General

  • Target

    Crypt B.dll

  • Size

    5.5MB

  • Sample

    250318-pngc3ssxc1

  • MD5

    a3287c38bc4dc6621238f79c995f661f

  • SHA1

    05855c33f623c5de17c501ae023cd2e64c47c406

  • SHA256

    c17ee2b10cc91939b12592628b9cb79136c1fab261abc5ec19396ae50e0156c0

  • SHA512

    28b31da397bc8f8be23fb67281b4f31377abcbad8baeef2a78b71b990b651f29777618e2e46abace9a84284825c461f90c54662a4776669ae25c3dfe35955401

  • SSDEEP

    98304:qFprUM3pWeTtU1zs3QPzpltsGFc4uz0bsAWopU/:qFp9tTqS2zplFFO0blp

Malware Config

Extracted

Family

danabot

Attributes
  • type

    loader

Targets

    • Target

      Crypt B.dll

    • Size

      5.5MB

    • MD5

      a3287c38bc4dc6621238f79c995f661f

    • SHA1

      05855c33f623c5de17c501ae023cd2e64c47c406

    • SHA256

      c17ee2b10cc91939b12592628b9cb79136c1fab261abc5ec19396ae50e0156c0

    • SHA512

      28b31da397bc8f8be23fb67281b4f31377abcbad8baeef2a78b71b990b651f29777618e2e46abace9a84284825c461f90c54662a4776669ae25c3dfe35955401

    • SSDEEP

      98304:qFprUM3pWeTtU1zs3QPzpltsGFc4uz0bsAWopU/:qFp9tTqS2zplFFO0blp

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot family

    • Modifies visibility of file extensions in Explorer

    • Blocklisted process makes network request

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks