MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a86744f9e727c3dd263352083cf53685c0f1eb934326ffa321d9e2cb529eec09. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: a86744f9e727c3dd263352083cf53685c0f1eb934326ffa321d9e2cb529eec09
SHA3-384 hash: ea36bb3aec3a0c76afd1d9ff9ef95a1d0ff5b91c694854c022d1f9998446b39cc80354a31256f0078ee071512a3b16ed
SHA1 hash: 6abf4249fe55af70fc6f5e4b068f1b4c034f8552
MD5 hash: 990be1512e2d246835b3655ee103bf78
humanhash: paris-double-kentucky-wisconsin
File name:990be1512e2d246835b3655ee103bf78
Download: download sample
Signature DanaBot
File size:4'685'333 bytes
First seen:2021-09-28 06:05:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash be41bf7b8cc010b614bd36bbca606973 (195 x LummaStealer, 126 x DanaBot, 63 x Vidar)
ssdeep 98304:LZ73D973fsTQctBjLdJXQAEO+RPNHA/Hb6r6Rm4O00/BS+1HzBrBzdIKD:LJ9rfuQctBjvXoRPVAfbzO00I+9zf2Q
Threatray 471 similar samples on MalwareBazaar
TLSH T11926331277C8F5E6D4FA097249BBD98AE9397D0BAA23C9172310BB4F59C31731B25243
File icon (PE):PE icon
dhash icon f8f0e4e8ecccc8f0 (4 x DanaBot)
Reporter zbetcheckin
Tags:32 DanaBot exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
226
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
video0.mp4
Verdict:
Malicious activity
Analysis date:
2021-09-28 01:52:31 UTC
Tags:
opendir stealer trojan loader evasion danabot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a file in the Program Files subdirectories
Creating a process from a recently created file
Deleting a recently created file
Launching a process
Creating a process with a hidden window
Running batch commands
Launching cmd.exe command interpreter
Searching for the window
Creating a file in the Windows subdirectories
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Hides threads from debuggers
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Submitted sample is a known malware sample
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses ping.exe to check the status of other devices and networks
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 491957 Sample: NULECRymzT Startdate: 28/09/2021 Architecture: WINDOWS Score: 88 64 Multi AV Scanner detection for dropped file 2->64 66 Multi AV Scanner detection for submitted file 2->66 68 Tries to detect sandboxes and other dynamic analysis tools (window names) 2->68 70 PE file contains section with special chars 2->70 10 NULECRymzT.exe 25 2->10         started        13 IntelRapid.exe 2->13         started        16 IntelRapid.exe 2->16         started        18 rundll32.exe 2->18         started        process3 file4 50 C:\Users\user\AppData\Local\...\vellum.exe, PE32 10->50 dropped 52 C:\Users\user\AppData\Local\...\kedger.exe, PE32+ 10->52 dropped 54 C:\Users\user\AppData\Local\Temp\...\UAC.dll, PE32 10->54 dropped 56 3 other files (none is malicious) 10->56 dropped 20 kedger.exe 4 10->20         started        24 vellum.exe 1 5 10->24         started        94 Query firmware table information (likely to detect VMs) 13->94 96 Hides threads from debuggers 13->96 98 Tries to detect sandboxes / dynamic malware analysis system (registry check) 13->98 signatures5 process6 file7 48 C:\Users\user\AppData\...\IntelRapid.exe, PE32+ 20->48 dropped 72 Multi AV Scanner detection for dropped file 20->72 74 Query firmware table information (likely to detect VMs) 20->74 76 Hides threads from debuggers 20->76 78 Tries to detect sandboxes / dynamic malware analysis system (registry check) 20->78 26 IntelRapid.exe 20->26         started        80 Machine Learning detection for dropped file 24->80 29 cmd.exe 1 24->29         started        31 dllhost.exe 24->31         started        signatures8 process9 signatures10 82 Query firmware table information (likely to detect VMs) 26->82 84 Hides threads from debuggers 26->84 86 Tries to detect sandboxes / dynamic malware analysis system (registry check) 26->86 88 Submitted sample is a known malware sample 29->88 90 Obfuscated command line found 29->90 92 Uses ping.exe to check the status of other devices and networks 29->92 33 cmd.exe 3 29->33         started        36 conhost.exe 29->36         started        process11 signatures12 62 Obfuscated command line found 33->62 38 PING.EXE 1 33->38         started        41 Mutato.exe.com 33->41         started        43 findstr.exe 1 33->43         started        process13 dnsIp14 58 127.0.0.1 unknown unknown 38->58 45 Mutato.exe.com 41->45         started        process15 dnsIp16 60 CjPiwXWAdOLiM.CjPiwXWAdOLiM 45->60
Threat name:
Win32.Trojan.Phonzy
Status:
Malicious
First seen:
2021-09-27 18:17:01 UTC
AV detection:
18 of 45 (40.00%)
Threat level:
  5/5
Result
Malware family:
danabot
Score:
  10/10
Tags:
family:danabot botnet:4 banker discovery evasion persistence themida trojan
Behaviour
Checks processor information in registry
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Drops startup file
Loads dropped DLL
Themida packer
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Danabot
Danabot Loader Component
Malware Config
C2 Extraction:
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
Unpacked files
SH256 hash:
31b5c4c26c605367c3456b5aca0d91c717b3dcb1a6adbdaa7dbd0184a41eed23
MD5 hash:
6b4974e34ffefb06c36d15bcfb1eeb08
SHA1 hash:
a996311478a675c274f37fdf57941600d384da1c
SH256 hash:
9e9cfd297bd72421bf1a41afd923e771b2db0dc1574201490eaa348b9ccdc5c6
MD5 hash:
8ae3c99917cac41e96a3d908e72d9d28
SHA1 hash:
b18bbe8bff0a29e465bd60a86663509fe595dd39
SH256 hash:
a86744f9e727c3dd263352083cf53685c0f1eb934326ffa321d9e2cb529eec09
MD5 hash:
990be1512e2d246835b3655ee103bf78
SHA1 hash:
6abf4249fe55af70fc6f5e4b068f1b4c034f8552
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

Executable exe a86744f9e727c3dd263352083cf53685c0f1eb934326ffa321d9e2cb529eec09

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-28 06:05:33 UTC

url : hxxp://zukapk01.top/download.php?file=lv.exe