DanaBot Malware: The Hidden Threat in Job Application Emails
Cybercriminals are becoming increasingly sophisticated in their tactics, employing deceptive job application emails as a new vector to distribute the dangerous DanaBot malware. A recent report from AhnLab sheds light on this alarming trend, revealing how attackers use Word documents with external links to bypass security measures and infect unsuspecting victims.
The Sophisticated Attack Vector
The attack begins with a spam email that appears to be a legitimate job application form, complete with an attached Word document (.docx). This attachment contains an external link, which is crucial to the infection process. Unlike other malicious documents that exploit the equation editor, this method relies on external links to deliver the payload.
Infection Flow Detailed
- Spam Email and Attachment: The attack is initiated through a spam email designed to deceive recipients into opening the attached Word document. Figure 1 in the report shows a sample of such an email, with the attachment containing an external link.
- Execution and External Link Activation: When the recipient opens the Word document, it triggers a sequence of processes. The EDR diagram in Figure 2 illustrates how the document, executed via Outlook (outlook.exe), initiates a chain reaction involving Word (winword.exe), Command Prompt (cmd.exe), PowerShell (powershell.exe), and ultimately an executable file (iu4t4.exe) through rundll32.exe.
- External Link and Macro Document: Figure 3 reveals the external link embedded in the Word file. Upon opening, this link connects to a specified address, downloading and loading additional documents.
Figure 4 depicts the macro document (w1p3nx.dotm) downloaded and executed through this mechanism.
- Macro Code Execution: The downloaded macro document contains encoded CMD commands. Figure 6 shows the macro code, which decodes and executes these commands.
The EDR diagram in Figure 7 confirms the presence of these commands, leading to the download of the DanaBot malware from the command-and-control (C2) server.
- Malware Installation and Persistence: The DanaBot malware (iu4t4.exe) is downloaded to the user’s system (C:\Users\Public). Figure 8 shows the presence of this executable in the download path.
Figure 9 provides EDR evidence confirming the creation of DanaBot via PowerShell.
- Malware Execution and Data Theft: Once installed, DanaBot re-launches itself with shell32.dll’s parameters through rundll32.exe, as depicted in Figure 10. The malware then operates within shell32.dll, collecting and exfiltrating data from the infected PC.
Figure 11 highlights the malicious activities of DanaBot, including taking screenshots and stealing browser credentials.
DanaBot’s Capabilities
Once installed, DanaBot wreaks havoc on the infected system, stealing sensitive information such as browser credentials, taking screenshots, and exfiltrating data to a command-and-control server. The malware operates stealthily, making detection and removal a challenge.
Protecting Yourself from the DanaBot Threat
-
Be Wary of Unsolicited Emails: Exercise caution when opening attachments from unknown or unexpected sources, even if they appear to be job applications.
-
Disable Macros: By default, macros should be disabled in your Microsoft Office settings. If you need to use macros, ensure they come from trusted sources.
-
Keep Software Updated: Regularly update your operating system, antivirus software, and web browsers to patch vulnerabilities that could be exploited by malware.
-
Use Security Solutions: Deploy robust security solutions like AhnLab EDR, which can detect and block malicious activities, providing an extra layer of protection against evolving threats.