Rewterz Threat Advisory – CVE-2021-28800- Command Injection Vulnerability in QTS
June 24, 2021Rewterz Threat Advisory – Multiple Vulnerabilities of Dell SupportAssist
June 25, 2021Rewterz Threat Advisory – CVE-2021-28800- Command Injection Vulnerability in QTS
June 24, 2021Rewterz Threat Advisory – Multiple Vulnerabilities of Dell SupportAssist
June 25, 2021Severity
High
Analysis Summary
New fourth version of the DanaBot banking trojan has surfaced after months of inactivity. This most recent variant comes packed mostly with the same deadly arsenal of tools that have come before. Main features include a ToR component to anonymize communications between the bad-guys and an infected hardware. As previously reported in DanaBot control panel, DanaBot is set up as a ‘malware as a service’ in which one threat actor controls a global command and control (C&C) panel and infrastructure then sells access to other threat actors known as affiliates,”.
DanaBot’s multi-stage infection chain starts with a dropper that triggers a cascading evolution of hacks. These include stealing network requests, siphoning off application and service credentials, data exfiltration of sensitive information, ransomware infection, desktop screenshot spying and the dropping of a cryptominer to turn targeted PCs into cryptocurrency worker bees. At least one of the DanaBot distribution methods is identified as misuse of various software warez and cracks websites that supposedly offer software keys and cracks for a free download, including anti-virus programs, VPNs, graphics editors, document editors, and games. However, the files distributed by these sites are a bundle of several different malware, including DanaBot. Earlier Campaign also distributed Danabot with new features.
Impact
- Data Exfiltration
- Information Theft
- Credential Theft
Indicators of Compromise
MD5
- 66d9a025fabebc55a9adb8b68dbcd3bc
- 2edbaa46e926870a7dba6ade815a2221
- 3770c277f81495fb5a1adc1b37d84bb0
- 84e9047b714d1369423c4765da8d3bf7
- 0cc5b2f2a9b0054c9b30a8bbe7391331
- 3770c277f81495fb5a1adc1b37d84bb0
- 1db2499447d634d2ad8ac4c4408a3724
- bfd8005ab96704c6ef21befbc43d30aa
- d685f70e0e276d44503a7a4db3f2b81e
SHA-256
- d7199616185a4d6187eb375c778dd4e5327df6a5e51018770addb54705732d88
- a6f23f333a1c8eab33961660887f4ebb84f12451db4d8f94c1c01fe5dca71ae8
- 7866bb7085d15613e2f12913cad280e17c750dadcecd208e1e11ba5167e4496b
- 972b6465a8dd0ff9e1ec5354c9b6d028f71b0505dcd3388f5edf9976071708c2
- 3d577f9e7a6d32391040bbec8556c62750e75625f40f16ef33a27230ac2b1b5d
- 7866bb7085d15613e2f12913cad280e17c750dadcecd208e1e11ba5167e4496b
- f1410c202fcc7ef7a804332fbeb58b5274fd7609a0fbe7e3bae93eed2542b519
- 7443a98b0d8781ce10c495383c3aecfd6cc0a7f3e6d9c0d9638c8fd5e2f5264e
- 74b8b2e3d124aefc4463a3eef842502ea387de3d680c8ea3b4ea02f29fa34092
SHA-1
- 132751c542fe0410cedff1e7c530d56c7cdbeeff
- 99049d73b7cd3f36367b5a6269094638bab64eae
- 5f6ea21cfeba3a4e94450038f0896c72334fbf43
- 4731d2675a29544d5019449e32c60e74e6967628
- a360ea97c84c6c33f5b11216e2d8b422cc4ed478
- 5f6ea21cfeba3a4e94450038f0896c72334fbf43
- f3be6389fd1650faec29476cd2ce87ed58633a56
- 711ff959211c66fd8eb645301f96b2aed0913dd6
- 1d276eeb5d4e3a3cd8f5291927e98cd1e3fb7392
Remediation
- Block the threat indicators at their respective controls.
- Do not download software and files from unofficial and untrusted sources.
- Search for IOCs in your environment.