MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 23229b2ceee2481db7c9e645e849efe08ea77e0a7dff48448d45896f3bd49c0e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 23229b2ceee2481db7c9e645e849efe08ea77e0a7dff48448d45896f3bd49c0e
SHA3-384 hash: 6c341b1436ccfb1a9e8a5414b5a108d684eaf95be31b2ac3089398bd2d90221888a25e52d618cfc3c46b9c0bda6b14ce
SHA1 hash: 6aa333508763a3849eea153fb5c46d1a94928d7c
MD5 hash: 2b856e33459b08fd6b2aa9cec98a2ced
humanhash: violet-kitten-stairway-georgia
File name:2b856e33459b08fd6b2aa9cec98a2ced.exe
Download: download sample
Signature DanaBot
File size:1'135'104 bytes
First seen:2022-03-02 19:16:08 UTC
Last seen:2022-03-02 20:52:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0623e16f7ad169cff85e84a96d4a7da6 (2 x Gozi, 1 x DanaBot, 1 x ArkeiStealer)
ssdeep 24576:9zoLjfXZC/CFtUhhHBLKe6DF4ZQZhr5UGDHZOqng0yhB/p3H:9zWfJ7FavHBLKMQf6GD5OqnCR
Threatray 9'667 similar samples on MalwareBazaar
TLSH T11D3523243950D832D43B16B09058F7B1693FBE635E21D54623892AAE5FB53A2BB3D3C1
File icon (PE):PE icon
dhash icon 38b078eccacecc43 (5 x RedLineStealer, 5 x Stop, 4 x Smoke Loader)
Reporter abuse_ch
Tags:DanaBot exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
488
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a window
Launching a process
Sending an HTTP GET request
Sending a custom TCP request
Creating a file in the %temp% directory
Сreating synchronization primitives
Unauthorized injection to a system process
Sending a TCP request to an infection source
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
MeasuringTime
SystemUptime
CheckCmdLine
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DanaBot
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Antivirus detection for URL or domain
Machine Learning detection for sample
May use the Tor software to hide its network traffic
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Overwrites code with function prologues
Sigma detected: Suspicious Call by Ordinal
System process connects to network (likely due to code injection or exploit)
Yara detected DanaBot stealer dll
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zenpak
Status:
Malicious
First seen:
2022-03-02 19:17:10 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Blocklisted process makes network request
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
84a52ba835dd395b5c521b340926b380d54a08b619f5f5668507ca87c7642d8d
MD5 hash:
80a264a6af013a7db1aeb7b5caf9d171
SHA1 hash:
d175bb39c8717037c1e9e1ce36aa62aa81123314
SH256 hash:
23229b2ceee2481db7c9e645e849efe08ea77e0a7dff48448d45896f3bd49c0e
MD5 hash:
2b856e33459b08fd6b2aa9cec98a2ced
SHA1 hash:
6aa333508763a3849eea153fb5c46d1a94928d7c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

Executable exe 23229b2ceee2481db7c9e645e849efe08ea77e0a7dff48448d45896f3bd49c0e

(this sample)

  
Delivery method
Distributed via web download

Comments