win.danabot (Back to overview)

DanaBot

URLhaus    

Proofpoints describes DanaBot as the latest example of malware focused on persistence and stealing useful information that can later be monetized rather than demanding an immediate ransom from victims. The social engineering in the low-volume DanaBot campaigns we have observed so far has been well-crafted, again pointing to a renewed focus on “quality over quantity” in email-based threats. DanaBot’s modular nature enables it to download additional components, increasing the flexibility and robust stealing and remote monitoring capabilities of this banker.

References
https://0ffset.wordpress.com/2018/06/05/post-0x08-analyzing-danabot-downloader/
https://www.proofpoint.com/us/threat-insight/post/danabot-gains-popularity-and-targets-us-organizations-large-campaigns
https://asert.arbornetworks.com/danabots-travels-a-global-perspective/
https://www.welivesecurity.com/2018/09/21/danabot-targeting-europe-adds-new-features/
https://www.proofpoint.com/us/threat-insight/post/danabot-new-banking-trojan-surfaces-down-under-0
https://www.trustwave.com/Resources/SpiderLabs-Blog/DanaBot-Riding-Fake-MYOB-Invoice-Emails/
https://www.welivesecurity.com/2018/12/06/danabot-evolves-beyond-banking-trojan-new-spam/
https://www.welivesecurity.com/2019/02/07/danabot-updated-new-cc-communication/
https://blog.yoroi.company/research/dissecting-the-danabot-paylaod-targeting-italy/