MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 31273fa316dc1ee20fa52329d3283ae09f39238b74c90012366485b90bb037b0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 31273fa316dc1ee20fa52329d3283ae09f39238b74c90012366485b90bb037b0
SHA3-384 hash: bbbfa3ee2eebd3a9605d7a6afb3ff3cb902af6cf13e7f8d667547f2d1228d4b086106daf90f74aadba29153388b4d944
SHA1 hash: 22f3141bf95d5369ea5d1843f5521318c433a685
MD5 hash: 2262dc2d65995ab90eb29107f406c3fa
humanhash: romeo-maine-october-gee
File name:databot.exe
Download: download sample
Signature DanaBot
File size:1'158'656 bytes
First seen:2021-06-16 14:01:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 89acf2f0d2a3019760d9233e714933ef (1 x DanaBot)
ssdeep 24576:8KLU7dT87jivsPPBOAhICaKN7r9zI7kvrtjhgq6:M8PbPBFICF1pTtjm
Threatray 2'008 similar samples on MalwareBazaar
TLSH 8B350210A3B1C039F0FA53F819A5D675B63A3EB0976480CB62D62BFA97245E4EC31357
Reporter 0x746f6d6669
Tags:DanaBot exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
260
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
databot.exe
Verdict:
Malicious activity
Analysis date:
2021-06-16 14:02:49 UTC
Tags:
trojan danabot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file
Enabling the 'hidden' option for recently created files
Launching a process
Creating a process with a hidden window
Modifying an executable file
Enabling the 'hidden' option for analyzed file
Sending a custom TCP request
Creating a file in the Program Files subdirectories
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
DanaBot
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
May use the Tor software to hide its network traffic
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected DanaBot stealer dll
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-06-16 14:01:11 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Unpacked files
SH256 hash:
6d1d4ebda4bc17eb60fdd232a84dc599a345b394717be9314b8e61275ab3b800
MD5 hash:
024a47965b02eb51f86deeb23e60eaef
SHA1 hash:
58d3bb6ca300a95d359153829609e3136605dc39
SH256 hash:
7997e88596bcbb27666e9bfe29d228207c50303183981dc65374e43e01bc9f02
MD5 hash:
670b5593e575e1cc2636f14c01b16954
SHA1 hash:
e7f558232f6b35ae6d3945d15af8830264328252
SH256 hash:
31273fa316dc1ee20fa52329d3283ae09f39238b74c90012366485b90bb037b0
MD5 hash:
2262dc2d65995ab90eb29107f406c3fa
SHA1 hash:
22f3141bf95d5369ea5d1843f5521318c433a685
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

Executable exe 31273fa316dc1ee20fa52329d3283ae09f39238b74c90012366485b90bb037b0

(this sample)

  
Delivery method
Distributed via web download

Comments