Danabot: Analyzing a fallen empire

May 26, 2025, 9:44 a.m.

Description

ESET Research shares insights into Danabot, an infostealer recently disrupted by law enforcement. The malware, tracked since 2018, evolved from a banking trojan to a versatile tool for data theft and malware distribution. Operated as a malware-as-a-service, Danabot offered features like data stealing, keylogging, and remote control. Its infrastructure included C&C servers, an administration panel, and proxy servers. Distribution methods varied from email spam to Google Ads misuse. The takedown operation involved multiple cybersecurity companies and law enforcement agencies, leading to the identification of individuals responsible for Danabot's development and operations.

Indicators

  • 8da728a03e795aa9fb0aa4613759d6bdb10797107dcfb0bb23253514f890a062

Attack Patterns

  • NonRansomware
  • Crisis
  • Ursnif - S0386
  • Buran
  • Matanbuchus
  • Latrodectus
  • Rescoms
  • Danabot
  • Lumma Stealer
  • DarkGate
  • Smokeloader
  • RecordBreaker
  • Zloader
  • SystemBC
  • Ursnif
  • LockBit
  • Danabot

Additional Informations

  • Defense
  • Finance
  • Government
  • Australia
  • Poland
  • Ukraine
  • Russian Federation