BRUSHWORM and BRUSHLOGGER uncovered
BRUSHWORM and BRUSHLOGGER are two custom malware components targeting a South Asian financial institution. BRUSHWORM is a modular backdoor with anti-analysis features, encrypted configurations, scheduled task persistence, USB worm propagation, and extensive file theft capabilities. BRUSHLOGGER is a keylogger that uses DLL side-loading to capture system-wide keystrokes along with window context. The malware shows signs of low sophistication and possible AI-assisted development, with multiple testing versions found on VirusTotal. Together, they form a functional data collection platform capable of bridging air-gapped networks via USB propagation and persistent keystroke capture. Although no known exploits are currently active in the wild, the malware’s capabilities pose a significant risk to confidentiality and data integrity. The threat primarily targets financial institutions in South Asia but could potentially spread to other regions with similar environments. Mitigation requires targeted detection of indicators of compromise, restricting USB device usage, and monitoring for DLL side-loading techniques.
AI Analysis
Technical Summary
The BRUSHWORM and BRUSHLOGGER malware suite was uncovered targeting a financial institution in South Asia. BRUSHWORM acts as a modular backdoor implant featuring multiple advanced capabilities such as anti-analysis checks to evade detection, encrypted configuration files to protect its settings, and persistence via scheduled tasks. It can download additional payloads, propagate through USB devices acting as a worm, and exfiltrate a wide range of files, enabling extensive data theft. BRUSHLOGGER complements this by implementing a keylogger that leverages DLL side-loading, a technique where a malicious DLL is loaded by a legitimate application, to capture keystrokes system-wide along with the context of the active window, increasing the value of stolen credentials and data. The malware’s code quality and flaws suggest it was developed by an inexperienced author, possibly using AI code-generation tools, as evidenced by multiple iterative versions found on VirusTotal. The combination of these two components creates a comprehensive data collection and exfiltration platform capable of bridging air-gapped networks through USB propagation, persistent keystroke logging, and modular payload delivery. Despite its medium severity rating and lack of known active exploits in the wild, the malware’s capabilities pose a serious threat to targeted organizations, especially in the financial sector. The malware employs several MITRE ATT&CK techniques including T1053.005 (Scheduled Task), T1056.001 (Keylogging), T1074.001 (File Deletion), T1036.005 (DLL Side-Loading), and T1105 (Ingress Tool Transfer), among others, indicating a multi-faceted approach to persistence, stealth, and data theft.
Potential Impact
Organizations targeted by BRUSHWORM and BRUSHLOGGER face significant risks to the confidentiality and integrity of sensitive data, particularly financial information. The malware’s ability to steal extensive files and capture keystrokes system-wide can lead to credential theft, unauthorized access, and financial fraud. USB worm propagation and air-gap bridging capabilities increase the risk of lateral movement and infection of isolated networks, which are typically considered highly secure. The persistence mechanisms and anti-analysis features complicate detection and removal, potentially allowing long-term espionage and data exfiltration. For financial institutions, this could result in severe financial losses, reputational damage, regulatory penalties, and erosion of customer trust. The malware’s low sophistication suggests that similar threats could proliferate easily, increasing the overall threat landscape for organizations with similar profiles worldwide.
Mitigation Recommendations
1. Implement strict controls on USB device usage, including disabling autorun features and restricting USB ports to authorized devices only. 2. Deploy endpoint detection and response (EDR) solutions capable of detecting DLL side-loading and unusual scheduled task creations. 3. Monitor network traffic for signs of modular payload downloads and suspicious connections to known malicious URLs such as 'http://resources.dawnnewsisl.com/updtdll'. 4. Use behavioral analytics to detect keylogging activities and anomalous file access patterns indicative of extensive data theft. 5. Conduct regular threat hunting exercises focusing on the identified malware hashes and YARA rules provided. 6. Harden systems by applying the principle of least privilege to limit malware’s ability to persist and propagate. 7. Educate employees on the risks of using untrusted USB devices and phishing attempts that may deliver initial infection vectors. 8. Maintain up-to-date backups isolated from the network to recover from potential data loss or ransomware attacks that could follow such infections. 9. Employ application whitelisting to prevent unauthorized DLLs from loading and restrict execution of unknown binaries. 10. Collaborate with threat intelligence providers to stay informed about emerging variants and indicators of compromise related to BRUSHWORM and BRUSHLOGGER.
Affected Countries
India, Pakistan, Bangladesh, Sri Lanka, Nepal
Indicators of Compromise
- hash: 4f1ea5ed6035e7c951e688bd9c2ec47a1e184a81e9ae783d4a0979501a1985cf
- hash: 89891aa3867c1a57512d77e8e248d4a35dd32e99dcda0344a633be402df4a9a7
- url: http://resources.dawnnewsisl.com/updtdll
- hash: 30896513cb0aefc78d0343e76d82b49f4afacf21
- hash: da2e41f026d2cca001ed584cd22cf4e5e02a8c8f
- yara: 30896513cb0aefc78d0343e76d82b49f4afacf21
- yara: da2e41f026d2cca001ed584cd22cf4e5e02a8c8f
BRUSHWORM and BRUSHLOGGER uncovered
Description
BRUSHWORM and BRUSHLOGGER are two custom malware components targeting a South Asian financial institution. BRUSHWORM is a modular backdoor with anti-analysis features, encrypted configurations, scheduled task persistence, USB worm propagation, and extensive file theft capabilities. BRUSHLOGGER is a keylogger that uses DLL side-loading to capture system-wide keystrokes along with window context. The malware shows signs of low sophistication and possible AI-assisted development, with multiple testing versions found on VirusTotal. Together, they form a functional data collection platform capable of bridging air-gapped networks via USB propagation and persistent keystroke capture. Although no known exploits are currently active in the wild, the malware’s capabilities pose a significant risk to confidentiality and data integrity. The threat primarily targets financial institutions in South Asia but could potentially spread to other regions with similar environments. Mitigation requires targeted detection of indicators of compromise, restricting USB device usage, and monitoring for DLL side-loading techniques.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The BRUSHWORM and BRUSHLOGGER malware suite was uncovered targeting a financial institution in South Asia. BRUSHWORM acts as a modular backdoor implant featuring multiple advanced capabilities such as anti-analysis checks to evade detection, encrypted configuration files to protect its settings, and persistence via scheduled tasks. It can download additional payloads, propagate through USB devices acting as a worm, and exfiltrate a wide range of files, enabling extensive data theft. BRUSHLOGGER complements this by implementing a keylogger that leverages DLL side-loading, a technique where a malicious DLL is loaded by a legitimate application, to capture keystrokes system-wide along with the context of the active window, increasing the value of stolen credentials and data. The malware’s code quality and flaws suggest it was developed by an inexperienced author, possibly using AI code-generation tools, as evidenced by multiple iterative versions found on VirusTotal. The combination of these two components creates a comprehensive data collection and exfiltration platform capable of bridging air-gapped networks through USB propagation, persistent keystroke logging, and modular payload delivery. Despite its medium severity rating and lack of known active exploits in the wild, the malware’s capabilities pose a serious threat to targeted organizations, especially in the financial sector. The malware employs several MITRE ATT&CK techniques including T1053.005 (Scheduled Task), T1056.001 (Keylogging), T1074.001 (File Deletion), T1036.005 (DLL Side-Loading), and T1105 (Ingress Tool Transfer), among others, indicating a multi-faceted approach to persistence, stealth, and data theft.
Potential Impact
Organizations targeted by BRUSHWORM and BRUSHLOGGER face significant risks to the confidentiality and integrity of sensitive data, particularly financial information. The malware’s ability to steal extensive files and capture keystrokes system-wide can lead to credential theft, unauthorized access, and financial fraud. USB worm propagation and air-gap bridging capabilities increase the risk of lateral movement and infection of isolated networks, which are typically considered highly secure. The persistence mechanisms and anti-analysis features complicate detection and removal, potentially allowing long-term espionage and data exfiltration. For financial institutions, this could result in severe financial losses, reputational damage, regulatory penalties, and erosion of customer trust. The malware’s low sophistication suggests that similar threats could proliferate easily, increasing the overall threat landscape for organizations with similar profiles worldwide.
Mitigation Recommendations
1. Implement strict controls on USB device usage, including disabling autorun features and restricting USB ports to authorized devices only. 2. Deploy endpoint detection and response (EDR) solutions capable of detecting DLL side-loading and unusual scheduled task creations. 3. Monitor network traffic for signs of modular payload downloads and suspicious connections to known malicious URLs such as 'http://resources.dawnnewsisl.com/updtdll'. 4. Use behavioral analytics to detect keylogging activities and anomalous file access patterns indicative of extensive data theft. 5. Conduct regular threat hunting exercises focusing on the identified malware hashes and YARA rules provided. 6. Harden systems by applying the principle of least privilege to limit malware’s ability to persist and propagate. 7. Educate employees on the risks of using untrusted USB devices and phishing attempts that may deliver initial infection vectors. 8. Maintain up-to-date backups isolated from the network to recover from potential data loss or ransomware attacks that could follow such infections. 9. Employ application whitelisting to prevent unauthorized DLLs from loading and restrict execution of unknown binaries. 10. Collaborate with threat intelligence providers to stay informed about emerging variants and indicators of compromise related to BRUSHWORM and BRUSHLOGGER.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.elastic.co/security-labs/brushworm-targets-financial-services"]
- Adversary
- null
- Pulse Id
- 69c643be1c9656febe1f3cc6
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash4f1ea5ed6035e7c951e688bd9c2ec47a1e184a81e9ae783d4a0979501a1985cf | — | |
hash89891aa3867c1a57512d77e8e248d4a35dd32e99dcda0344a633be402df4a9a7 | — | |
hash30896513cb0aefc78d0343e76d82b49f4afacf21 | — | |
hashda2e41f026d2cca001ed584cd22cf4e5e02a8c8f | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://resources.dawnnewsisl.com/updtdll | — |
Yara
| Value | Description | Copy |
|---|---|---|
yara30896513cb0aefc78d0343e76d82b49f4afacf21 | — | |
yarada2e41f026d2cca001ed584cd22cf4e5e02a8c8f | — |
Threat ID: 69c6518c3c064ed76f7f6213
Added to database: 3/27/2026, 9:44:44 AM
Last enriched: 3/27/2026, 9:59:55 AM
Last updated: 3/27/2026, 11:17:54 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.