Operation Endgame recently targeted DanaBot, a modular malware used for banking fraud, espionage, and deploying additional malware payloads such as ransomware. DanaBot operates on a Malware-as-a-Service model and has been involved in both criminal and nation-state activities, including DDoS attacks against Ukrainian government servers. #DanaBot #OperationEndgame #ZscalerThreatLabz
Keypoints
- DanaBot is a Delphi-based modular malware family first released in 2018, utilized for stealing information, espionage, and delivering second-stage payloads including ransomware.
- DanaBot operates as Malware-as-a-Service (MaaS), leasing its tools to various threat actors, including criminal groups and nation-state affiliates.
- Notably, DanaBot launched DDoS attacks against Ukraineâs Ministry of Defense webmail server and related targets during the Russia-Ukraine conflict in 2022.
- DanaBot employs a custom encrypted binary network protocol using 1,024-bit RSA and 256-bit AES for secure command and control (C2) communications.
- It persists on infected hosts by creating scheduled tasks, modifying registry Run keys, or creating malicious Windows services depending on privilege levels.
- The malwareâs modular architecture includes a loader, main module, and additional components such as a Tor client for C2 operations.
- DanaBot has been observed dropping other malware families, including DarkGate RAT, Lumma info stealer, and ransomware such as Cactus and GlobeImposter.
MITRE Techniques
- [T1059] Command and Scripting Interpreter â DanaBot executes shell commands remotely to control the infected system (âexecute shell commandsâ).
- [T1113] Screen Capture â DanaBot captures screenshots and records video of the victimâs desktop to collect intelligence (âCapture screenshotsâ, âRecord video of a victimâs desktopâ).
- [T1056.001] Input Capture: Keylogging â DanaBot records keystrokes to steal sensitive information (âmonitor keystrokesâ).
- [T1027] Obfuscated Files or Information â DanaBot samples previously used code obfuscation techniques to evade detection (âleveraged code obfuscationâ).
- [T1547] Boot or Logon Autostart Execution â DanaBot achieves persistence via registry Run keys, scheduled tasks, and Windows services (âWindows Run registry keyâ, âScheduled Tasksâ, âWindows Serviceâ).
- [T1071.001] Application Layer Protocol: Web Protocols â In earlier versions, DanaBotâs loader used HTTP requests for communication (âloader utilized HTTP requestsâ).
- [T1105] Ingress Tool Transfer â DanaBot downloads and executes additional malware payloads like DarkGate and Lumma (âdownloading and executing additional malware payloadsâ).
- [T1090] Proxy â DanaBot uses proxies as indirection layers to hide backend server locations (âone or more proxies used as a layer of indirectionâ).
- [T1020] Automated Collection â DanaBot collects data from browsers, FTP, SSH, and email clients (âinformation stealer from web browsers, FTP, SSH, and email clientsâ).
Indicators of Compromise
- [IP Addresses] Command-and-control servers â 149.28.241[.]120 (alert/backconnect C2), 77.239.101[.]139 (main module C2), 77.91.76[.]17 (main module C2)
- [Domains] TOR C2 server â y3wg3owz34ybihfulzr4blznkb6g6zf2eeuffhqrdvwdp43xszjknwad[.]onion
- [File Hashes] Malware samples â 2f8e0fc38eaf08a69653f40867dcd4cc951a10cd92b8168898b9aa45ba18a5c8 (DanaBot main module), e2c228d0bf460f25b39dd60f871f59ea5ef671b8a2f4879d09abae7a9d4d49fb (DarkGate RAT dropped by DanaBot)
- [File Hashes] Additional payloads â 75ff0334d46f9b7737e95ac1edcc79d956417b056154c23fad8480ec0829b079 (Lumma info stealer version 4)
Read more: https://www.zscaler.com/blogs/security-research/operation-endgame-2-0-danabusted