General

  • Target

    Crypt C.dll

  • Size

    5.5MB

  • Sample

    250318-pngc3swpt7

  • MD5

    8d252f7a6ff4f929d86cf7feb95a5b08

  • SHA1

    fa67e72ea1f9a6018407490359007022c784bdf8

  • SHA256

    46a1eec81e8b0d889b6fde07a85405874d4b21da998b34e8b91fd852d1ddb458

  • SHA512

    297ab8de6d887c1807bbbb49a04fe83c74874bf8647ab16e69f1680551c4dc50153affc92395c6c0705309df33a035c3368eba67d17220562f3c8c98a5c27f29

  • SSDEEP

    98304:DW0704A7pKmwDNRdBYaAGmOGio38um37R6BJZO4A5cfebV/FkZQ:DW044gnwPnbAGmO83OR6BJZ9ATF

Malware Config

Extracted

Family

danabot

Attributes
  • type

    loader

Targets

    • Target

      Crypt C.dll

    • Size

      5.5MB

    • MD5

      8d252f7a6ff4f929d86cf7feb95a5b08

    • SHA1

      fa67e72ea1f9a6018407490359007022c784bdf8

    • SHA256

      46a1eec81e8b0d889b6fde07a85405874d4b21da998b34e8b91fd852d1ddb458

    • SHA512

      297ab8de6d887c1807bbbb49a04fe83c74874bf8647ab16e69f1680551c4dc50153affc92395c6c0705309df33a035c3368eba67d17220562f3c8c98a5c27f29

    • SSDEEP

      98304:DW0704A7pKmwDNRdBYaAGmOGio38um37R6BJZO4A5cfebV/FkZQ:DW044gnwPnbAGmO83OR6BJZ9ATF

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot family

    • Modifies visibility of file extensions in Explorer

    • Blocklisted process makes network request

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks