Threat Advisory

Danabot Version 669 Resurgence Targets Cryptocurrency Transactions Globally

Threat: Malware
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High

EXECUTIVE SUMMARY:

Danabot has returned in a new build labelled 669 following a prolonged operational pause. The malware operates as a financially motivated banking trojan and infostealer that targets users and systems where transaction credentials or wallet identifiers are accessible. The supplied material describes an architecture focused on maintaining resilient communications and intermediary proxies that make direct operator-host links less observable. The effect is targeted monetary theft: victims who copy, paste, or otherwise expose wallet identifiers or transaction details from infected endpoints are at risk of unauthorized transfers. A combination of anonymized endpoints reachable via an anonymity network and publicly reachable infrastructure gives operators alternate paths for control and data relay, increasing survivability. Business impact is immediate financial loss for affected individuals and organizations, plus secondary reputational harm for services and processes that depend on manual clipboard-based payment workflows. Exposure spans personal endpoints used for financial access, corporate endpoints that handle cryptocurrency payments, and any operational process that copies wallet identifiers between applications. The reported architecture suggests operators are prioritizing continuity of service for malicious operations and maximizing opportunities to intercept monetary artifacts without revealing direct infrastructure ownership.

The observed deployment uses multiple classes of control infrastructure: publicly reachable endpoints and anonymized service endpoints accessible through an anonymity network. Operators also maintain intermediary backconnect proxy services that relay traffic between infected hosts and operator infrastructure, producing a layered communications topology that obscures true operator locations. Communications are conducted over application-layer protocols encapsulated in standard service flows to blend with legitimate traffic. The malware demonstrates focused collection behavior that targets locally copied data buffers and clipboard contents, intercepting or replacing wallet identifiers to redirect transactions. Once collected or manipulated, transaction-relevant artifacts and results are moved through the same control channels and intermediary proxies, consistent with exfiltration over existing command channels. The referenced build identifier indicates iterative development and feature reinforcement; the present build bundles remote control, proxying, and targeted collection into a single package. This combination resilient multi-path communications, intermediary proxying, and clipboard-targeted collection—supports direct monetization by operators while increasing the difficulty of technical attribution and takedown.

A financially driven adversary that combines persistent remote control, anonymized infrastructure, and targeted collection mechanisms to directly siphon monetary assets. The immediate observed impact is monetary loss for victims whose transactions or wallet identifiers are intercepted or altered, and operational friction for entities that rely on copy-paste workflows for payments. Operational resilience is evident through multiple communication paths and intermediary proxies that reduce single points of failure, enabling continued operation even when individual endpoints are disrupted. Use of anonymized endpoints increases the complexity of investigative linkage and prolongs operator survivability. In the broader landscape, this incident exemplifies a recurring pattern of commodity financial malware evolving incrementally while reinforcing infrastructure to maintain theft operations. Although the tactics are operationally straightforward, their orchestration anonymized endpoints, backconnect proxies, and clipboard-focused collection — elevates the cost to defenders and increases the likelihood of successful theft against opportunistic victims.

THREAT PROFILE:

Tactic Technique ID Technique
Resource Development T1583 Acquire Infrastructure
Collection T1115 Clipboard Data
Command and Control T1071 Application Layer Protocol
Exfiltration T1041 Exfiltration Over C2 Channel
Impact T1657 Financial Theft


MBC MAPPING:

Objective Behavior ID Behavior
Command & Control B0030 C2 Communication
Impact B0016 Compromise Data Integrity
E1510 Clipboard Modification
Defense Evasion E1027 Obfuscated Files
B0002 Debugger Evasion
Collection E1083 File/Directory Discovery
Anti-Static Analysis 80002 Anti-Static Analysis

REFERENCES:

The following reports contain further technical details:

 

crossmenu