MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c44b3b7ff81213a270ea2e6e76105211c9c4a9a8eb0f612031fbfcb1f0e03f91. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: c44b3b7ff81213a270ea2e6e76105211c9c4a9a8eb0f612031fbfcb1f0e03f91
SHA3-384 hash: 266f6d16f68ef0770ea9ddd533e28585a900f5e19fac0a651d614ea36d1c6f804cb2e8876fe6e67eaf2f721d351e585e
SHA1 hash: 1b753f3c2272c47686dd0e30097631359a990c98
MD5 hash: 05176e1e5a94cdf2f35e1e3b0c50d29f
humanhash: mockingbird-zulu-oven-echo
File name:file
Download: download sample
Signature DanaBot
File size:3'765'760 bytes
First seen:2022-11-27 16:50:58 UTC
Last seen:2022-11-27 18:31:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1e31e30e45cfa04d2377e08dc06b58f0 (2 x Tofsee, 1 x DanaBot, 1 x CoinMiner)
ssdeep 98304:OkA9Fcx5wIWJyIGps7GinSEFmMyNgBiRDYhukZZYlRoUPiAWD:J0mwIEyJghnNF0NgBi92ZZYnoU4
Threatray 543 similar samples on MalwareBazaar
TLSH T13D063320F2909C71DCB07E70618B97D9EEDA107246E5BAC6F9CD23AD5E250F1D4AC2C9
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 25a41378399b9b91 (7 x Smoke Loader, 6 x Amadey, 3 x Tofsee)
Reporter jstrosch
Tags:DanaBot exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
danabot
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2022-11-27 16:55:18 UTC
Tags:
danabot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Launching a process
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad.expl
Score:
88 / 100
Signature
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May use the Tor software to hide its network traffic
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2022-11-27 16:52:15 UTC
File Type:
PE (Exe)
Extracted files:
10
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Checks processor information in registry
Modifies registry class
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Loads dropped DLL
Blocklisted process makes network request
Gathering data
Unpacked files
SH256 hash:
9505a6c7396fd669910fd07e81dc2e45122e9b42bf67cb0792619dfe7444a4cf
MD5 hash:
8a8150d74ea6e7826fd218b1de91206c
SHA1 hash:
ac02ba814db0aab77d3bb916b76f40697d5b778f
SH256 hash:
9a38fcc630e17d242300ad38148d4311c4960a4d8a5fe5c60a48cc175382ccdd
MD5 hash:
d829456fa42cc7684e74534762320b0b
SHA1 hash:
22df7156d99b2e3cefbf2db1133b80eae0d73eaa
SH256 hash:
eefb9de6d6f168ec48715f7acd8b2762ba8c4d3a0a4d0e0593af504e748544ef
MD5 hash:
ea6a577c132ab7ad5703bae31117267e
SHA1 hash:
cdf95c2748dd88debd0473f6f883b12498b89af3
SH256 hash:
c44b3b7ff81213a270ea2e6e76105211c9c4a9a8eb0f612031fbfcb1f0e03f91
MD5 hash:
05176e1e5a94cdf2f35e1e3b0c50d29f
SHA1 hash:
1b753f3c2272c47686dd0e30097631359a990c98
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

Executable exe c44b3b7ff81213a270ea2e6e76105211c9c4a9a8eb0f612031fbfcb1f0e03f91

(this sample)

  
Delivery method
Distributed via web download

Comments