Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

BRUSHWORM and BRUSHLOGGER uncovered

0
Medium
Published: Fri Mar 27 2026 (03/27/2026, 08:45:50 UTC)
Source: AlienVault OTX General

Description

BRUSHWORM and BRUSHLOGGER are two custom malware components targeting a South Asian financial institution. BRUSHWORM is a modular backdoor with anti-analysis features, encrypted configurations, scheduled task persistence, USB worm propagation, and extensive file theft capabilities. BRUSHLOGGER is a keylogger that uses DLL side-loading to capture system-wide keystrokes along with window context. The malware shows signs of low sophistication and possible AI-assisted development, with multiple testing versions found on VirusTotal. Together, they form a functional data collection platform capable of bridging air-gapped networks via USB propagation and persistent keystroke capture. Although no known exploits are currently active in the wild, the malware’s capabilities pose a significant risk to confidentiality and data integrity. The threat primarily targets financial institutions in South Asia but could potentially spread to other regions with similar environments. Mitigation requires targeted detection of indicators of compromise, restricting USB device usage, and monitoring for DLL side-loading techniques.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 09:59:55 UTC

Technical Analysis

The BRUSHWORM and BRUSHLOGGER malware suite was uncovered targeting a financial institution in South Asia. BRUSHWORM acts as a modular backdoor implant featuring multiple advanced capabilities such as anti-analysis checks to evade detection, encrypted configuration files to protect its settings, and persistence via scheduled tasks. It can download additional payloads, propagate through USB devices acting as a worm, and exfiltrate a wide range of files, enabling extensive data theft. BRUSHLOGGER complements this by implementing a keylogger that leverages DLL side-loading, a technique where a malicious DLL is loaded by a legitimate application, to capture keystrokes system-wide along with the context of the active window, increasing the value of stolen credentials and data. The malware’s code quality and flaws suggest it was developed by an inexperienced author, possibly using AI code-generation tools, as evidenced by multiple iterative versions found on VirusTotal. The combination of these two components creates a comprehensive data collection and exfiltration platform capable of bridging air-gapped networks through USB propagation, persistent keystroke logging, and modular payload delivery. Despite its medium severity rating and lack of known active exploits in the wild, the malware’s capabilities pose a serious threat to targeted organizations, especially in the financial sector. The malware employs several MITRE ATT&CK techniques including T1053.005 (Scheduled Task), T1056.001 (Keylogging), T1074.001 (File Deletion), T1036.005 (DLL Side-Loading), and T1105 (Ingress Tool Transfer), among others, indicating a multi-faceted approach to persistence, stealth, and data theft.

Potential Impact

Organizations targeted by BRUSHWORM and BRUSHLOGGER face significant risks to the confidentiality and integrity of sensitive data, particularly financial information. The malware’s ability to steal extensive files and capture keystrokes system-wide can lead to credential theft, unauthorized access, and financial fraud. USB worm propagation and air-gap bridging capabilities increase the risk of lateral movement and infection of isolated networks, which are typically considered highly secure. The persistence mechanisms and anti-analysis features complicate detection and removal, potentially allowing long-term espionage and data exfiltration. For financial institutions, this could result in severe financial losses, reputational damage, regulatory penalties, and erosion of customer trust. The malware’s low sophistication suggests that similar threats could proliferate easily, increasing the overall threat landscape for organizations with similar profiles worldwide.

Mitigation Recommendations

1. Implement strict controls on USB device usage, including disabling autorun features and restricting USB ports to authorized devices only. 2. Deploy endpoint detection and response (EDR) solutions capable of detecting DLL side-loading and unusual scheduled task creations. 3. Monitor network traffic for signs of modular payload downloads and suspicious connections to known malicious URLs such as 'http://resources.dawnnewsisl.com/updtdll'. 4. Use behavioral analytics to detect keylogging activities and anomalous file access patterns indicative of extensive data theft. 5. Conduct regular threat hunting exercises focusing on the identified malware hashes and YARA rules provided. 6. Harden systems by applying the principle of least privilege to limit malware’s ability to persist and propagate. 7. Educate employees on the risks of using untrusted USB devices and phishing attempts that may deliver initial infection vectors. 8. Maintain up-to-date backups isolated from the network to recover from potential data loss or ransomware attacks that could follow such infections. 9. Employ application whitelisting to prevent unauthorized DLLs from loading and restrict execution of unknown binaries. 10. Collaborate with threat intelligence providers to stay informed about emerging variants and indicators of compromise related to BRUSHWORM and BRUSHLOGGER.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.elastic.co/security-labs/brushworm-targets-financial-services"]
Adversary
null
Pulse Id
69c643be1c9656febe1f3cc6
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash4f1ea5ed6035e7c951e688bd9c2ec47a1e184a81e9ae783d4a0979501a1985cf
hash89891aa3867c1a57512d77e8e248d4a35dd32e99dcda0344a633be402df4a9a7
hash30896513cb0aefc78d0343e76d82b49f4afacf21
hashda2e41f026d2cca001ed584cd22cf4e5e02a8c8f

Url

ValueDescriptionCopy
urlhttp://resources.dawnnewsisl.com/updtdll

Yara

ValueDescriptionCopy
yara30896513cb0aefc78d0343e76d82b49f4afacf21
yarada2e41f026d2cca001ed584cd22cf4e5e02a8c8f

Threat ID: 69c6518c3c064ed76f7f6213

Added to database: 3/27/2026, 9:44:44 AM

Last enriched: 3/27/2026, 9:59:55 AM

Last updated: 3/27/2026, 11:17:54 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses