Rewterz Threat Advisory – CVE-2021-23893 – McAfee Drive Encryption
October 4, 2021Rewterz Threat Alert – Emotet – Active IOCs
October 4, 2021Rewterz Threat Advisory – CVE-2021-23893 – McAfee Drive Encryption
October 4, 2021Rewterz Threat Alert – Emotet – Active IOCs
October 4, 2021Severity
High
Analysis Summary
The new fourth version of the DanaBot banking trojan has surfaced after months of inactivity. This most recent variant comes packed mostly with the same deadly arsenal of tools that have come before. Main features include a ToR component to anonymize communications between the bad guys and the infected hardware. As previously reported in the DanaBot control panel, DanaBot is set up as a ‘malware as a service in which one threat actor controls a global command and control (C&C) panel and infrastructure then sells access to other threats actors known as affiliates,”. DanaBot’s multi-stage infection chain starts with a dropper that triggers a cascading evolution of hacks. These include stealing network requests, siphoning off application and service credentials, data exfiltration of sensitive information, ransomware infection, desktop screenshot spying, and the dropping of a crypto miner to turn targeted PCs into cryptocurrency workers bees. At least one of the DanaBot distribution methods is identified as misuse of various software warez and cracks websites that supposedly offer software keys and cracks for a free download, including anti-virus programs, VPNs, graphics editors, document editors, and games. However, the files distributed by these sites are a bundle of several different malware, including DanaBot. Earlier Campaigns also distributed Danabot with new features.
Impact
- Data Exfiltration
- Information Theft
Indicators of Compromise
MD5
- 331fd56e84657a3edb69e439fe843f54
- 48ee1dea5816146634d4151e46c8b0bb
- 31d2b7c89d7728b95eb1096e4214675a
- 2bce3c8efb3cb62fe2537ba2ff92030a
- 48ee1dea5816146634d4151e46c8b0bb
- ef87029d6051827fe69f39b74bfb8ddf
SHA-256
- 2a948b38ca5257d8347b66757eb01d8df2d91c41ae08535706be17f9d9c5f956
- ef6a996340f6a59d528e25d8e4b04c97b921c537503f757f9d80a99d2b1aafe3
- 2a831c785f926c9c59cf6eb3c32e40b1d68f5aa91ba4329828db0b84c3b982a6
- 5d48b2614aaaebab4a97deafbd3117e2baa62aaf6a357003b10554e3caa60f5a
- ef6a996340f6a59d528e25d8e4b04c97b921c537503f757f9d80a99d2b1aafe3
- 76518fd9a8d3fad5d9d294742179b2a19b63625b2f5ea62ce23000ed71a0d3cd
SHA-1
- 33b09d8351033603c61e014fcbabced80b0e192c
- 4e1200a69f6c4f0fe9f1bdfecb09f31c8848b50c
- dcc6168b15188cef1012946007d50bac605e88ad
- 426d0806320d005938fc7c698291bd6b9cca46ea
- 4e1200a69f6c4f0fe9f1bdfecb09f31c8848b50c
- 3b8519fa650467fe08db83dee2dc4dbbf628cf27
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.
- Do not download software and files from unofficial and untrusted sources.