Categories: Malware

DanaBot Banking Trojan Emerges Again With New Features Steals Banking Credentials

DanaBot Banking Trojan was discovered earlier this year by Proofpoint, targeting users in Australia through continuous malicious email campaigns, later it expands to Poland, Italy, Germany, Austria.

It is a banking Trojan developed in Delphi language, it has a multi-stage and multi-component architecture, most of their functionalities depends on the plugins added to it. The threat actors behind DanaBot Banking Malware continuously adding new features to it.

New Campaign – DanaBot Banking Trojan

With this new active ongoing campaign DanaBot targeting users in Poland, according to ESET research, this “new campaign is the largest and most active campaign to date.”

The malicious email campaign contains invoices posing to be from various companies, the campaign uses a combination of PowerShell and VBS scripts, following are the plugins found with the new campaign.

VNC plug-in – To establish a remote connection.

Sniffer plug-in – to injects malicious scripts to victim browser, usually while visiting internet banking sites.

Stealer plug-in – harvests credentials (browsers, FTP clients, VPN clients, chat and email programs, poker programs etc.).

TOR plug-in – installs a TOR proxy and enables access to .onion websites.

With the previous August campaign, the DanaBot developers added TOR plug-in to create a covert communication channel and with this new September campaign the threat actors behind DanaBot VNC plug-in that enables remote access to the victim’s machine.

Researchers said starting September smaller campaigns targeting banks in Italy, Germany, and Austria, on September 8, 2018, ESET discovered a new DanaBot campaign targeting Ukrainian users. According to the telemetry data, Danabot detection ratio spiked between the month of August and September.

ESET published a detailed list of Targeted domains, Targeted software, Targeted cryptocurrency wallets, configuration script, IoCs, hashes and plugins used.

Related Read

Malware Abuse Google Ads to Injecting Coinhive Cryptocurrency Miner

Chinese Threat Actors Rocke Launching Sophisticated Crypto-mining Malware to Mine Monero Cryptocurrency

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption…

7 hours ago

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in cyber…

7 hours ago

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices…

7 hours ago

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and…

12 hours ago

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell…

13 hours ago

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in…

14 hours ago