MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1f984f06dd4dba858766fd2e8d81877e9738f8b9dc6706ce69b7b6e596c466d6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments 1

SHA256 hash: 1f984f06dd4dba858766fd2e8d81877e9738f8b9dc6706ce69b7b6e596c466d6
SHA3-384 hash: 0d9045aa6d4b0ff2f7536b3ae03525664f1623a558cf0dfd8b0db7fe2a7c86986185099f398aa2e19d439b6da6f52181
SHA1 hash: e54a84f9a9ec84203f97bf67da7e8ba488a16704
MD5 hash: 6cb1181657d3fe5d50c83e5810d53ad6
humanhash: idaho-sink-nitrogen-kansas
File name:6cb1181657d3fe5d50c83e5810d53ad6
Download: download sample
Signature DanaBot
File size:1'396'736 bytes
First seen:2022-11-06 18:02:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ac8a9d28fd57cc5434c220cfd849d57e (8 x RedLineStealer, 8 x Smoke Loader, 2 x ArkeiStealer)
ssdeep 24576:nqKYlOOEZEI2DQx4SnbnGV8LTvPA4BOoAC1DC/JFyF6XOhf:nTYlOOiovAbnXXnAnJgQOh
Threatray 5'307 similar samples on MalwareBazaar
TLSH T15F5523523761C1B2D077E239980BC6250ABEB43129BE4D8B37E4566D0F731E1BE2E752
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 480c1c4c4f594b14 (172 x Smoke Loader, 134 x RedLineStealer, 98 x Amadey)
Reporter zbetcheckin
Tags:32 DanaBot exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
181
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6cb1181657d3fe5d50c83e5810d53ad6
Verdict:
No threats detected
Analysis date:
2022-11-06 18:03:12 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for synchronization primitives
Launching a process
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process with a hidden window
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware lockbit packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DanaBot
Detection:
malicious
Classification:
troj
Score:
68 / 100
Signature
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected DanaBot stealer dll
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-11-06 18:03:09 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Checks processor information in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks installed software on the system
Blocklisted process makes network request
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
90ca13042650637a9c91fe1a49134da9a3b326ce799bb0185b155c592385a765
MD5 hash:
6acbde7b1192890b3d18a9ad213d3fe4
SHA1 hash:
48c0e823c9a8de027b47312e45e1162eceb9ee65
SH256 hash:
1f984f06dd4dba858766fd2e8d81877e9738f8b9dc6706ce69b7b6e596c466d6
MD5 hash:
6cb1181657d3fe5d50c83e5810d53ad6
SHA1 hash:
e54a84f9a9ec84203f97bf67da7e8ba488a16704
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

Executable exe 1f984f06dd4dba858766fd2e8d81877e9738f8b9dc6706ce69b7b6e596c466d6

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-11-06 18:02:46 UTC

url : hxxp://172.86.120.156/metadon.exe