Scully Spider, TA547

Scully Spider, TA547
(Type: -)

(Proofpoint) TA547 is responsible for many other campaigns since at least November 2017. The other campaigns by the actor were often localized to countries such as Australia, Germany, the United Kingdom, and Italy. Delivered malware included ZLoader (a.k.a. Terdot), Gootkit, Ursnif, Corebot, Panda Banker, Atmos, Mazar Bot, and Red Alert Android malware. It is worth noting that samples of DanaBot found in a public malware repository contained different campaign IDs (the “a=” parameter) than the ones we observed in the wild, suggesting that there may be activity other than that which we observed. Finally, we should mention that DanaBot bears some similarities in its technical implementation and choices of technology to earlier malware, in particular Reveton and CryptXXX [1], which were also written in Delphi and communicated using raw TCP to port 443. These malware strains also featured similarities in the style of C&C traffic. DanaBot has been observed to be distributed by Smoke Loader (operated by {{Smoky Spider}}). DanaBot itself has been observed to distribute CoreBot ({{Boson Spider}}), GandCrab and Sodinokibi ({{Pinchy Spider, Gold Southfield}}) and TrickBot ({{Wizard Spider, Gold Blackburn}}).

[News Analysis] Trends:

Total Trend: 1

Trend Per Year
1
2020


Trend Per Month
1
Jul 2020



[News Analysis] News Mention Another Threat Name:

3 - TA5163 - TA5473 - TA5543 - TA555


[TTP Analysis] Technique Performance:



[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

News Article (Credit @Malpedia)

Threat Group Cards: A Threat Actor Encyclopedia

2020-07-08 by ThaiCERT from ThaiCERT

Basic Information (Credit @etda.or.th)

Actor: Scully Spider, TA547

Names: Scully Spider, TA547

Country: [Unknown]

Motivation: Financial crime

Motivation: Financial gain

First-seen: 2017

Description: (Proofpoint) TA547 is responsible for many other campaigns since at least November 2017. The other campaigns by the actor were often localized to countries such as Australia, Germany, the United Kingdom, and Italy. Delivered malware included ZLoader (a.k.a. Terdot), Gootkit, Ursnif, Corebot, Panda Banker, Atmos, Mazar Bot, and Red Alert Android malware. It is worth noting that samples of DanaBot found in a public malware repository contained different campaign IDs (the “a=” parameter) than the ones we observed in the wild, suggesting that there may be activity other than that which we observed. Finally, we should mention that DanaBot bears some similarities in its technical implementation and choices of technology to earlier malware, in particular Reveton and CryptXXX [1], which were also written in Delphi and communicated using raw TCP to port 443. These malware strains also featured similarities in the style of C&C traffic. DanaBot has been observed to be distributed by Smoke Loader (operated by {{Smoky Spider}}). DanaBot itself has been observed to distribute CoreBot ({{Boson Spider}}), GandCrab and Sodinokibi ({{Pinchy Spider, Gold Southfield}}) and TrickBot ({{Wizard Spider, Gold Blackburn}}).

Observed-sectors: Financial

Observed-countries: Austria

Observed-countries: Australia

Observed-countries: Brazil

Observed-countries: Canada

Observed-countries: Colombia

Observed-countries: Germany

Observed-countries: Hong Kong

Observed-countries: Iraq

Observed-countries: Italy

Observed-countries: Poland

Observed-countries: New Zealand

Observed-countries: UK

Observed-countries: Ukraine

Observed-countries: USA

Tools: DanaBot

Operations: 2018-09

Operations: Recently, we have spotted a surge in activity of DanaBot, a stealthy banking Trojan discovered earlier this year. The malware, first observed in campaigns targeting Australia and later Poland, has apparently expanded further, with campaigns popping up in Italy, Germany, Austria, and as of September 2018, Ukraine. https://www.welivesecurity.com/2018/09/21/danabot-targeting-europe-adds-new-features/

Operations: 2018-11

Operations: DanaBot appears to have outgrown the banking Trojan category. According to our research, its operators have recently been experimenting with cunning email-address-harvesting and spam-sending features, capable of misusing webmail accounts of existing victims for further malware distribution. https://www.welivesecurity.com/2018/12/06/danabot-evolves-beyond-banking-trojan-new-spam/

Operations: 2019-01

Operations: The fast-evolving, modular Trojan DanaBot has undergone further changes, with the latest version featuring an entirely new communication protocol. The protocol, introduced to DanaBot at the end of January 2019, adds several layers of encryption to DanaBot’s C&C communication. https://www.welivesecurity.com/2019/02/07/danabot-updated-new-cc-communication/

Operations: 2019-04

Operations: DanaBot Demands a Ransom Payment https://research.checkpoint.com/2019/danabot-demands-a-ransom-payment/

Operations: 2019-09

Operations: Like most of the other notable banking trojans, DanaBot continues to shift tactics and evolve in order to stay relevant. F5 malware researchers first noticed these shifting tactics in September 2019, however, it is possible they began even earlier. https://www.f5.com/labs/articles/threat-intelligence/danabot-s-new-tactics-and-targets-arrive-in-time-for-peak-phishi

Information: https://www.proofpoint.com/us/threat-insight/post/danabot-new-banking-trojan-surfaces-down-under-0

Information: https://h3collective.io/review-of-a-danabot-infection/

Information: https://www.fortinet.com/blog/threat-research/breakdown-of-a-targeted-danabot-attack.html

Last-card-change: 2020-04-15

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact