HomeSample Page

Sample Page Title


As introduced by the US Division of Justice – the FBI and US DoD’s Protection Prison Investigative Service (DCIS) have managed to disrupt the infrastructure of the infamous infostealer, Danabot. ESET is without doubt one of the many cybersecurity corporations to take part on this long-term endeavor, turning into concerned again in 2018. Our contribution included offering technical analyses of the malware and its backend infrastructure, in addition to figuring out Danabot’s C&C servers. The joint takedown effort additionally led to the identification of people answerable for Danabot growth, gross sales, administration, and extra. ESET took half within the effort alongside with Amazon, CrowdStrike, Flashpoint, Google, Intel471, PayPal, Proofpoint, Group Cymru, Zscaler, Germany’s Bundeskriminalamt, the Netherlands’ Nationwide Police, and the Australian Federal Police.

These regulation enforcement operations had been carried out beneath Operation Endgame – an ongoing international initiative aimed toward figuring out, dismantling, and prosecuting cybercriminal networks. Coordinated by Europol and Eurojust, the operation efficiently took down important infrastructure used to deploy ransomware by way of malicious software program.

Since Danabot has largely been disrupted, we are going to use this chance to share our insights into the workings of this malware-as-a-service (MaaS) operation, masking the options used within the newest variations of the malware, the authors’ enterprise mannequin, and an outline of the toolset supplied to associates. Other than exfiltrating delicate knowledge, we’ve got noticed that Danabot can be used to ship additional malware – together with ransomware – to an already compromised system.

Key factors of the blogpost:

  • ESET Analysis has been monitoring Danabot’s exercise since 2018 as a part of a worldwide effort that resulted in a significant disruption of the malware’s infrastructure.
  • Whereas primarily developed as an infostealer and banking trojan, Danabot additionally has been used to distribute extra malware, together with ransomware.
  • Danabot’s authors promote their toolset by way of underground boards and provide varied rental choices to potential associates.
  • The everyday toolset supplied by Danabot’s authors to their associates contains an administration panel utility, a backconnect instrument for real-time management of bots, and a proxy server utility that relays the communication between the bots and the precise C&C server.
  • Associates can select from varied choices to generate new Danabot builds, and it’s their accountability to distribute these builds by way of their very own campaigns.

Background

Danabot, which belongs to a gaggle of infostealer and/or banking malware households coded within the Delphi programming language, gained prominence in 2018 by being utilized in a spam marketing campaign focusing on Australian customers. Since then, Danabot has expanded to different markets by way of varied campaigns, undergone a number of main updates of its internals and backend infrastructure, and skilled each peaks and downturns in reputation amongst cybercriminals.

All through our monitoring since 2018, ESET has tracked and analyzed a considerable variety of distinct samples and recognized greater than 1,000 distinctive C&C servers. Throughout that interval, ESET analyzed varied Danabot campaigns everywhere in the world, with Poland traditionally being probably the most focused nations, as seen in Determine 1.

Figure 1. Worldwide Danabot detections as seen in ESET telemetry since 2018
Determine 1. Worldwide Danabot detections as seen in ESET telemetry since 2018

Along with typical cybercrime, Danabot has additionally been utilized in much less standard actions equivalent to using compromised machines for launching DDoS assaults. For instance, a DDoS assault towards Ukraine’s Ministry of Protection was noticed by Zscaler quickly after the Russian invasion of Ukraine. A really related DDoS module to the one utilized in that assault was additionally utilized by a Danabot operator to focus on a Russian website devoted to Arduino growth. These actions had been most likely motivated by the affiliate’s personal ambitions and political motivations.

Danabot group introduction

The authors of Danabot function as a single group, providing their instrument for hire to potential associates, who subsequently make use of it for their very own malicious functions by establishing and managing their very own botnets. The authors have even arrange a assist web page on the Tor community with detailed details about the capabilities of their instrument, as depicted in Determine 2.

Figure 2. Danabot’s features as promoted on its support site
Determine 2. Danabot’s options as promoted on its assist website

To amass new clients, Danabot is continuously promoted in underground boards by the person JimmBee, who acts as one of many important builders and directors of the Danabot malware and its toolset. One other noteworthy particular person from the Danabot group is a person identified in underground boards as Onix, who coadministers the Danabot infrastructure and can be answerable for gross sales operations.

Function overview

Danabot’s authors have developed an enormous number of options to help clients with their malevolent goals. Essentially the most outstanding options supplied by Danabot embrace:

  • the power to steal varied knowledge from browsers, mail purchasers, FTP purchasers, and different standard software program,
  • keylogging and display recording,
  • real-time distant management of the victims’ techniques,
  • a FileGrabber command, generally used for stealing cryptocurrency wallets,
  • assist for Zeus-like webinjects and type grabbing, and
  • arbitrary payload add and execution.

Moreover using its stealing capabilities, we’ve got noticed quite a lot of payloads being distributed by way of Danabot over time, equivalent to:

  • SystemBC,
  • Rescoms,
  • Ursnif,
  • Smokeloader,
  • Zloader,
  • Lumma Stealer,
  • RecordBreaker,
  • Latrodectus, and
  • NetSupportManager distant administration instrument.

Moreover, we’ve got encountered cases of Danabot getting used to obtain ransomware onto already compromised techniques. We will identify LockBit, Buran, Disaster, and a NonRansomware variant being pushed on a number of events.

Danabot’s means to obtain and execute arbitrary payloads is just not the one characteristic used to distribute extra malware. Danabot was additionally noticed getting used as a instrument at hand off management of the botnet to a ransomware operator, as reported by Microsoft Risk Intelligence in late 2023.

Distribution strategies

All through its existence, in keeping with our monitoring, Danabot has been a instrument of selection for a lot of cybercriminals and every of them has used totally different technique of distribution. Danabot’s builders even partnered with the authors of a number of malware cryptors and loaders, and supplied particular pricing for a distribution bundle to their clients, serving to them with the method. Matanbuchus is an instance of such a promoted loader.

Over time, we’ve got seen all types of distribution strategies being utilized by Danabot associates, together with:

  • quite a few variants of electronic mail spam campaigns,
  • different malware equivalent to Smokeloader, DarkGate, and Matanbuchus, and
  • misuse of Google Advertisements.

Lately, out of all distribution mechanisms we noticed, the misuse of Google Advertisements to show seemingly related, however really malicious, web sites among the many sponsored hyperlinks in Google search outcomes stands out as probably the most outstanding strategies to lure victims into downloading Danabot. The most well-liked ploy is packing the malware with reliable software program and providing such a bundle by way of bogus software program websites (Determine 3) or web sites falsely promising customers to assist them discover unclaimed funds (Determine 4).

Figure 3. Fake Advanced IP Scanner website leading to Danabot compromise
Determine 3. Pretend Superior IP Scanner web site resulting in Danabot compromise
Figure 4. Fake unclaimed money search site
Determine 4. Pretend unclaimed cash search website

The newest addition to those social engineering methods: misleading web sites providing options for fabricated laptop points, whose solely function is to lure the sufferer into execution of a malicious command secretly inserted into the person’s clipboard. An instance of such a web site resulting in downloading of Danabot in Determine 5.

Figure 5. Website luring the victim into execution of malicious command
Determine 5. Web site luring the sufferer into execution of malicious command saved within the person’s clipboard

Infrastructure

Overview

Initially, Danabot’s authors relied on a single centralized server to handle all bots’ connections and all associates’ knowledge, equivalent to command configurations and knowledge collected from their victims. This centralized method actually had a damaging influence on that server’s efficiency and was extra susceptible to attainable disruptions. That is most likely one of many explanation why we noticed a shift within the enterprise and infrastructure fashions in newer variations. Along with renting locations on their very own infrastructure, Danabot’s authors now provide set up of a non-public server, as marketed on their assist website, to be operated by the affiliate (Determine 6).

Figure 6. Basic offering on Danabot’s support site
Determine 6. Primary providing on Danabot’s assist website

The rental choices, as supplied by way of an underground discussion board in July 2023, are illustrated in Determine 7.

Figure 7. Price list for potential Danabot customers
Determine 7. Value checklist for potential Danabot clients

It’s price mentioning that, primarily based on our monitoring, the rental of an account on the shared infrastructure managed by Danabot’s authors appears to be the preferred selection for menace actors.

When associates buy a rental of one of many choices, they’re given instruments and credentials to hook up with the C&C server and handle their very own botnet by way of an administration panel. Within the following sections, we cowl the totally different components of the everyday toolset.

C&C server utility

The standalone server utility comes within the type of a DLL file and acts because the mind of the botnet. It’s put in on a Home windows server and makes use of a MySQL database for knowledge administration. Bots connect with this server to transmit stolen knowledge and obtain instructions issued by associates. Associates connect with this server through the administration panel utility to handle their botnet. This C&C server utility is offered for native set up just for associates paying for the upper tier private server choice. Associates who select to function their botnets on Danabot’s infrastructure as a substitute are given connection particulars to the C&C server already arrange there, and don’t must host their very own C&C server.

Administration panel

The administration panel, displayed in Determine 8, is within the type of a GUI utility, and represents a very powerful instrument from the botnet operator’s perspective. It permits the affiliate to hook up with the C&C server and carry out duties equivalent to:

  • handle bots and retrieve statistics of the botnet,
  • subject varied instructions and superior configuration for bots,
  • conveniently view and export knowledge gathered from victims,
  • handle the notification system and arrange alerts on occasions triggered by bots,
  • generate new Danabot builds, and
  • arrange a sequence of proxy servers for communication between the bots and the C&C server.

We offer extra particulars and examples of probably the most attention-grabbing capabilities of the administration panel within the upcoming sections.

Figure 8. Administration panel overview
Determine 8. Administration panel overview

Backconnect instrument

One other necessary instrument for administration is the standalone utility that allows botnet operators to remotely connect with and management their on-line bots. Accessible actions for distant management, as seen within the instrument, are illustrated in Determine 9. In all probability probably the most attention-grabbing options for cybercriminals are the power to see and management the sufferer’s laptop through a distant desktop connection and to carry out reconnaissance of the file system utilizing the built-in file supervisor.

Figure 9. Features of the backconnect utility
Determine 9. Options of the backconnect utility

Proxy server utility

Bots sometimes don’t connect with the primary C&C server straight, however slightly use a sequence of proxies to relay the site visitors and conceal the situation of the true backend C&C. To facilitate this technique, Danabot’s authors present a proxy server utility, accessible for each Home windows and Linux techniques. Determine 10 reveals the utilization message from the Linux model of this straightforward proxy server utility. Moreover utilizing proxies, bots will be configured to speak with the server by way of the Tor community in case all proxy chains turn into unavailable. An optionally available downloadable Tor module is then used for such communication.

Figure 10. Usage message from the Linux version of the proxy server application
Determine 10. Utilization message from the Linux model of the proxy server utility

Associates additionally continuously make the most of this proxy server utility as an middleman between their administration panel and the C&C server to additional improve their anonymity. When the whole lot is put collectively, the everyday infrastructure could look as proven in Determine 11.

Figure 11. Example of typical Danabot infrastructure
Determine 11. Instance of typical Danabot infrastructure

Internals

Communication

Danabot employs its personal proprietary C&C communication protocol with its knowledge encrypted utilizing AES-256. Generated AES session keys, distinctive for each message, are then additional encrypted utilizing RSA key pairs, securing the entire communication. It’s price mentioning that there have been a number of updates to the communication protocol and the packet construction over time.

The present packet knowledge construction of the everyday command, earlier than it’s encrypted, seems as proven in Desk 1 . We wish to level out that many of the fields are solely used through the first request within the communication loop to authenticate the bot, and are left unset within the subsequent instructions.

Desk 1. Packet construction utilized in Danabot communication

OffsetMeasurement (bytes)Description
0x000x04Measurement of the packet.
0x040x08Random worth.
0x0C0x08Sum of the 2 values above.
0x140x04Account ID used to distinguish associates within the earlier variations. This discipline accommodates a random worth in newer variations.
0x180x04Command.
0x1C0x04Subcommand.
0x200x04Danabot model.
0x240x04IsUserAdmin flag.
0x280x04Course of integrity stage.
0x2C0x04OS structure x86/x64.
0x300x04Encoded Home windows model.
0x340x04Time zone bias as a DWORD worth.
0x380x04Unknown bytes; set to 0 within the present variations.
0x3C0x04Tor energetic flag.
0x400x04Unknown bytes; set to 0 within the present variations.
0x440x18Padding null bytes.
0x5C0x21Bot ID Delphi string (a string preceded by a size byte).
0x7D0x21Construct ID hardcoded Delphi string.
0x9E0x21MD5 checksum of concatenated Account ID, Bot ID, and Construct ID strings.
0xBF0x29Command dependent string utilized in some instructions complemented by its CRC-32 and a string measurement.
0xE80xDFPadding null bytes.

The latest variations of Danabot additionally add, to additional disguise its communication, a random quantity of seemingly junk bytes to the top of the packet construction earlier than it’s encrypted. It’s price mentioning that Danabot authors don’t at all times comply with one of the best coding practices and the addition of this random variety of bytes was achieved by resizing of the unique reminiscence buffer allotted to carry the packet construction as a substitute of clearing or initializing this newly acquired house. This led to unintentionally together with surrounding reminiscence areas of the method into the information packet being despatched from the bot to the server and, extra importantly, vice versa. These appended reminiscence areas captured and decrypted from the server-to-bot communication typically contained attention-grabbing data from the server’s course of reminiscence and gave researchers beneficial perception into Danabot’s infrastructure and its customers. This bug was launched in 2022 and was fastened within the newest variations of Danabot in February 2025.

Additional particulars in regards to the communication and its encryption had been already coated by varied researchers, and we received’t dive into it extra on this blogpost.

Builds

Botnet operators have a number of choices for producing new Danabot builds to distribute to their victims. To one of the best of our data, whereas the operator could configure the construct course of and desired output by way of the administration panel utility, the construct course of itself is carried out on the Danabot authors’ servers. After producing the chosen construct, the operator receives obtain hyperlinks for the builds and turns into answerable for their distribution in a marketing campaign.

Determine 12 reveals an instance of a construct configuration window and accessible choices, such because the C&C server checklist to be configured within the ultimate binary file, varied obfuscation strategies, construct bitness, and so forth.

Figure 12. Build options menu from the Administration panel application
Determine 12. Construct choices menu from the Administration panel utility

Danabot at present affords 4 primary payload varieties, described in Desk 2.

Desk 2. Variants of accessible builds

Payload sortDescription
Essential.dllGenerates a sole important element within the type of a DLL to be distributed and loaded through rundll32.exe or regsvr32.exe.
Essential.exeGenerates a loader within the type of an EXE that will comprise the abovementioned important element DLL or obtain it from one of many configured C&C servers.
Drop.exeGenerates a dropper with an embedded important element DLL to be dropped to disk.
Drop.msiGenerates an MSI bundle with an embedded important element DLL to be loaded.

Instructions configuration

A botnet operator can subject a sophisticated configuration to the bots by way of the administration panel. Bots are then ordered to carry out varied instructions in keeping with the directions obtained. Determine 13 reveals an instance of such a command configuration.

Figure 13. Dynamic configuration options for the FileGrabber command
Determine 13. Dynamic configuration choices for the FileGrabber command

Desk 3 lists the accessible instructions that may be issued. Every activity has its personal particular choices to additional accommodate the operator’s wants.

Desk 3. Accessible instructions

CommandDescription
VideoFile a video of the chosen utility or web site.
KeyLoggerSeize keystrokes from the chosen utility.
PostFilterSeize data from sure web sites’ kinds.
WebInjectPermit Zeus-like webinjects on sure loaded web sites to change their perform.
RedirectPermit redirection of sure URLs.
BlockBlock entry to configured URLs.
ScreensTake screenshots of a specific utility or web site at sure intervals.
AlertsPermit notifications to be despatched to a specific Jabber account on a configurable occasion.
UninstallUninstall the bot from the system.
UACPresent assist for privilege escalation.
FileGrabberPermit sure recordsdata to be uploaded to the C&C if discovered on the sufferer’s onerous disk.
TorActiveAllow loading of a Tor module and permit connection through the Tor community if all C&C servers are inaccessible.
StealerAllow/disable the stealer performance and set its replace interval.
TimeOutSet interval for the bot to contact its C&C server.
Set upConfigure the bot’s set up on the system and its persistence.
ExclusionSet exclusions in Home windows Defender or Home windows Firewall for a specific course of.
ConfigSaveSave the bot’s configuration earlier than its termination.
HideProcessDisguise the bot’s course of.
CoreProtectPermit the primary element to be injected into an extra course of.

Extra payloads

Danabot additionally gives the potential to obtain and execute additional executable recordsdata. This characteristic permits the botnet operator to configure the set up of extra malware to the compromised system, as talked about earlier. Determine 14 reveals accessible choices for this characteristic within the administration panel utility.

Figure 14. Options for an additional payload configuration
Determine 14. Choices for an extra payload configuration

Conclusion

Danabot is a large-scale MaaS operation distributing a big selection of instruments for the malware associates’ disposal. Our investigation of this infostealer, which began in 2018, resulted within the evaluation of Danabot’s toolset supplied on this blogpost. The efforts of the authorities and a number of other cybersecurity corporations, ESET included, led to the disruption of the malware’s infrastructure. It stays to be seen whether or not Danabot can get well from the takedown. The blow will, nonetheless, absolutely be felt, since regulation enforcement managed to unmask a number of people concerned within the malware’s operations.

For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at threatintel@eset.com
ESET Analysis affords personal APT intelligence stories and knowledge feeds. For any inquiries about this service, go to the ESET Risk Intelligence web page.

IoCs

Recordsdata

SHA-1FilenameDetectionDescription
6D361CD9ADBF1630AF7B323584168E0CBD9315FBN/AWin32/Spy.Danabot.XLoader of the primary element (model 4006).
A7475753CB865AEC8DC4A6CEA27F2AA594EE25E8N/AWin32/Spy.Danabot.OEssential element (model 4006).
787EAB54714F76099EC350E029154ADFD5EDF079N/AWin32/Spy.Danabot.ACDropper element (model 3272).
17B78AD12B1AE1C037C5D39DBE7AA0E7DE4EC8091c0e7316.exeMSIL/Kryptik.AMBVLockbit payload (variant Black) distributed by Danabot.

Community

IPAreaInternet hosting supplierFirst seenParticulars
212.18.104[.]245N/AGLOBAL CONNECTIVITY SOLUTIONS LLP2025‑03‑25Danabot proxy C&C server
212.18.104[.]246N/AGLOBAL CONNECTIVITY SOLUTIONS LLP2025‑03‑25Danabot proxy C&C server
34.16.215[.]110N/AGoogle LLC2024‑10‑10Danabot proxy C&C server
34.65.116[.]208N/AGoogle LLC2024‑10‑10Danabot proxy C&C server
34.168.100[.]35N/AGoogle LLC2024‑11‑27Danabot proxy C&C server
N/Aadvanced-ip-scanned.comN/A2023‑08‑21Misleading web site utilized in Danabot distribution
N/Agfind.orgN/A2022‑06‑15Misleading web site utilized in Danabot distribution
N/Amic-tests.comN/A2024‑12‑07Misleading web site utilized in Danabot distribution

MITRE ATT&CK methods

This desk was constructed utilizing model 17 of the MITRE ATT&CK framework.

TacticIDTitleDescription
Useful resource GrowthT1583.003Purchase Infrastructure: Digital Non-public ServerDanabot operators use VPS of their infrastructure.
T1583.004Purchase Infrastructure: ServerDanabot operators purchase a number of servers for C&C communication.
T1587.001Develop Capabilities: MalwareDanabot authors have developed customized malware instruments.
T1608.001Stage Capabilities: Add MalwareDanabot operators add different malware to their infrastructure for additional spreading.
T1583.008Purchase Infrastructure: MalvertisingMalvertising is a well-liked technique of Danabot distribution.
Preliminary EntryT1566.001Phishing: Spearphishing AttachmentPhishing is a standard technique used for distribution.
ExecutionT1106Native APIDynamic Home windows API decision is utilized by Danabot.
T1204.001Person Execution: Malicious HyperlinkLuring customers into downloading Danabot through a malicious hyperlink is a well-liked distribution selection.
T1204.002Person Execution: Malicious FileDanabot is commonly distributed as a file to be opened by the person.
Privilege EscalationT1548.002Abuse Elevation Management Mechanism: Bypass Person Account ManagementA number of strategies are utilized by Danabot to bypass Person Account Management.
Protection EvasionT1027.007Obfuscated Recordsdata or Data: Dynamic API DecisionDanabot makes use of hashing for dynamic API decision.
T1055.001Course of Injection: Dynamic-link Library InjectionDanabot has the power to inject itself into different processes.
T1218.007System Binary Proxy Execution: MsiexecAn MSI bundle is without doubt one of the attainable distribution strategies.
T1218.010System Binary Proxy Execution: Regsvr32regsvr32.exe can be utilized to execute the primary Danabot module.
T1218.011System Binary Proxy Execution: Rundll32rundll32.exe can be utilized to execute the primary Danabot module.
T1656ImpersonationDanabot makes use of impersonation in its phishing campaigns.
Credential EntryT1555.003Credentials from Password Shops: Credentials from Internet BrowsersDanabot has the power to steal varied knowledge from browsers.
T1539Steal Internet Session CookieDanabot can steal cookies.
DiscoveryT1010Software Window DiscoveryDanabot will be configured to steal knowledge primarily based on the energetic window.
T1217Browser Data DiscoveryInformation, equivalent to searching historical past, will be gathered by Danabot.
T1083File and Listing DiscoveryDanabot will be configured to collect sure recordsdata from the compromised file system.
T1057Course of DiscoveryDanabot can enumerate operating processes on a compromised system.
Lateral MotionT1021.001Distant Providers: Distant Desktop ProtocolDanabot operators can use the distant desktop module to entry compromised techniques.
T1021.005Distant Providers: VNCVNC is without doubt one of the supported options for controlling a compromised system.
AssortmentT1056.001Enter Seize: KeyloggingKeylogging is one in all Danabot’s options.
T1560.002Archive Collected Information: Archive through LibraryDanabot can use zlib and ZIP to compress collected knowledge.
T1560.003Archive Collected Information: Archive through Customized MethodologyCollected knowledge is additional encrypted utilizing AES and RSA cyphers.
T1119Automated AssortmentDanabot will be configured to gather varied knowledge mechanically.
T1185Browser Session HijackingDanabot can carry out AitB assaults through webinjects.
T1115Clipboard InformationDanabot can gather data saved within the clipboard.
T1005Information from Native SystemDanabot will be configured to seek for delicate knowledge on a neighborhood file system.
T1113Display screen SeizeDanabot will be configured to seize screenshots of functions and net pages.
T1125Video SeizeDanabot can seize video from the compromised system.
Command and ManagementT1132.001Information Encoding: Normal EncodingSite visitors between bot and C&C server is compressed utilizing ZIP and zlib.
T1001.001Information Obfuscation: Junk InformationJunk bytes are added to knowledge to be despatched between bot and C&C server.
T1573.001Encrypted Channel: Symmetric CryptographyAES-256 is used as one of many encryption strategies of C&C communication.
T1573.002Encrypted Channel: Uneven CryptographyRSA is used as one of many encryption strategies of C&C communication.
T1008Fallback ChannelsThe Tor module can be utilized as a fallback channel in case all common C&C servers will not be responding.
T1095Non-Software Layer ProtocolDanabot makes use of its personal customized TCP protocol for communication.
T1571Non-Normal PortDanabot can talk on any port.
T1090.003Proxy: Multi-hop ProxyA sequence of proxy servers is used to cover the situation of the true C&C server.
T1219Distant Entry Software programDanabot has assist for distant entry.
ExfiltrationT1020Automated ExfiltrationDanabot will be configured to collect varied knowledge from a compromised system.
T1030Information Switch Measurement LimitsDanabot will be configured to keep away from sending massive recordsdata from a compromised system.
T1041Exfiltration Over C2 ChannelGathered knowledge is exfiltrated by way of normal C&C communication.
AffectT1498Community Denial of ServiceDanabot employed a module to carry out varied DDoS assaults.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles