General
-
Target
Crypt B.dll
-
Size
5.5MB
-
Sample
250318-pngc3ssxc1
-
MD5
a3287c38bc4dc6621238f79c995f661f
-
SHA1
05855c33f623c5de17c501ae023cd2e64c47c406
-
SHA256
c17ee2b10cc91939b12592628b9cb79136c1fab261abc5ec19396ae50e0156c0
-
SHA512
28b31da397bc8f8be23fb67281b4f31377abcbad8baeef2a78b71b990b651f29777618e2e46abace9a84284825c461f90c54662a4776669ae25c3dfe35955401
-
SSDEEP
98304:qFprUM3pWeTtU1zs3QPzpltsGFc4uz0bsAWopU/:qFp9tTqS2zplFFO0blp
Static task
static1
Behavioral task
behavioral1
Sample
Crypt B.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Crypt B.dll
Resource
win10v2004-20250314-en
Malware Config
Extracted
danabot
-
type
loader
Targets
-
-
Target
Crypt B.dll
-
Size
5.5MB
-
MD5
a3287c38bc4dc6621238f79c995f661f
-
SHA1
05855c33f623c5de17c501ae023cd2e64c47c406
-
SHA256
c17ee2b10cc91939b12592628b9cb79136c1fab261abc5ec19396ae50e0156c0
-
SHA512
28b31da397bc8f8be23fb67281b4f31377abcbad8baeef2a78b71b990b651f29777618e2e46abace9a84284825c461f90c54662a4776669ae25c3dfe35955401
-
SSDEEP
98304:qFprUM3pWeTtU1zs3QPzpltsGFc4uz0bsAWopU/:qFp9tTqS2zplFFO0blp
-
Danabot family
-
Modifies visibility of file extensions in Explorer
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Authentication Process
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1