MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc4f9284c5985be7c61d8ec207f920574382e57acac0d8e942e6ad859341cb2c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: cc4f9284c5985be7c61d8ec207f920574382e57acac0d8e942e6ad859341cb2c
SHA3-384 hash: 0c596925a5ca9cba9bef9c1314bf6eeddb8aed4bed10d63eb4c671a5024574c9fe268dd6e747b7dd3ff8efc6aaa9c98b
SHA1 hash: 62c87652da6c3642e748fe5a2d048abf40661e65
MD5 hash: 3aed53920b7ade1d7393ef64d51e188c
humanhash: lactose-california-ink-river
File name:3aed53920b7ade1d7393ef64d51e188c.exe
Download: download sample
Signature DanaBot
File size:1'180'160 bytes
First seen:2021-06-21 18:04:38 UTC
Last seen:2021-06-21 18:46:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f24ed3cba0284e946897971a6b672b10 (1 x CryptBot, 1 x DanaBot)
ssdeep 24576:jgnaAY9fX4sgkBvdJStV7FSdxubiIjZO4uinLu+0NIhBqhIVy/r2:BfXrgG8HFO4DLu+UITqcyj
Threatray 2'091 similar samples on MalwareBazaar
TLSH 4D450200B2A0C031E3FB62F859B693686B3A3BA15F7254CF52E916ED56347E4AD31707
Reporter abuse_ch
Tags:DanaBot exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
287
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3aed53920b7ade1d7393ef64d51e188c.exe
Verdict:
Malicious activity
Analysis date:
2021-06-21 18:08:10 UTC
Tags:
trojan danabot stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
bank.adwa.spyw.evad
Score:
92 / 100
Signature
Bypasses PowerShell execution policy
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Enables a proxy for the internet explorer
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Sets a proxy for the internet explorer
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2021-06-21 18:05:22 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Unpacked files
SH256 hash:
3ab8eaaac0666619b1d006e0c3f7fcde99a7542ebc496e4e0d9824fd61051f6a
MD5 hash:
fe08071a426797287b82d3486ad05816
SHA1 hash:
29eb7ad40082772793936179ead4f2ae3353355c
SH256 hash:
ab9db5f9c6ac44d60ee9eb06a6bd5de97b7769bb47107c4ee8085c0854eba9ed
MD5 hash:
94f682643ad285754854e7c51e6efc4f
SHA1 hash:
1c8b90dd2e8573ab853632486e0a45d64ae23e14
SH256 hash:
cc4f9284c5985be7c61d8ec207f920574382e57acac0d8e942e6ad859341cb2c
MD5 hash:
3aed53920b7ade1d7393ef64d51e188c
SHA1 hash:
62c87652da6c3642e748fe5a2d048abf40661e65
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

Executable exe cc4f9284c5985be7c61d8ec207f920574382e57acac0d8e942e6ad859341cb2c

(this sample)

  
Delivery method
Distributed via web download

Comments