Rewterz
Rewterz Threat Alert – Lokibot Malware – Active IOCs
June 30, 2021
Rewterz
Rewterz Threat Alert – Dridex Banking Trojan – Active IOCs
June 30, 2021

Rewterz Threat Alert – DanaBot Trojan – Active IOCs

Severity

High

Analysis Summary

The new fourth version of the DanaBot banking trojan has surfaced after months of inactivity. This most recent variant comes packed mostly with the same deadly arsenal of tools that have come before. Main features include a ToR component to anonymize communications between the bad guys and infected hardware. As previously reported in the DanaBot control panel, DanaBot is set up as a ‘malware as a service in which one threat actor controls a global command and control (C&C) panel and infrastructure then sells access to other threat actors known as affiliates,”.

DanaBot’s multi-stage infection chain starts with a dropper that triggers a cascading evolution of hacks. These include stealing network requests, siphoning off application and service credentials, data exfiltration of sensitive information, ransomware infection, desktop screenshot spying, and the dropping of a crypto miner to turn targeted PCs into cryptocurrency workers bees. At least one of the DanaBot distribution methods is identified as misuse of various software warez and cracks websites that supposedly offer software keys and cracks for a free download, including anti-virus programs, VPNs, graphics editors, document editors, and games. However, the files distributed by these sites are a bundle of several different malware, including DanaBot. Earlier Campaigns also distributed Danabot with new features.

advisory-1623043040.png

Impact

  • Data Exfiltration
  • Information Theft
  • Credential Theft

Indicators of Compromise

MD5

  • d276b0774108e48fa5b544e11f55d5ac
  • 920b8c952a7f92eb1186aaba6fa634c8
  • 0a522f39888e083b1e2c010bd8d78b29

SHA-256

  • 41fb7aba9203de3de0d3aeef58b1298c2519a98817f2cc97131b80a693cbec33
  • 3036b7f31b1c6f57057e8e26e39b9245bc1732f2a727f09deaa787fde6edf225
  • 90ef0dacd3f993a784a8f2d884e065704920db45a5abe639f714306b89a2eef8

SHA-1

  • 4778f57ec3612b599c3f244ded0ca90f60f66fb6
  • b28238f72e59f8c668cb7a67895d973406ee1df8
  • 2cfac136e48e6cf9653da3e1217ba684b8c0049f

Remediation

  • Block the threat indicators at their respective controls.
  • Do not download software and files from unofficial and untrusted sources.
  • Search for IOCs in your environment.