MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 059d904bf8c91b0171aea57256dd335f3a048c2fc3b9e0f2e8b129cac57b1f35. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: 059d904bf8c91b0171aea57256dd335f3a048c2fc3b9e0f2e8b129cac57b1f35
SHA3-384 hash: ccb478364d655b4e5515a4aa74ab3b58ce0a03e99c27bdbfe20cac6951e58740e6dcb3bd90975949448508ac71a7514d
SHA1 hash: e648b6299a45588d39be7427142c2adccb533e64
MD5 hash: 79d97a844d8e55bfab7ba8bbba31d9a7
humanhash: item-violet-william-cup
File name:059d904bf8c91b0171aea57256dd335f3a048c2fc3b9e0f2e8b129cac57b1f35
Download: download sample
Signature DanaBot
File size:2'856'448 bytes
First seen:2020-03-26 13:19:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e47d8d92e6f467acc9e18f713ddce439 (1 x DanaBot)
ssdeep 24576:UXMm6f0z4JBsjlhkzXPb2H7lT9UIgkyiYGmcvMCmRBASJF5tO1sHDG63qdbYz7hP:66IbvvWRmSJA1YLhrf
Threatray 223 similar samples on MalwareBazaar
TLSH 6CD58D22F241543FC46F1736196BA7659A3FAB717A168E5B63F0584C8F316803A3E34B
Reporter Marco_Ramilli
Tags:DanaBot exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
740
Origin country :
n/a
Vendor Threat Intelligence

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:crime_win32_parallax_payload_1
Author:@VK_Intel
Description:Detects Parallax Injected Payload v1.01
Reference:https://twitter.com/VK_Intel/status/1227976106227224578

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.DLL::ImpersonateNamedPipeClient
COM_BASE_APICan Download & Execute componentsOLE32.DLL::CoCreateInstance
MULTIMEDIA_APICan Play MultimediaGDI32.DLL::StretchDIBits
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.DLL::CloseHandle
KERNEL32.DLL::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA
KERNEL32.DLL::LoadLibraryExW
KERNEL32.DLL::LoadLibraryW
KERNEL32.DLL::GetSystemInfo
KERNEL32.DLL::GetStartupInfoA
KERNEL32.DLL::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.DLL::SetConsoleCtrlHandler
WIN_BASE_IO_APICan Create FilesKERNEL32.DLL::CreateFileA
KERNEL32.DLL::CreateFileW
KERNEL32.DLL::DeleteFileA
KERNEL32.DLL::GetFileAttributesA
KERNEL32.DLL::GetFileAttributesW
KERNEL32.DLL::FindFirstFileW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.DLL::RegConnectRegistryW
ADVAPI32.DLL::RegCreateKeyExW
ADVAPI32.DLL::RegDeleteKeyW
ADVAPI32.DLL::RegLoadKeyW
ADVAPI32.DLL::RegOpenKeyExW
ADVAPI32.DLL::RegQueryInfoKeyW
WIN_USER_APIPerforms GUI ActionsUSER32.DLL::ActivateKeyboardLayout
USER32.DLL::CreateMenu
USER32.DLL::EmptyClipboard
USER32.DLL::FindWindowExW
USER32.DLL::FindWindowW
USER32.DLL::OpenClipboard

Comments