MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07db1fafe9bb70b9f501a869ba4c78f475bf4eb165cedfe65ff79841891a4288. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 07db1fafe9bb70b9f501a869ba4c78f475bf4eb165cedfe65ff79841891a4288
SHA3-384 hash: 7d73f9d6ddab3ddcbee25012c35d1007faa38b959acefe7bdbbdc289f9544acbb6c86d03533452e21374502f94559118
SHA1 hash: 16a6a0cfe56d5243ce05441303b1c6c9a244c1b0
MD5 hash: f7cb304f29f9fb15296536cee773138a
humanhash: winter-freddie-oregon-cola
File name:f7cb304f29f9fb15296536cee773138a.exe
Download: download sample
Signature DanaBot
File size:1'180'672 bytes
First seen:2021-10-02 15:59:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2acca7007d519418a75fa59166363dda (6 x RaccoonStealer, 5 x RedLineStealer, 2 x ArkeiStealer)
ssdeep 24576:TW/3PdLkrzHBV8svBMMzcxDyV/hik5gbelLbslQjui0jIGB:TOVLknHj8svVcOck5/Mbi0
Threatray 5'906 similar samples on MalwareBazaar
TLSH T1AA45123062D1C034F4B662F549B693B5EA387EF16B2590CF63D439EA5634AE49C30787
File icon (PE):PE icon
dhash icon e2e8e8e8aa62a489 (1 x DanaBot, 1 x RedLineStealer)
Reporter abuse_ch
Tags:DanaBot exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
263
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f7cb304f29f9fb15296536cee773138a.exe
Verdict:
Malicious activity
Analysis date:
2021-10-02 16:01:51 UTC
Tags:
trojan danabot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Enabling the 'hidden' option for recently created files
Launching a process
Creating a process with a hidden window
Creating a window
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
DanaBot
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected DanaBot stealer dll
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-10-02 16:00:29 UTC
AV detection:
24 of 45 (53.33%)
Threat level:
  5/5
Result
Malware family:
danabot
Score:
  10/10
Tags:
family:danabot botnet:4 banker discovery spyware stealer trojan
Behaviour
Checks processor information in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Danabot
Danabot Loader Component
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
Unpacked files
SH256 hash:
486dd4bdaf77c36c9906fe494dc76f23a384e487d19128ea207ae5c405d3b18f
MD5 hash:
8781d45d8cab256527f972707f118582
SHA1 hash:
9677f02faa9fa3a91f4c29fe822f3dd61c11782a
SH256 hash:
03b5d245fd344b9c4a5d2b27d54609829691bfb1028872b2f523e3c1093089d7
MD5 hash:
0f3be77ccf52ddcf297f0ef023dd981c
SHA1 hash:
c0bb65fffc449e189912e74aa5cfa54a73f718dd
SH256 hash:
07db1fafe9bb70b9f501a869ba4c78f475bf4eb165cedfe65ff79841891a4288
MD5 hash:
f7cb304f29f9fb15296536cee773138a
SHA1 hash:
16a6a0cfe56d5243ce05441303b1c6c9a244c1b0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

Executable exe 07db1fafe9bb70b9f501a869ba4c78f475bf4eb165cedfe65ff79841891a4288

(this sample)

  
Delivery method
Distributed via web download

Comments