DanaBot banking Trojan jumps from Australia to Germany in quest for new targets

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,154
The DanaBot banking Trojan is on the move and has traveled across the sea in a pivot from its original focus on Australia to strike European targets.

Now, the malware has evolved and has become more than a single-source piece of malware to what Webroot calls a "very profitable modular crimeware project."

DanaBot, written in Delphi, was first found as a payload in phishing emails circulating in Australia. The messages used subjects lines including E-Tolls and invoices in an attempt to coerce victims into downloading a malicious Microsoft Word attachment containing a macro that deployed DanaBot via PowerShell.

The malware contains a range of standard banking Trojan functions. A downloader component launches a DLL which pulls additional modules including a bank website injector, information stealer, and a list of target websites on to a victim's computer.

DanaBot is able to manipulate browser sessions and redirect visits to financial services websites in order to steal any credentials submitted; screenshot desktops, and is also able to transfer stolen data to the malware's command-and-control (C2) server.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top