DanaBot is distributed via Word documents that contain external links and masquerade as job application forms in phishing emails. AhnLab EDR traces the infection chain from Outlook and Word through CMD and PowerShell to rundll32, where DanaBot is downloaded, loaded, and executed, enabling data theft, screenshots, and browser credential access.
#DanaBot #AhnLabEDR
#DanaBot #AhnLabEDR
Keypoints
- The attack uses spearphishing with a Word document attachment containing an external link to trigger execution.
- The infection chain progresses through Outlook to Word, then to command-line and PowerShell before launching the payload.
- External URL loading leads to downloading additional documents (.dotm) and a macro that decodes and executes commands.
- A macro document (dotm) loaded via the Word file downloads DanaBot (iu4t4.exe) from the C2.
- The DanaBot payload re-launches via rundll32.exe using shell32.dll parameters.
MITRE Techniques
- [T1566] Spearphishing Attachment β The attacker employed a document containing an external link to prevent their malicious macro from being detected in an attachment. Quote: βThe attached file (.docx) is a Word document that contains an external link.β
- [T1059] PowerShell β A PowerShell command is used to download the DanaBot malware (iu4t4.exe) from the C2. Quote: βreveal a PowerShell command to download the DanaBot malware (iu4t4.exe) from the C2.β
- [T1059] Command Prompt β The chain shows CMD.exe involved in the sequence decoding/executing commands. Quote: βcmd.exeβ
- [T1105] Ingress Tool Transfer β External link mechanism downloads additional documents (.dotm) and loads them. Quote: βconnecting to the specified address to download additional documents and load them.β
- [T1218] Signed Binary Proxy Execution: Rundll32 β DanaBot re-launches itself through rundll32.exe using shell32.dll parameters. Quote: βre-launches itself with shell32.dllβs parameters through rundll32.exe.β
- [T1113] Screen Capture β DanaBot is capable of taking screenshots after infection. Quote: βthe malware takes screenshots and collects PC information and browser account credentials.β
- [T1082] System Information Discovery β The malware collects information from the PC as part of its data theft. Quote: βcollect information without being connected to the C2.β
Indicators of Compromise
- [IOC Type] File Hash β 0bb0ae135c2f4ec39e93dcf66027604d (.DOCX) β Word document initial attachment used in the infection chain
- [IOC Type] File Hash β 28fd189dc70f5bab649e8a267407ae85 (.DOTM) β Macro-enabled document downloaded/loaded during the attack
- [IOC Type] File Hash β e29e4a6c31bd79d90ab2b89f57075312 (Danabot EXE) β DanaBot payload downloaded/executed
Read more: https://asec.ahnlab.com/en