MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd
SHA3-384 hash: e4ddaabadcbd125aa5766d4ca5b576fa684ab97fe0827688b721d63649def6925dde628ebb9e4556cbee9f9b3b2106ad
SHA1 hash: b6004c62e2d9dbad9cfd5f7e18647ac983788766
MD5 hash: de8b54a938ac18f15cad804d79a0e19d
humanhash: alpha-grey-robert-ceiling
File name:de8b54a938ac18f15cad804d79a0e19d
Download: download sample
Signature DanaBot
File size:2'588'672 bytes
First seen:2021-10-22 13:05:46 UTC
Last seen:2021-10-25 10:28:50 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash e6d67d5cd426c018e8253fd545967c8b (1 x DanaBot)
ssdeep 49152:ZgZziYTt//YDt2Z/fZMdzUAOC5n+LlrxFTGWgKq:Z0ziYTKh2Z/f6AAOGarxFTG/v
Threatray 6'802 similar samples on MalwareBazaar
TLSH T17FC54C2033B69812F273133598F3D0E09ED8BD6299B4AD4B70C23B5F049F6D29A5975E
Reporter zbetcheckin
Tags:32 DanaBot dll exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
361
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Enabling the 'hidden' option for analyzed file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
greyware
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DanaBot
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected DanaBot stealer dll
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 507702 Sample: gr3qXhzqva Startdate: 22/10/2021 Architecture: WINDOWS Score: 76 23 Found malware configuration 2->23 25 Multi AV Scanner detection for submitted file 2->25 27 Yara detected DanaBot stealer dll 2->27 29 C2 URLs / IPs found in malware configuration 2->29 7 loaddll32.exe 2 2->7         started        process3 process4 9 rundll32.exe 1 7->9         started        12 rundll32.exe 1 7->12         started        15 cmd.exe 1 7->15         started        17 rundll32.exe 1 7->17         started        dnsIp5 31 System process connects to network (likely due to code injection or exploit) 9->31 21 185.158.250.216, 443, 49753, 49754 M247GB Netherlands 12->21 19 rundll32.exe 1 15->19         started        signatures6 process7
Threat name:
Win32.Trojan.DanaBot
Status:
Malicious
First seen:
2021-10-22 13:06:05 UTC
AV detection:
12 of 28 (42.86%)
Threat level:
  5/5
Result
Malware family:
danabot
Score:
  10/10
Tags:
family:danabot botnet:40 banker collection discovery spyware stealer trojan
Behaviour
Checks processor information in registry
Modifies Internet Explorer settings
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Accesses Microsoft Outlook profiles
Checks installed software on the system
Reads user/profile data of web browsers
Blocklisted process makes network request
Danabot
Danabot Loader Component
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
185.158.250.216:443
194.76.225.46:443
45.11.180.153:443
194.76.225.61:443
Unpacked files
SH256 hash:
28aa9f717f39a4b446790a41cd476f7a0ea273b4f6b52542935e690e20f71bcc
MD5 hash:
f2a786f93c0185329a72fbd5974065f5
SHA1 hash:
c016d47d7aed3de89fd20cb1fd1ffb6f6741e0cb
SH256 hash:
2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd
MD5 hash:
de8b54a938ac18f15cad804d79a0e19d
SHA1 hash:
b6004c62e2d9dbad9cfd5f7e18647ac983788766
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

DLL dll 2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-10-22 13:05:48 UTC

url : hxxps://citationsherbe.at/sdd.dll