Link: Danabot Lab
This scenario involves a .pcap file containing network traffic from the DanaBot malware. Wireshark will be a useful tool for analyzing the traffic here, so let’s see what we can discover here!
To narrow down any IPs looking to retrieve info, I performed a “http.request.method==GET” search.
To start off, I searched for the first IP with “ip.addr==62.173.142.148”.
That’s weird… TCP PDU seems oddly suspicious. I decided to follow the TCP stream to get more insights, and lo-and-behold:
This is further solidified by the fact that the TCP stream states that the filename is “allegato_708.js”. It seems I didn’t have to look far to find the culprit!
Wireshark has a neat option to export HTTP objects. While the exact filename isn’t there, this login.php file matches the line number with the TCP stream I examined.
This file has malicious properties, so using a VM would be necessary to do any analysis. Also, the file would be automatically quarantined by Windows Defender, so it’s important to allow these files on a safe environment.
With the file unquarantined, I could get the SHA256 hash of the malware file using PowerShell.
For infostealing campaigns, this makes sense, considering that long-term persistence and detection evasion across multiple endpoints is necessary for data exfiltration.
According to further analysis information on any.run, this malware uses the wscript.exe process to execute the malware.
.dll files being in network traffic definitely raises some eyebrows, so perhaps it could give more information.
Unlike the login.php file that Windows Defender detected earlier, this one clearly detects it as DanaBot!
I got the file hash of this second malicious file using PowerShell once again (this time, the MD5 hash):
I put the hash into VirusTotal out of curiosity, and it gave all the signs pointing towards malicious activity.