MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7443a98b0d8781ce10c495383c3aecfd6cc0a7f3e6d9c0d9638c8fd5e2f5264e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 7443a98b0d8781ce10c495383c3aecfd6cc0a7f3e6d9c0d9638c8fd5e2f5264e
SHA3-384 hash: 8d832a7a7d933e895d015a681c3aa87cf1906faf456c50738fd3a7b33442a986a18ada92e48b5c9e2b43f72c5320eb34
SHA1 hash: 711ff959211c66fd8eb645301f96b2aed0913dd6
MD5 hash: bfd8005ab96704c6ef21befbc43d30aa
humanhash: spaghetti-jupiter-thirteen-skylark
File name:bfd8005ab96704c6ef21befbc43d30aa.exe
Download: download sample
Signature DanaBot
File size:1'180'160 bytes
First seen:2021-06-22 06:32:00 UTC
Last seen:2021-06-22 07:51:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9606f4896423e5663963caa907d7b590 (2 x ArkeiStealer, 2 x RedLineStealer, 1 x DanaBot)
ssdeep 24576:AzXvBs2qMdZO4zYc7rNrhr6NDb1Hv6Kpit9hL7w8ja/NIhwfcjqYl9Kh:IqIO4zBVsBb1Hfix7wl/9EjqYl4
Threatray 2'106 similar samples on MalwareBazaar
TLSH 8B450201A6A1D035F2FB12F856B5D3A8AA3E3EA15F7540CB11D82AEE16347E0EC31717
Reporter abuse_ch
Tags:DanaBot exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
264
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bfd8005ab96704c6ef21befbc43d30aa.exe
Verdict:
Malicious activity
Analysis date:
2021-06-22 06:32:29 UTC
Tags:
trojan danabot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
bank.adwa.spyw.evad
Score:
96 / 100
Signature
Bypasses PowerShell execution policy
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Enables a proxy for the internet explorer
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sets a proxy for the internet explorer
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 438165 Sample: Y699pg3RqV.exe Startdate: 22/06/2021 Architecture: WINDOWS Score: 96 40 Multi AV Scanner detection for submitted file 2->40 42 Machine Learning detection for sample 2->42 9 Y699pg3RqV.exe 1 2->9         started        process3 signatures4 52 Detected unpacking (changes PE section rights) 9->52 54 Detected unpacking (overwrites its own PE header) 9->54 12 rundll32.exe 6 9->12         started        process5 dnsIp6 38 66.85.185.120, 443, 49742, 49764 SSASN2US United States 12->38 32 C:\Users\user\Desktop\Y699pg3RqV.exe, data 12->32 dropped 34 C:\ProgramData\lauvhfdchyoek\jhakldcgpv.tmp, PE32 12->34 dropped 56 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->56 58 Bypasses PowerShell execution policy 12->58 17 rundll32.exe 10 24 12->17         started        file7 signatures8 process9 dnsIp10 36 127.0.0.1 unknown unknown 17->36 30 C:\Users\user\AppData\...\tmp5D04.tmp.ps1, ASCII 17->30 dropped 44 System process connects to network (likely due to code injection or exploit) 17->44 46 Tries to harvest and steal browser information (history, passwords, etc) 17->46 48 Sets a proxy for the internet explorer 17->48 50 Enables a proxy for the internet explorer 17->50 22 powershell.exe 17 17->22         started        24 powershell.exe 1 17->24         started        file11 signatures12 process13 process14 26 conhost.exe 22->26         started        28 conhost.exe 24->28         started       
Threat name:
Win32.Trojan.Zenpak
Status:
Malicious
First seen:
2021-06-22 00:55:39 UTC
AV detection:
17 of 46 (36.96%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Checks processor information in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Unpacked files
SH256 hash:
3ab8eaaac0666619b1d006e0c3f7fcde99a7542ebc496e4e0d9824fd61051f6a
MD5 hash:
fe08071a426797287b82d3486ad05816
SHA1 hash:
29eb7ad40082772793936179ead4f2ae3353355c
SH256 hash:
e3777266139ac5b139da4ba9b71a4e8da6e3dc64e1c99d2f947a484a90bec778
MD5 hash:
0d945a5921402ac1d2a2066cc131bcb4
SHA1 hash:
8f2c153c7ec9bd67178c0ce8df762ba143feead8
SH256 hash:
7443a98b0d8781ce10c495383c3aecfd6cc0a7f3e6d9c0d9638c8fd5e2f5264e
MD5 hash:
bfd8005ab96704c6ef21befbc43d30aa
SHA1 hash:
711ff959211c66fd8eb645301f96b2aed0913dd6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

Executable exe 7443a98b0d8781ce10c495383c3aecfd6cc0a7f3e6d9c0d9638c8fd5e2f5264e

(this sample)

  
Delivery method
Distributed via web download

Comments