Skip to main content

Inside DanaBot's Infrastructure: In Support of Operation Endgame II

Medium
Published: Fri May 23 2025 (05/23/2025, 18:49:25 UTC)
Source: AlienVault OTX General

Description

DanaBot, a versatile and persistent threat since 2018, has evolved from a banking trojan to a multi-purpose malware platform. It maintained an average of 150 active C2 servers daily, with 1,000 daily victims across 40+ countries. The malware's stealth and multi-tiered architecture contributed to its success. Operated likely from Russia, DanaBot's infrastructure includes Tier 1, Tier 2, and Tier 3 C2 servers. The botnet's size peaked during high-profile events, with Mexico and the US among the most impacted countries. Despite its longevity, only 25% of its C2 servers had detectable malicious signatures. Operation Endgame II, a collaborative effort between security firms and law enforcement, dealt a significant blow to DanaBot's operations.

AI-Powered Analysis

AILast updated: 06/22/2025, 19:35:00 UTC

Technical Analysis

DanaBot is a sophisticated and persistent malware platform that has been active since 2018. Initially emerging as a banking trojan, DanaBot has evolved into a multi-purpose malware-as-a-service platform capable of a wide range of malicious activities, including information theft and command-and-control (C2) operations. The malware operates through a multi-tiered C2 infrastructure, consisting of Tier 1, Tier 2, and Tier 3 servers, which enhances its resilience and stealth capabilities. At its peak, DanaBot maintained approximately 150 active C2 servers daily and infected around 1,000 victims per day across more than 40 countries. Despite its widespread activity, only about 25% of its C2 servers exhibited detectable malicious signatures, indicating advanced evasion techniques. DanaBot’s infection vectors and tactics align with multiple MITRE ATT&CK techniques, including lateral movement (T1021.005), valid accounts exploitation (T1078, T1078.004), user execution (T1204.001, T1204.002), phishing (T1566.001, T1566.002), command and control over standard protocols (T1071), and exploitation of public-facing applications (T1190). Its modular architecture allows it to adapt to different operational goals, from stealing banking credentials to broader data exfiltration and persistence. The botnet’s size and activity have fluctuated, often increasing during high-profile events, with Mexico and the United States being the most impacted countries historically. The infrastructure is believed to be operated from Russia. Operation Endgame II, a coordinated effort by security firms and law enforcement, has significantly disrupted DanaBot’s operations, but the malware remains a medium-severity threat due to its stealth, adaptability, and global reach. The lack of known public exploits and the absence of patches suggest that mitigation relies heavily on detection and response rather than vulnerability remediation.

Potential Impact

For European organizations, DanaBot poses a significant risk primarily through its capabilities as an infostealer and banking trojan. The malware’s ability to stealthily infiltrate networks and maintain persistence can lead to substantial data breaches, financial theft, and operational disruption. Given its modular nature, DanaBot can be tailored to target specific industries or organizations, potentially compromising sensitive financial data, intellectual property, or personal information. The multi-tiered C2 infrastructure complicates takedown efforts and allows the malware to maintain control even if some servers are neutralized. European financial institutions, critical infrastructure providers, and enterprises with international operations are particularly at risk. The malware’s use of phishing and exploitation of valid credentials increases the likelihood of successful initial compromise, especially in environments with insufficient user awareness or weak credential management. The stealth tactics employed reduce the chances of early detection, potentially allowing prolonged unauthorized access and data exfiltration. Additionally, the geopolitical context, including tensions involving Russia, may increase the likelihood of targeted attacks against European entities perceived as strategic or high-value targets.

Mitigation Recommendations

1. Implement advanced email filtering and phishing detection solutions to reduce the risk of initial infection via spear-phishing campaigns (T1566.001, T1566.002). 2. Enforce strict credential hygiene policies, including multi-factor authentication (MFA) for all remote and privileged access to mitigate risks from credential theft and reuse (T1078, T1078.004). 3. Deploy network segmentation and strict access controls to limit lateral movement within networks, particularly focusing on restricting SMB and remote desktop protocol (RDP) usage (T1021.005). 4. Utilize endpoint detection and response (EDR) tools capable of identifying stealthy malware behaviors, such as unusual process injections, command-line execution patterns (T1059), and anomalous network traffic to known or suspected C2 servers (T1071, T1090). 5. Regularly update and audit firewall and intrusion detection/prevention systems (IDS/IPS) to detect and block communications with known DanaBot C2 infrastructure, leveraging threat intelligence feeds including the provided IOCs. 6. Conduct continuous user training focused on recognizing social engineering and phishing attempts, emphasizing the risks of executing unsolicited attachments or links (T1204). 7. Establish incident response plans that include rapid containment and eradication procedures for malware infections, with particular attention to multi-tiered C2 infrastructures. 8. Collaborate with national cybersecurity agencies and industry information sharing groups to stay informed on emerging DanaBot activity and participate in coordinated defense efforts.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.team-cymru.com/post/inside-danabots-infrastructure-in-support-of-operation-endgame-ii","https://raw.githubusercontent.com/blacklotuslabs/IOCs/refs/heads/main/DanaBot_IOCs_txt"]
Adversary
DanaBot
Pulse Id
6830c33591b2e16fa30806c3

Indicators of Compromise

Ip

ValueDescriptionCopy
ip172.86.75.229
ip179.43.176.41
ip185.223.93.118
ip185.196.10.20
ip199.119.138.187
ip23.137.105.248
ip45.145.7.97
ip46.105.141.51
ip5.149.255.208
ip107.173.160.166
ip135.181.170.163
ip135.181.242.179
ip139.60.163.90
ip144.172.100.208
ip156.253.227.5
ip157.180.65.252
ip157.180.74.97
ip162.33.179.34
ip178.156.170.132
ip179.43.176.42
ip179.43.176.43
ip185.121.235.211
ip185.177.59.56
ip185.196.9.52
ip185.224.0.250
ip185.245.106.72
ip193.233.232.101
ip194.116.216.91
ip195.123.233.68
ip196.251.116.36
ip207.2.121.127
ip23.137.105.249
ip23.137.105.250
ip23.137.105.251
ip23.137.105.90
ip31.192.232.25
ip45.134.174.235
ip45.137.116.57
ip45.61.136.125
ip45.61.136.204
ip45.61.136.240
ip47.253.151.139
ip47.254.159.244
ip47.254.81.3
ip5.34.179.193
ip5.34.179.197
ip77.238.249.183
ip77.73.129.134
ip81.19.137.119
ip82.24.200.28
ip85.209.134.250
ip85.209.153.112
ip86.54.42.5
ip89.116.64.46
ip89.23.105.6
ip91.242.163.235
ip91.242.163.37
ip91.242.163.44
ip92.246.136.182
ip94.131.109.182
ip94.131.115.254
ip94.232.249.215
ip95.217.65.166
ip98.159.108.137
ip98.159.108.138

Threat ID: 6830c74b0acd01a24927526c

Added to database: 5/23/2025, 7:06:51 PM

Last enriched: 6/22/2025, 7:35:00 PM

Last updated: 8/17/2025, 6:23:00 AM

Views: 39

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats