbe83bbeda4557476bb88b89fcc01195db83d4b1
-
SHA512
adc06b854f77734396fefcbc1c319efdb00f30c694a836ce721f5b91364533c410d40c5a07ef68d83d5e5e17c31b074009bc2a2b8823d0c1fd5eb7fbc73c43ea
-
SSDEEP
96:LmbW8Mf47p7qCgr2CpXlwHZt3pXl4Cj+r1osIPjiTYSKYWrrG8cDd:Lmb4f47VHG2tt4osQe4Yg8J
Static task
static1
Behavioral task
behavioral1
Sample
deploy.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deploy.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://gitlab.com/pnp30/svn/-/raw/main/deps.zip
Extracted
danabot
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
type
loader
Targets
-
-
Target
deploy.ps1
-
Size
8KB
-
MD5
8204fecf61d58baa25cea9e97c894bc3
-
SHA1
bedf0300880e5f5cdd1643abdff6789ee50db35a
-
SHA256
0e284d3446eef106b1557f50bbe83bbeda4557476bb88b89fcc01195db83d4b1
-
SHA512
adc06b854f77734396fefcbc1c319efdb00f30c694a836ce721f5b91364533c410d40c5a07ef68d83d5e5e17c31b074009bc2a2b8823d0c1fd5eb7fbc73c43ea
-
SSDEEP
96:LmbW8Mf47p7qCgr2CpXlwHZt3pXl4Cj+r1osIPjiTYSKYWrrG8cDd:Lmb4f47VHG2tt4osQe4Yg8J
-
Danabot family
-
Blocklisted process makes network request
-
Download via BitsAdmin
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1