BunnyLoader: New Malware-as-a-Service (MaaS) Under Rapid Development
A brand unique malware-as-a-carrier (MaaS) loader below the establish “BunnyLoader” has been found to be offered in a couple of hacking boards. This malware has a couple of functionalities which encompass 2nd-stage payload downloading and executing, browser credentials and plot data stealing, keylogging, and a ways extra.
Additionally, there are traces of the malware replacing cryptocurrency pockets addresses, monitoring the sufferer’s clipboard, and encapsulating the guidelines correct into a ZIP archive for transmitting to a express-and-control (C2) server.
Deploy Developed AI-Powered E mail Safety Retort
Imposing AI-Powered E mail security solutions “Trustifi” can right your corporation from as of late’s most threatening electronic mail threats, equivalent to E mail Tracking, Blocking, Bettering, Phishing, Fable Take Over, Industry E mail Compromise, Malware & Ransomware
BunnyLoader Original Malware-as-a-Carrier (MaaS)
This malware turned into first found in early September 2023 and has viewed diverse updates with many gains and computer virus fixes by the tip of September 2023. These updates encompass credit score card recovery to stealer goal, AV evasion implementation, C2 GUI Adjustments, and a ways extra.
The necessary version of BunnyLoader turned into found to be BunnyLoader v1.0, and the most contemporary version has been reported as BunnyLoader v2.0. On the replacement hand, this instrument has been offered at a mark of $250 with lifetime access.
In step with its advertiser, who goes by the establish PLAYER_BUNNY, this malware has been written in C/C++ and is able to a ways away express execution, Fileless loader, anti-analysis ways, and includes a web based panel for showcasing stealer logs, total customers, vigorous responsibilities, and a ways extra.
Advise and Administration Panel (Web Panel)
To boot to, the panel furthermore offers data about the an infection statistics, the total assortment of connected or disconnected customers, vigorous responsibilities, and stealer logs. The contaminated machines can furthermore be remotely managed from the C2 panel.
Moreover, the BunnyLoader malware features a Trojan downloader (FileLess Execution), Intruder (Keylogger, Stealer), and Clipper (Crypto pockets stealing from Bitcoin, Monero, Ethereum, Litecoin, Dogecoin, ZCash, and Tether).
A entire document about this malware has been published by Zscaler, which offers detailed data about the malware, working working building, and diversified data.
Indicators of Compromise
C2 Server:
37[.]139[.]129[.]145/Bunny/
BunnyLoader samples:
dbf727e1effc3631ae634d95a0d88bf3
bbf53c2f20ac95a3bc18ea7575f2344b
59ac3eacd67228850d5478fd3f18df78
Source credit : cybersecuritynews.com