MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 84dcb2e1236f428d52bd4cb3f5d5e7a6c79d44778858012b746c1658b1a844fd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 84dcb2e1236f428d52bd4cb3f5d5e7a6c79d44778858012b746c1658b1a844fd
SHA3-384 hash: d5cc949071209e218a62d777fb830dd9bee1b002f4b9e02195ed1e4f9e57c0f80d18cdb0c4f99bd040c0b3bbb3464c8c
SHA1 hash: 163c917a4cc9e242e5195ae3461f95d0266cd5d4
MD5 hash: 557436315ac51f9a29574d474a728402
humanhash: mexico-kilo-moon-winner
File name:557436315ac51f9a29574d474a728402.exe
Download: download sample
Signature DanaBot
File size:1'151'488 bytes
First seen:2021-10-07 12:07:52 UTC
Last seen:2021-10-07 13:13:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 104d9977f4378bb867ddadb6d1eb3d6c (4 x RaccoonStealer, 1 x ArkeiStealer, 1 x DanaBot)
ssdeep 24576:qBE83FTTbykD/odyRGYR1bOGwQ3htmOEzYHfhhglI1mpsDb1:kXsOR1bOP5OEzYHJaq1mpsv1
Threatray 6'085 similar samples on MalwareBazaar
TLSH T1CB351210B3E1C035F1BB16F69AB993B0A529B971AB3990C763D13AEB66345D4BD30307
File icon (PE):PE icon
dhash icon e0e8e8e8aa66a499 (32 x RaccoonStealer, 23 x RedLineStealer, 14 x ArkeiStealer)
Reporter abuse_ch
Tags:DanaBot exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
265
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
557436315ac51f9a29574d474a728402.exe
Verdict:
Malicious activity
Analysis date:
2021-10-07 12:19:12 UTC
Tags:
trojan danabot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Enabling the 'hidden' option for recently created files
Launching a process
Creating a process with a hidden window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
DanaBot
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
System process connects to network (likely due to code injection or exploit)
Yara detected DanaBot stealer dll
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.GenericML
Status:
Malicious
First seen:
2021-10-07 12:08:31 UTC
AV detection:
24 of 45 (53.33%)
Threat level:
  5/5
Result
Malware family:
danabot
Score:
  10/10
Tags:
family:danabot botnet:4 banker discovery spyware stealer trojan
Behaviour
Checks processor information in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Danabot
Danabot Loader Component
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
142.11.242.31:443
192.119.110.73:443
192.210.222.88:443
Unpacked files
SH256 hash:
8b25906be960a77c68484a82c4405e2de310027ddfe7ccc49d39f3d0dc725180
MD5 hash:
5fd6b7ba5ae36481e719d312ba488413
SHA1 hash:
212dc6fa67a103634ad281bd7e16a1e3dd8f6200
SH256 hash:
2d9ea202bdb78b04fd279e5cbfdb3be88dc2e3fd75f95eab0513b24949261af5
MD5 hash:
60e347a9cc44d146db66bedb9377d718
SHA1 hash:
9b42a27e8bfdb2d6478b1ca64a9f1623b210f28a
SH256 hash:
84dcb2e1236f428d52bd4cb3f5d5e7a6c79d44778858012b746c1658b1a844fd
MD5 hash:
557436315ac51f9a29574d474a728402
SHA1 hash:
163c917a4cc9e242e5195ae3461f95d0266cd5d4
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

Executable exe 84dcb2e1236f428d52bd4cb3f5d5e7a6c79d44778858012b746c1658b1a844fd

(this sample)

  
Delivery method
Distributed via web download

Comments