DanaBot Banking Trojan targeting Europe with its new features
DanaBot malware, first founded in Australia and later Poland, then distributed to other countries, some of them are Italy, Germany, Austria. Now it is emerging in Ukraine (in Europe) as in the month of September 2018. This trojan was first analyzed by Proofpoint earlier in this year after being founded in continuous malicious email campaigns targeting clients in Australia.
Introduction: What is DanaBot?
DanaBot is a modular banking Trojan. This Trojan malware is written in Delphi, and it has a multi-stage and multi-component architecture, having most of its functionality based on plug-ins. In the month of May 2018, the malware was said to have been under active development. Attackers are adding new features to this malware at that time.
New campaigns: DanaBot
Two weeks after the campaign started in Australia, this trojan was observed in Poland in another campaign.
According to ESET research, this campaign is still active and it is the largest campaign to date.
Under this malware, emails are being sent posing as invoices from various companies. This campaign uses a combination of PowerShell and VBS scripts widely known as Brushaloader.
After the campaign in August, the DanaBot developers added TOR plug-in to update C&C server list and used to create a covert communication channel. In the new September campaign, the threat actors behind DanaBot VNC plug-in that enables Remote Desktop Protocol connections to the victim’s machine.
The plug-ins founded in the Poland campaign are:
- VNC plug-in – establishes a connection to a victim’s computer and remotely controls it
- Sniffer plug-in – injects malicious scripts into a victim’s browser, usually while visiting internet banking sites
- Stealer plug-in – harvests passwords from a wide variety of applications (browsers, FTP clients, VPN clients, chat and email programs, poker programs etc.)
- TOR plug-in – installs a TOR proxy and enables access to .onion websites
ESET published a detailed list of Targeted domains, Targeted software, Targeted cryptocurrency wallets, configuration script, IoCs, hashes and plugins used on their website, to check detail about these, click here.