Friday, May 2, 2025
HomeMalwareDreambot Banking Trojan Delivered via Resume-Themed Email

Dreambot Banking Trojan Delivered via Resume-Themed Email

Published on

SIEM as a Service

Follow Us on Google News

Dreambot banking Trojan which is a variant of Ursnif spreading via resume themed email, it is one of the most active banking trojans.Its activity on infected computers is very hard to detect at the network level and it communicates over Tor and Peer-to-peer.

It used to specifically target for financial organizations such as corporate and bank sectors to steal the sensitive banking information from organization employees.

Also New Futures has been embedded with it including anti-sandbox Technique to avoid Detection .It targets victim’s by sending personalized emails with the following message text

- Advertisement - Google News
Hello,

Here is my resume.
Please consider it as soon as possible.
Happy New Year.

Greg Pettegrew

Email: wakaba@car.ocn.ne.jp

The Email consist of zip file Greg resume.zip and the extracted file is CV_pettegrew.jse which then downloads the Dreambot executable. that has been encoded with base64.

A .jse file extension used  for Script written in JScript, a programming language used for Windows and Microsoft Internet Explorer scripting; contains source code in a format similar to JavaScript, but the JScript specification is maintained by Microsoft.

Communication over C&C – Dreambot

Once user click and the file it used to send request to C&C Server  over onion network using port 80 then download an orignial payload to infect the windows based machine.

31.11.33.145 port 80 – www.i-tony.net
31.11.33.145 port 80 – www.i-tony.net
164.132.120.220 port 80 – 164.132.120.220
198.105.244.228 port 80 – wdwefwefwwfewdefewfwefw.onion
198.105.244.228 port 80 – wdwefwefwwfewdefewfwefw.onion

According to malwaretrafficanalysis report.

Dream bot communicates over Tor network, due to the nature of onion sites taking down the C&C servers is difficult.The primary goal of the trojan is to steal the financial details from your computer. It has a persistent nature and sits in the windows registry.

SHA256 hash: 12bf51f905667a25261b55b7dd9e9812e09673617d79d267af749073d43b2cc3 (Greg resume.zip)
SHA256 hash: 67fdeb838110c94957d475841c4ff3827db59e4c6ef628dc57e9199aeb543512 (CV-Pettegrew.jse)
SHA256 hash: 1fa7952beab93e9522021fa7ed2231605a573f3fa3f68f1d5e609673a4321138 (devmprov.exe)

Network Defence

Recommended blocking the following domains.

hxxp://www.i-tony.net/images/rn.php
hxxp://164.132.120.220/view/ra64.css
wdwefwefwwfewdefewfwefw.onion

Common Defence’s to stay safe

  • Don’t open the attachments that you are not expecting.
  • Patch or Update your software.
  • Use a reputable security suite.
  • Download applications from Reputed sites.
  • Stay strict with CIA Cycle.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

NVIDIA Riva AI Speech Flaw Let Hackers Gain Unauthorized Access to Abuse GPU Resources & API keys

Researchers have uncovered significant security vulnerabilities in NVIDIA Riva, a breakthrough AI speech technology...

Tsunami Malware Surge: Blending Miners and Credential Stealers in Active Attacks

Security researchers have recently discovered a sophisticated malware operation called the "Tsunami-Framework" that combines...

The Double-Edged Sword of AI in Cybersecurity: Threats, Defenses & the Dark Web Insights Report 2025

Check Point Research's latest AI Security Report 2025 reveals a rapidly evolving cybersecurity landscape...

Hackers Exploit New Eye Pyramid Offensive Tool With Python to Launch Cyber Attacks

Security researchers from Intrinsec have published a comprehensive analysis revealing significant overlaps in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Tsunami Malware Surge: Blending Miners and Credential Stealers in Active Attacks

Security researchers have recently discovered a sophisticated malware operation called the "Tsunami-Framework" that combines...

Hackers Exploit New Eye Pyramid Offensive Tool With Python to Launch Cyber Attacks

Security researchers from Intrinsec have published a comprehensive analysis revealing significant overlaps in...

New WordPress Malware Disguised as Anti-Malware Plugin Takes Full Control of Websites

The Wordfence Threat Intelligence team has identified a new strain of WordPress malware that...