MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 15f6928d92e45e84173ff103c1d5765c4341537e7b91a271078933bf110c7ba4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 15f6928d92e45e84173ff103c1d5765c4341537e7b91a271078933bf110c7ba4
SHA3-384 hash: 6d337c0cb0af51942cc70b3bc4055baa6b630d77674e061965db3f68ab5f1349d1e30a39e741fca0cf4baf4ace27478d
SHA1 hash: 5985cc5fb5f6082455bc3b09f8a91753197aca79
MD5 hash: 8e686830d1d0957d86b68df31360c15c
humanhash: friend-two-black-saturn
File name:15f6928d92e45e84173ff103c1d5765c4341537e7b91a271078933bf110c7ba4
Download: download sample
Signature DanaBot
File size:52'236'288 bytes
First seen:2024-08-22 00:35:04 UTC
Last seen:2024-08-22 01:25:09 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 1572864:Ku46oUt8gGkYTI8SdT7lwi1LE19kjG7NMXQ:E6oUzGkYVSJ7lPo1
TLSH T19EB73357FC26DA07C1F1663489826BD09F13BC66EA66226B7D68322D0DFF1D60A3504F
TrID 68.9% (.MST) Windows SDK Setup Transform script (61000/1/5)
22.0% (.WPS) Kingsoft WPS Office document (alt.) (19502/3/2)
9.0% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter JAMESWT_WT
Tags:91-92-242-111 DanaBot msi signed

Code Signing Certificate

Organisation:fCoder Group Inc.
Issuer:fCoder Group Inc.
Algorithm:sha1WithRSAEncryption
Valid from:2024-08-13T11:32:12Z
Valid to:2025-08-13T17:32:12Z
Serial number: 516124cca8d3acb442e7fc03b494d6a8
Thumbprint Algorithm:SHA256
Thumbprint: f363c6f0fa74c5c50cc6e3e637519715e4b6fec06d458ecbe8023435bf86408c
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
3
# of downloads :
92
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
Generic Stealth Rugmi
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
fingerprint installer packed
Result
Threat name:
DanaBot
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
92 / 100
Signature
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Contains functionality to infect the boot sector
May use the Tor software to hide its network traffic
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Yara detected DanaBot stealer dll
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1497076 Sample: ipNkjpa6m0.msi Startdate: 22/08/2024 Architecture: WINDOWS Score: 92 68 Multi AV Scanner detection for submitted file 2->68 70 Yara detected DanaBot stealer dll 2->70 72 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 2->72 74 5 other signatures 2->74 8 msiexec.exe 501 1001 2->8         started        11 msiexec.exe 3 2->11         started        14 ErrorLog.exe 2->14         started        process3 dnsIp4 38 C:\Users\user\AppData\Local\...rrorLog.exe, PE32 8->38 dropped 40 CapCut_7395459874374795280_installer.exe, PE32 8->40 dropped 42 C:\Users\user\AppData\Local\...\zlibwapi.dll, PE32 8->42 dropped 44 180 other files (none is malicious) 8->44 dropped 16 ErrorLog.exe 10 72 8->16         started        20 CapCut_7395459874374795280_installer.exe 38 8->20         started        58 93.184.221.240 EDGECASTUS European Union 11->58 file5 process6 dnsIp7 46 45.80.158.189 UK2NET-ASGB Netherlands 16->46 48 91.92.242.111 THEZONEBG Bulgaria 16->48 54 3 other IPs or domains 16->54 60 Tries to steal Instant Messenger accounts or passwords 16->60 62 May use the Tor software to hide its network traffic 16->62 64 Tries to harvest and steal browser information (history, passwords, etc) 16->64 66 Adds a directory exclusion to Windows Defender 16->66 23 cmd.exe 16->23         started        50 2.18.64.4 AdministracionNacionaldeTelecomunicacionesUY European Union 20->50 52 2.16.202.84 AKAMAI-ASUS European Union 20->52 56 6 other IPs or domains 20->56 30 C:\Users\user\...\app_package_e4de5e36cf.exe, PE32 20->30 dropped 32 C:\Users\user\...\shell_downloader.dll, PE32 20->32 dropped 34 C:\Users\user\...\downloader_nsis_plugin.dll, PE32 20->34 dropped 36 3 other files (none is malicious) 20->36 dropped file8 signatures9 process10 signatures11 76 Adds a directory exclusion to Windows Defender 23->76 26 conhost.exe 23->26         started        28 powershell.exe 23->28         started        process12
Gathering data
Threat name:
Win32.Trojan.Malgent
Status:
Malicious
First seen:
2024-08-14 14:02:02 UTC
File Type:
Binary (Archive)
Extracted files:
2971
AV detection:
10 of 38 (26.32%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  6/10
Tags:
discovery evasion persistence privilege_escalation trojan
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Event Triggered Execution: Installer Packages
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
Checks whether UAC is enabled
Enumerates connected drives
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments