danabot malware analysis

organization = {AhnLab}, Technical Details and Reporting: Proofpoint provides technical analysis of DanaBot, here and here. institution = {Verizon Communications Inc.}, date = {2021-11-08}, Using BlackBerry Optics, you can identify the source domain for this attack and visualize all the related network interactions. 2023 Zscaler, Inc. All rights reserved. AsyncRAT is a RAT that can monitor and remotely control infected systems. title = {{DanaBot Communications Update}}, The DLL, in turn, connects using raw TCP connections to port 443 and downloads additional modules including: Historically, malware such as DanaBot has displayed such fields over email, social networking, and banking log-on pages to steal these user credentials. But nothing good in life ever comes for free. What is Secure Access Service Edge (SASE)? Experience the Worlds Largest Security Cloud. url = {https://blog.sekoia.io/privateloader-the-loader-of-the-prevalent-ruzki-ppi-service/}, urldate = {2021-09-28} This allows the malware to gather a wealth of information about a compromised victims device, which can be further used in secondary attacks. date = {2021-11-14}, They should patch such packages immediately and check for artifacts of DanaBot. The DLL is cryptographically verified using the RSA algorithm and the following public key: MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDOmbQ1gGQtE8PUhjKIETLaSSEc, JGp9O0gyckoyrIfb4l4BZqLKAkDGm59lUxSFWPCINQOMQvgvDYydMOyMvABtmi4c, 0yb4te8dXE0xVxTQmnxGV9pAf3gfcEg3aqBne/7AQmS+0fFUpccX+huz4Sys415+. title = {{2019 Data Breach Investigations Report}}, . institution = {Malwarebytes}, Small Business Solutions for channel partners and MSPs. language = {English}, Implement the very best security and compliance solution for your Microsoft 365 collaboration suite. The template used to generate the HTTP requests is shown in Figure 2: Figure 2: HTTP request template used in DDoS attack. Reduce risk, control costs and improve data visibility to ensure compliance. The following sections summarize the numerous techniques that the DanaBot developers have implemented to obfuscate the malware binary code. Provide zero trust connectivity for IoT and OT devices and secure remote access to OT systems. This event highlights the flexibility of the malware beyond its historic information-stealing functionality. language = {English}, We have a global consulting team standing by to assist you providing around-the-clock support, where required, as well as local assistance. Introduction This allows Danabot to create services and execute the injection into system processes. Second Large Software Supply Chain Attack (November 4, 2021). DanaBot is an ever-evolving and prevalent threat that has been in the wild since 2018. The first is using the Interactive Delphi Reconstructor (IDR) program to export standard Delphi library function and variable names. title = {{Decoding a DanaBot Downloader}}, Explore tools and resources to accelerate your transformation and secure your world. }, Strange Bits: HTML Smuggling and GitHub Hosted Malware, @techreport{inc:20190508:2019:3c20a3b, url = {https://www.welivesecurity.com/2018/12/06/danabot-evolves-beyond-banking-trojan-new-spam/}, title = {{DanaBot updated with new C&C communication}}, date = {2019-05-09}, urldate = {2021-01-27} The malware has the ability to perform web-injects on popular services, as well as having remote access functionality. author = {VirusTotal}, It makes a request such as shown below: Figure 3: Network request generated by the older version of the malware, Figure 4: Network request generated by the newer version of the malware, featuring an expanded set of URL parameters. urldate = {2021-02-25} Coupled with its utilization in recent DDoS attacks and NPM hijacks, the threat of DanaBot is as prevalent as ever. urldate = {2019-12-10} Trojan-Banker.Win32.Danabot.vho . Zscaler and other trademarks listed at zscaler.com/legal/trademarks are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. language = {English}, The emails used many subjects such as: This time, the emails contained URLs linking to zipped JavaScript hosted on FTP servers including ftp://kuku1770:GxRHRgbY7@ftp[.]netregistry[.]net/0987346-23764.zip. Zscaler and other trademarks listed at zscaler.com/legal/trademarks are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. We provide comprehensive information on the analysis which includes all indicators of compromises, screenshots and Process behavior graphs. date = {2018-12-20}, The attack took place on Thursday, November 4, 2021 and it was by the same DanaBot affiliate ID 40 threat actor as in the October 22, 2021 attack on UAParser.js. The IDA Python script 10_math_loops.py will remove these junk code math loops. Though seemingly not updated since 2019, GootKit has recently become active again. As reported by the Cybersecurity and Infrastructure Security Agency (CISA), GitHub, the developer, and others the NPM JavaScript package for UAParser.js was compromised on Friday, October 22, 2021 and used to distribute a cryptocurrency miner and DanaBot. urldate = {2021-06-29} organization = {ESET Research}, This operation fixes IDA Pros disassembly as shown in Figure 3. language = {English}, language = {English}, A video recorded in the ANY.RUN malware hunting service enables us to take a look at Danabot in action. Danabot is a banking trojan that was spotted in the wild in 2018. The following RSA public key was used for the System Info upload, while uploads of other files used the same key as for module downloads: MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCilEDyzfbBKas+W2brWstcdKfY, WgAl79oHSmdACo7zVCSkqJPocK3u3naHuFD3rYTTkEQbj6IaTNi1vn6eceNedExE, u3ppOvxzRKqCOUOB+yQbz9Hv8xzsh0QnlJzcuLZHDhCDWoKwMbNU2/AXiVR5w7wF. title = {{Alert (AA22-110A): Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure}}, urldate = {2022-03-28} author = {Proofpoint Staff}, DanaBot also adds a lot of junk code involving global variables and various math operations, see Figure 13 for an example. Whats more, Danabot creators are thought to be collaborating with the group behind a different banking trojan GootKit. What is Cloud Access Security Broker (CASB)? }, Dissecting the Danabot Payload Targeting Italy, @online{research:20181206:danabot:dd22bc3, By visiting the pages of the site, you agree to our Privacy Policy, 330c1d3dd702af11b01ae38ced101e4c4217816e4887e9ebffe2e529cdc857d5, 7e4132835419e4c415d048b64a5fc2813b8d2ff72bb5586d857dcdf6a90a45f2, 31832f7a8b9e94962378e3dd3250ad63f62d1a9be3c4227b46caacff2b92c9c0, 07762231da2a8ce1dd2a211c49a27a2f06d7d2b7d5426fc5b6b114f845f1eca6, 5232d9dcdca668143ef903ab233a347c452ddcf66a2088e1d811f11713155987, ee38171c75dbb5c3cde877ec28d8cca9eec2ca3277eea9250e03bd90b1125d6f, b60e92004d394d0b14a8953a2ba29951c79f2f8a6c94f495e3153dfbbef115b6, 34884856d2759c2aeb96c1bd54e3120b2fd209658747184db776da1e2527c358, 53c2e8b99e5864b8be1172fcd86275ed978a22537784cc102aaa4af0f315d656, 994606a245a798d16061afcbc2bbce4c835bc1a6fed74c08c22def9a777fe15e, 1298f95e9281dc33cdf2df8a2a11c55d76f0bbf266c0657579fec056ca882991, e2874e1b7661bab87814c7be2425a6fa41965efbf80a58c2eff00a4a29becf9f, 2e7d8011d1f806caa4151edd55e3e82ec76d33b04577dbc5ea9b48d1dae30e23, bd4e6b60b3bc56af0ed63738063582a9cd036a3484fd1a54005f02972d4dd8ff, 9428536f635ecadaca9288fa0150e92bdcdac7fe8de03e419e032ab0664c86fa, 6d4bb9f253658e3443c4fe9a5b6fccc80a99cdd72c265fa2d1c03c6bcfe4391b, 3f680c8fb6e622e713bd5e46ecc2c449c4198c51d685acdba04da23f7a9cb6f6, 30b94549920fc0533ebb237e17fb018c1a19db5d6884566736d9d8edd65c48e0, 681ccc9e5bab3a23b3ce31fdc1eb8db268e79e1521e748d8f8c951d10a3a096c, 5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124, 192-168-100-87.abcdefghijklmnopqrstuvwxyz012345.plex.direct, 192-168-100-240.otmn.direct.quickconnect.to, 25a0da491b2c906bdf695c075ceaac8add6520160feb4a5b0075fb6b2c2a8e8e, 72bc6f8e78f8eac529d0af0abdedfc86858f6ea1c9f43aa16e6b560343171f05, 8223f2b8eb6a25685eab5c00c72e2578999cdc6eef046e87206781db23853143, ffcfef7ba6a9d41f7e9aa171775d542adfa8c0a477818330aca6ed69dc40cae4, 0c1bf63ff84de04a9e118d6da4a2df84be1ca4fc45371e3d644f4271510fd11d, 0b9ec66ebaf249c2918fd3cf4fe62cf6aea792f42bd4d3354bda19d8efe18eab. ]487582958161>, Table 7: Web injects configuration file (InjFirst in the older version, PInject in the newer; brackets added to URLs), Table 8: Cryptocurrency processes (BVideo and Bkey configuration files in the older version, BitVideo and BitKeyin the newer; italicized processes appeared only in the older version), Table 9: CryptoCurrency files (CFiles configuration file in the older version, BitFiles in the newer; italicized files appeared only in the older version). author = {Sean Gallagher}, The malware made its last iterative change at the end of 2020, and then made additional changes in September 2021. Find the information you're looking for in our library of videos, data sheets, white papers and more. DanaBot is the latest example of malware focused on persistence and stealing useful information that can later be monetized rather than demanding an immediate ransom from victims. December 2018: DanaBot evolves beyond banking Trojan with new spam-sending capability. However, this may change since the actor is known for purchasing banking Trojans from other developers and operators. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. Prevent data loss via negligent, compromised and malicious insiders by correlating content, behavior and threats. 8c6224d9622b929e992500cb0a75025332c9cf901b3a25f48de6c87ad7b67114, SHA256 hash of DanaBot version 2646 main component. DanaBot is an ever-evolving and prevalent threat that has been in the wild since 2018. Trojan.DanaBot is spread through exploit kits and malicious spam. A new variant of the infamous Danabot botnet hit Italy, experts at Cybaze-Yoroi ZLab dissected one of these samples that targeted entities in Italy. This case is a first for both malicious programs since neither has been distributed or distributed by other malware before. title = {{Technical Analysis of DanaBot Obfuscation Techniques}}, The key itself appears to be encrypted with one of the RSA public keys and appended to the uploaded file. urldate = {2021-12-31} Our general method is: DanaBot adds a lot of junk code to slow down and complicate reverse engineering. This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. On top of that, the core design of the malware was also changed, as the loader was made responsible for downloading all the modules along with the main component. and was used to download a DanaBot main component with the SHA-256 hash of: e7c9951f26973c3915ffadced059e629390c2bb55b247e2a1a95effbd7d29204. title = {{2020 CrowdStrike Global Threat Report}}, title = {{A static config extractor for the main component of DanaBot}}, title = {{No Unaccompanied Miners: Supply Chain Compromises Through Node.js Packages (UNC3379)}}, We hope that by sharing our visibility into the threat landscape that we can help researchers, security practitioners, and the general public better understand the evolution of malware attacks in 2021. The payload DLL is invoked using rundll32.exe and the parameter #1. Similar to the first incident, the threat actor had only configured the malwares credential stealing component to be active. [1] https://www.proofpoint.com/us/threat-insight/post/cryptxxx-new-ransomware-actors-behind-reveton-dropping-angler, hxxp://users[.]tpg[.]com[. Since the previous scripts patched a lot of existing code and exposed a bunch of new code, the 05_reset_code.py script helps reset and re-analyze the modified code in IDA Pro to get a cleaner IDB database. author = {FortiGuard SE Team}, Seemingly on the decline over recent years, the past year has sparked new life and a return to the mainstream for DanaBot. There are no signs yet that point to this partnership reforging. language = {English}, ]org/whuBcaJpqg.php, e59fdd99c210415e5097d9703bad950d38f448b3f98bb35f0bdc83ac2a41a60b, fxp://lbdx020a:mbsx5347@marinersnorth[.]com[. }, @online{schwarz:20220302:danabot:b734fd3, The malware tries to connect to the remote host 149.154.157.104 (EDIS-IT IT) through an encrypted SSL channel, then it downloads other components and deletes itself from the . Terms and conditions It consists of a downloader component that downloads an encrypted file containing the main DLL. More recently, DanaBot has been hosted and distributed via webpages offering cracked software and applications. language = {English}, TA547 is responsible for many other campaigns since at least November 2017. language = {English}, title = {{DanaBot evolves beyond banking Trojan with new spamsending capability}}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf}, Genesis Market pe.entry_point == 0x154ccb and, //Must have exactly 5 sections organization = {ESET Research}, Affiliates then distribute and use the malware as they see fit--mostly to steal credentials and commit banking fraud. Email campaigns featuring Danabot were considered well crafted by some researchers, who noted that social engineering involved seemed very effective. Before running the third script, check that IDA Pros Options->Compiler is set to Delphi (see Figure 6.). How to analyze Danabot with ANY.RUN IOCs IP addresses 193.34.166.247 116.111.206.27 185.101.92.195 192.236.192.238 This export is calculated by DanaBot to determine which mode the malware is running in. language = {English}, ]au/angelcorp2001/Account+Statement_Mon752018.doc, URL hosting document leading to DanaBot on 2018-05-06, 82c783d3c8055e68dcf674946625cfae864e74a973035a61925d33294684c6d4, hxxp://bbc[.]lumpens[. Once collected, all information recorded by Danabot is sent to the control server in an encrypted form. In these network requests, the e= parameter is a key used to decrypt the next-stage payload using the Microsoft CryptAPIs CryptDeriveKey and CryptDecrypt using an MD5 hash and the AES algorithm. It is operated by a financially motivated criminal group tracked as " SCULLY SPIDER " by CrowdStrike in a Malware as a Service (MaaS) model with multiple affiliate partners. This is the latest version that we have seen in the wild, first appearing in early September. You can also see the system components used to download and register the malicious DLL into the system. To see how BlackBerry preventsDanaBotattacks from occurring, check out the following video, and watch BlackBerry go head-to-head with a live sample of DanaBot malware. BlackBerry is not responsible for any damage or harm incurred as a result of readers of this blog attempting to load this URL. This threat is part of an evolving malware family, with frequent enhancements to both communication, attack vector, and functionality. Once the script and analysis completes, some manual clean up may be required. Experience the transformative power of zero trust. Again, the server checked geolocation before downloading the JavaScript. urldate = {2020-07-30} One such functional shift was seen in late October 2021, when an affiliate using the malware dropped via the hijacked NPM packages was involved in a distributed denial-of-service (DDoS) attack against a commercial organization based in Russia. DanaBot Trojan - In-Depth Analysis. urldate = {2020-05-10} date = {2019-03-13}, The investigation confirmed the new samples to be the evolution of Danabot, with a different C2 communication protocol that began to use multiple encryption layers and proved very complex. urldate = {2022-01-25} language = {English}, The best way to extract these stack strings is by emulating the construction code, but due to the following reasons we experimented with another deobfuscation technique: The goal of the IDA Python scripts 07_stack_string_letters_to_last_StrCatN_call.py and 08_set_stack_string_letters_comments.py is not to extract a wholly accurate stack string, but enough of the string to determine whether the string is junk or not. Written in Delphi, the malware is still under active development. }, @techreport{welivesecurity:20200729:threat:496355c, NOTE: Users who have recently utilized NPM packages are likely to have compromised machines. Late in 2021, the NPM JavaScript software package manager for Node.JS had a handful of its libraries compromised and infected with malware. Any other trademarks are the properties of their respective owners. Figure 7 shows an example snippet of code with a number of these calls. When installing, both packages will first execute and run the file compile.js via Node, as seen below: On execution, this JavaScript code will launch the secondary malicious script, which is a Windows batch file (.BAT) called compile.bat. DanaBots popularity has waned in recent years, but these campaigns may signal a return of the. June 20, 2019. Research by: Yaroslav Harakhavik and Aliaksandr Chailytko. Deliver Proofpoint solutions to your customers and grow your business. Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. url = {https://www.spamhaus.org/news/images/botnet-report-2020-q2/2020-q2-spamhaus-botnet-threat-report.pdf}, Based on Zscaler ThreatLabz tracking, this is a new affiliate to the DanaBot ecosystem. DanaBot relied on social engineering tactics of varying complexity to bait victims into following unknown links attached to emails, and inadvertently downloading the malware. Figure 6: Stealer module targeting information from browsers, Figure 7: Stealer module targeting FTP clients (actual list is much longer). DanaBot is a modular banking Trojan, first analyzed by Proofpoint in May 2018 after being discovered in malicious email campaigns targeting users in Australia. Click on the "Download" button to . Once downloaded, it executes the compile.dll file that effectively compromises the system and puts it into the hands of whichever threat actor has purchased the DanaBot Malware-as-a-Service. Malware Functionality Summary DanaBot is a Trojan that includes banking site web injections and stealer functions. DanaBot, first discovered in 2018, is a malware-as-a-service platform that threat actors use to steal usernames, passwords, session cookies, account numbers, and other personally identifiable information (PII). author = {ASEC Analysis Team}, Historically, the malware was used in phishing and malspamming campaigns. Welcome to "VirusTotal's 2021 Malware Trends Report" research report. By submitting the form, you are agreeing to our privacy policy. author = "Blackberry Threat Research Team " }, No Unaccompanied Miners: Supply Chain Compromises Through Node.js Packages (UNC3379), @online{team:20211118:threat:7fd07f8, Learn how Zscaler delivers zero trust with a cloud native platform built on the worlds largest security cloud. Danabot is distributed in email spam campaigns targeting organizations and using social engineering to trick victims into downloading malicious documents the same scenario as. From May 2018 to June 2020, DanaBot has been a fixture in the crimeware threat landscape, according to Proofpoint, which first discovered the malware in 2018 and posted a debrief on the latest variant Tuesday. title = {{AA22-110A Joint CSA: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure}}, Proofpoints describes DanaBot as the latest example of malware focused on persistence and stealing useful information that can later be monetized rather than demanding an immediate ransom from victims. However, we found even earlier samples via pivots in malware repositories that date from the middle of April but we have not seen these in the wild. What is Zero Trust Network Access (ZTNA)? }, @online{research:20190207:danabot:6346e2b, author = {ESET Research}, This payload was only served to potential victims in AU, with the server checking the clients IP geolocation. Small & Midsized . To establish a reliable cyber defense, security professionals can utilize malware hunting and analysis services such as ANY.RUN, which allows to dissect malware samples and thoroughly study their behavior and architecture. By stopping malware at this stage, BlackBerry solutions help organizations increase their resilience. Danabot banking malware execution process. language = {English}, Please propose all changes regarding references on the Malpedia library page. date = {2022-03-15}, The latest variant, still under analysis by researchers, is raising concerns given the number of past DanaBot effective campaigns. Other modules associated with DanaBot include remote desktop through VNC, information stealing, and keylogging. The would-be victim downloads the RC package, a popular NPM component, which comes as a .zip file that would typically be downloaded from a malicious website as a cracked, or free, version of the component. date = {2022-04-20}, urldate = {2019-11-26} organization = {Zscaler}, ]au/images/090909-001-8765%28239%29.zip, URL hosting zipped JavaScript leading to DanaBot on 2018-05-30, 78b0bd05b03a366b6fe05621d30ab529f0e82b02eef63b23fc7495e05038c55a, 6ece271a0088c88ed29f4b78eab00d0e7800da63757b79b6e6c3838f39aa7b69, Additional DanaBot 2018-04-17 (early sample found using pivots), ET and ETPRO Suricata/Snort/ClamAV Signatures, 2830756 || ETPRO TROJAN Win32.DanaBot Starting VNC Module, 2803757 || ETPRO TROJAN Win32.DanaBot HTTP Checkin, 2831097 || ETPRO TROJAN Win32.DanaBot HTTP Checkin M2, 2831096 || ETPRO TROJAN Win32.DanaBot HTTP Checkin M3, 2831099 || ETPRO TROJAN Win32.DanaBot HTTP Checkin M4, 2831100 || ETPRO TROJAN Win32.DanaBot HTTP Checkin M5, 2023. Todays cyber attacks target people. urldate = {2022-02-02} We use Tools MAP Generator and Tools IDC Generator to export MAP and IDC files. Your suggestion will be reviewed before being published. Since its creation in 2018, threat actors who purchased the malware have been given specific botnet identification for the MaaS, known as affiliate IDs. Indicator of Compromise (IoC): pastorcrytograph[dot]at/3/sdd[dot]dll. url = {https://blogs.blackberry.com/en/2021/11/threat-thursday-danabot-malware-as-a-service}, This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.As of this writing, the said sites are inaccessible. These fields are filled by the user, who thinks they are filling out their regular login page, and this information is then stolen by the malware. date = {2020-07-29}, Putting prevention first neutralizes malware before the exploitation stage of the kill chain. However, over the years it has matured in complexity and grown in functionality. Historically, DanaBot has not operated alone. Check out the BlackBerry Research & Intelligence Teams new book, Finding Beacons in the Dark: A Guide to Cyber Threat Intelligence - now available for free download here. language = {English}, author = {Alessandro Parilli and James Maclachlan}, The content of compile.bat is initially obfuscated, but it can be deobfuscated to reveal the true intention of this malicious code. The malware assigns letters of the alphabet to individual variables and then uses those variables, pointers to those variables, and various Delphi character/string handling functions to construct strings one character at a time. The DanaBot virus has been found to contain a modular engine that can be customized according to the proposed targets. In this blog, we will explain the function and operations of Genesis Market, provide an analysis of malware samples that law enforcement shared with Trellix, and offer advice and guidance to (potential) victims. Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. Based on NPM stats, it had almost 9 million weekly downloads. DanaBots modular nature enables it to download additional components, increasing the flexibility and robust stealing and remote monitoring capabilities of this banker. (WARNING: these are live malware sites at the time of writing): If youre battling this malware or a similar threat, youve come to the right place, regardless of your existing BlackBerry relationship. There will also be loops left that just contain junk math code (see Figure 11.) DanaBot is a malware-as-a-service platform discovered in 2018 that is designed to steal sensitive information that may be used for wire fraud, conduct cryptocurrency theft, or perform espionage related activities While we havent found good patterns to automatically remove references to these junk strings, the IDA Python script 11_rename_junk_variables.py renames them as junk to ease manual analysis. DanaBot malware whatsoever. Zscaler is universally recognized as the leader in zero trust. Again, the downloads are verified using the RSA algorithm with a different public key than noted above: MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCpQbDeOOrFbGOuu989TSd1+sJJ, gi1WFiYV0RInlLkAAv1XZwUodBJRMyNWeKPHg40dn9oseicUScBH3lQb5fRvwm9Q, oppN5DIhiK9au8yzhm6/BGDUuVfK+vDlutanjYLAnz/Wp/W9bofUe5Ej3WZo2w1T, Table 2: Modules downloaded by the main component, Table 3: Configuration files downloaded by the main component. Learn more. language = {English}, language = {English}, }, @online{haughom:20200602:evolution:3286d87, Danabot aims to steal sensitive information that can be leveraged by the attackers later, therefore instead of confirming the victim head-on and demanding a ransom. ]net/secure/325-5633346%20-%20C-12%20%2811%29.zip, URL hosting zipped JavaScript leading to DanaBot on 2018-05-29, a8a9a389e8da313f0ffcde75326784268cbe1447ce403c7d3a65465f32a1d858, hxxp://members[.]giftera[.

Traveler's Cave Hotel, Tabatchnick Chicken Soup, Palo Alto Interface Not Coming Up, Articles D