MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1ce9132eae4a8f774aaceb45c3fdb59bf0d8abfe340070b1bb84a0df8e6e794e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
DanaBot
Vendor detections: 11
| SHA256 hash: | 1ce9132eae4a8f774aaceb45c3fdb59bf0d8abfe340070b1bb84a0df8e6e794e |
|---|---|
| SHA3-384 hash: | 6b482eba765a80b4c18d774124ff47dcaaee44835e8716522c52301219c6872b9ba60d75a5428d4653d42a3853f5dfa5 |
| SHA1 hash: | 5fb3ce0bbea874986deb42df6b92d46e04b19518 |
| MD5 hash: | 792b82491d601850125d184f8f0c2a10 |
| humanhash: | steak-hamper-mexico-nebraska |
| File name: | 1ce9132eae4a8f774aaceb45c3fdb59bf0d8abfe34007.exe |
| Download: | download sample |
| Signature | DanaBot |
| File size: | 1'156'608 bytes |
| First seen: | 2022-03-11 21:36:26 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 406de4076009c796cb18d0fd9ae9b583 (4 x RaccoonStealer, 1 x RedLineStealer, 1 x DanaBot) |
| ssdeep | 24576:QwmNTe2JnV3Z7YPDKAVa8eRS9LMJ2m9xV0uDiXFzC3Y/6Xy/AKp:uxrg+AsTS9LMJnDDiXti3Xy/A2 |
| TLSH | T1B9351221B6A0D031F4F329F8997593ACA52EBDE1973450CF52C566EA93389E0EC32717 |
| File icon (PE): | |
| dhash icon | 2dac1378319b9b91 (29 x Smoke Loader, 23 x RedLineStealer, 22 x Amadey) |
| Reporter | |
| Tags: | DanaBot exe |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 103.144.139.105:443 | https://threatfox.abuse.ch/ioc/394340/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
625
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Suspicious
Maliciousness:
Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a window
Launching a process
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %temp% directory
Сreating synchronization primitives
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
MeasuringTime
SystemUptime
CheckCmdLine
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
DanaBot
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Delayed program exit found
Machine Learning detection for sample
May use the Tor software to hide its network traffic
Overwrites code with function prologues
Sigma detected: Suspicious Call by Ordinal
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.DanaBot
Status:
Malicious
First seen:
2022-03-11 21:37:12 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
21 of 27 (77.78%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Result
Malware family:
n/a
Score:
8/10
Tags:
n/a
Behaviour
Checks processor information in registry
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Blocklisted process makes network request
Unpacked files
SH256 hash:
23b1f6b217f7faeea8fa65e321a0be6a3cccb9f23b79930ae495e5f8a1d52c26
MD5 hash:
e57f657444018935b35c04097ffd63c3
SHA1 hash:
1bfcf40c3e1884c488cdd713d4735be8627400ae
SH256 hash:
1ce9132eae4a8f774aaceb45c3fdb59bf0d8abfe340070b1bb84a0df8e6e794e
MD5 hash:
792b82491d601850125d184f8f0c2a10
SHA1 hash:
5fb3ce0bbea874986deb42df6b92d46e04b19518
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.