Inside DanaBot's Infrastructure: In Support of Operation Endgame II
DanaBot, a versatile and persistent threat since 2018, has evolved from a banking trojan to a multi-purpose malware platform. It maintained an average of 150 active C2 servers daily, with 1,000 daily victims across 40+ countries. The malware's stealth and multi-tiered architecture contributed to its success. Operated likely from Russia, DanaBot's infrastructure includes Tier 1, Tier 2, and Tier 3 C2 servers. The botnet's size peaked during high-profile events, with Mexico and the US among the most impacted countries. Despite its longevity, only 25% of its C2 servers had detectable malicious signatures. Operation Endgame II, a collaborative effort between security firms and law enforcement, dealt a significant blow to DanaBot's operations.
AI Analysis
Technical Summary
DanaBot is a sophisticated and persistent malware platform that has been active since 2018. Initially emerging as a banking trojan, DanaBot has evolved into a multi-purpose malware-as-a-service platform capable of a wide range of malicious activities, including information theft and command-and-control (C2) operations. The malware operates through a multi-tiered C2 infrastructure, consisting of Tier 1, Tier 2, and Tier 3 servers, which enhances its resilience and stealth capabilities. At its peak, DanaBot maintained approximately 150 active C2 servers daily and infected around 1,000 victims per day across more than 40 countries. Despite its widespread activity, only about 25% of its C2 servers exhibited detectable malicious signatures, indicating advanced evasion techniques. DanaBot’s infection vectors and tactics align with multiple MITRE ATT&CK techniques, including lateral movement (T1021.005), valid accounts exploitation (T1078, T1078.004), user execution (T1204.001, T1204.002), phishing (T1566.001, T1566.002), command and control over standard protocols (T1071), and exploitation of public-facing applications (T1190). Its modular architecture allows it to adapt to different operational goals, from stealing banking credentials to broader data exfiltration and persistence. The botnet’s size and activity have fluctuated, often increasing during high-profile events, with Mexico and the United States being the most impacted countries historically. The infrastructure is believed to be operated from Russia. Operation Endgame II, a coordinated effort by security firms and law enforcement, has significantly disrupted DanaBot’s operations, but the malware remains a medium-severity threat due to its stealth, adaptability, and global reach. The lack of known public exploits and the absence of patches suggest that mitigation relies heavily on detection and response rather than vulnerability remediation.
Potential Impact
For European organizations, DanaBot poses a significant risk primarily through its capabilities as an infostealer and banking trojan. The malware’s ability to stealthily infiltrate networks and maintain persistence can lead to substantial data breaches, financial theft, and operational disruption. Given its modular nature, DanaBot can be tailored to target specific industries or organizations, potentially compromising sensitive financial data, intellectual property, or personal information. The multi-tiered C2 infrastructure complicates takedown efforts and allows the malware to maintain control even if some servers are neutralized. European financial institutions, critical infrastructure providers, and enterprises with international operations are particularly at risk. The malware’s use of phishing and exploitation of valid credentials increases the likelihood of successful initial compromise, especially in environments with insufficient user awareness or weak credential management. The stealth tactics employed reduce the chances of early detection, potentially allowing prolonged unauthorized access and data exfiltration. Additionally, the geopolitical context, including tensions involving Russia, may increase the likelihood of targeted attacks against European entities perceived as strategic or high-value targets.
Mitigation Recommendations
1. Implement advanced email filtering and phishing detection solutions to reduce the risk of initial infection via spear-phishing campaigns (T1566.001, T1566.002). 2. Enforce strict credential hygiene policies, including multi-factor authentication (MFA) for all remote and privileged access to mitigate risks from credential theft and reuse (T1078, T1078.004). 3. Deploy network segmentation and strict access controls to limit lateral movement within networks, particularly focusing on restricting SMB and remote desktop protocol (RDP) usage (T1021.005). 4. Utilize endpoint detection and response (EDR) tools capable of identifying stealthy malware behaviors, such as unusual process injections, command-line execution patterns (T1059), and anomalous network traffic to known or suspected C2 servers (T1071, T1090). 5. Regularly update and audit firewall and intrusion detection/prevention systems (IDS/IPS) to detect and block communications with known DanaBot C2 infrastructure, leveraging threat intelligence feeds including the provided IOCs. 6. Conduct continuous user training focused on recognizing social engineering and phishing attempts, emphasizing the risks of executing unsolicited attachments or links (T1204). 7. Establish incident response plans that include rapid containment and eradication procedures for malware infections, with particular attention to multi-tiered C2 infrastructures. 8. Collaborate with national cybersecurity agencies and industry information sharing groups to stay informed on emerging DanaBot activity and participate in coordinated defense efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Czech Republic
Indicators of Compromise
- ip: 172.86.75.229
- ip: 179.43.176.41
- ip: 185.223.93.118
- ip: 185.196.10.20
- ip: 199.119.138.187
- ip: 23.137.105.248
- ip: 45.145.7.97
- ip: 46.105.141.51
- ip: 5.149.255.208
- ip: 107.173.160.166
- ip: 135.181.170.163
- ip: 135.181.242.179
- ip: 139.60.163.90
- ip: 144.172.100.208
- ip: 156.253.227.5
- ip: 157.180.65.252
- ip: 157.180.74.97
- ip: 162.33.179.34
- ip: 178.156.170.132
- ip: 179.43.176.42
- ip: 179.43.176.43
- ip: 185.121.235.211
- ip: 185.177.59.56
- ip: 185.196.9.52
- ip: 185.224.0.250
- ip: 185.245.106.72
- ip: 193.233.232.101
- ip: 194.116.216.91
- ip: 195.123.233.68
- ip: 196.251.116.36
- ip: 207.2.121.127
- ip: 23.137.105.249
- ip: 23.137.105.250
- ip: 23.137.105.251
- ip: 23.137.105.90
- ip: 31.192.232.25
- ip: 45.134.174.235
- ip: 45.137.116.57
- ip: 45.61.136.125
- ip: 45.61.136.204
- ip: 45.61.136.240
- ip: 47.253.151.139
- ip: 47.254.159.244
- ip: 47.254.81.3
- ip: 5.34.179.193
- ip: 5.34.179.197
- ip: 77.238.249.183
- ip: 77.73.129.134
- ip: 81.19.137.119
- ip: 82.24.200.28
- ip: 85.209.134.250
- ip: 85.209.153.112
- ip: 86.54.42.5
- ip: 89.116.64.46
- ip: 89.23.105.6
- ip: 91.242.163.235
- ip: 91.242.163.37
- ip: 91.242.163.44
- ip: 92.246.136.182
- ip: 94.131.109.182
- ip: 94.131.115.254
- ip: 94.232.249.215
- ip: 95.217.65.166
- ip: 98.159.108.137
- ip: 98.159.108.138
Inside DanaBot's Infrastructure: In Support of Operation Endgame II
Description
DanaBot, a versatile and persistent threat since 2018, has evolved from a banking trojan to a multi-purpose malware platform. It maintained an average of 150 active C2 servers daily, with 1,000 daily victims across 40+ countries. The malware's stealth and multi-tiered architecture contributed to its success. Operated likely from Russia, DanaBot's infrastructure includes Tier 1, Tier 2, and Tier 3 C2 servers. The botnet's size peaked during high-profile events, with Mexico and the US among the most impacted countries. Despite its longevity, only 25% of its C2 servers had detectable malicious signatures. Operation Endgame II, a collaborative effort between security firms and law enforcement, dealt a significant blow to DanaBot's operations.
AI-Powered Analysis
Technical Analysis
DanaBot is a sophisticated and persistent malware platform that has been active since 2018. Initially emerging as a banking trojan, DanaBot has evolved into a multi-purpose malware-as-a-service platform capable of a wide range of malicious activities, including information theft and command-and-control (C2) operations. The malware operates through a multi-tiered C2 infrastructure, consisting of Tier 1, Tier 2, and Tier 3 servers, which enhances its resilience and stealth capabilities. At its peak, DanaBot maintained approximately 150 active C2 servers daily and infected around 1,000 victims per day across more than 40 countries. Despite its widespread activity, only about 25% of its C2 servers exhibited detectable malicious signatures, indicating advanced evasion techniques. DanaBot’s infection vectors and tactics align with multiple MITRE ATT&CK techniques, including lateral movement (T1021.005), valid accounts exploitation (T1078, T1078.004), user execution (T1204.001, T1204.002), phishing (T1566.001, T1566.002), command and control over standard protocols (T1071), and exploitation of public-facing applications (T1190). Its modular architecture allows it to adapt to different operational goals, from stealing banking credentials to broader data exfiltration and persistence. The botnet’s size and activity have fluctuated, often increasing during high-profile events, with Mexico and the United States being the most impacted countries historically. The infrastructure is believed to be operated from Russia. Operation Endgame II, a coordinated effort by security firms and law enforcement, has significantly disrupted DanaBot’s operations, but the malware remains a medium-severity threat due to its stealth, adaptability, and global reach. The lack of known public exploits and the absence of patches suggest that mitigation relies heavily on detection and response rather than vulnerability remediation.
Potential Impact
For European organizations, DanaBot poses a significant risk primarily through its capabilities as an infostealer and banking trojan. The malware’s ability to stealthily infiltrate networks and maintain persistence can lead to substantial data breaches, financial theft, and operational disruption. Given its modular nature, DanaBot can be tailored to target specific industries or organizations, potentially compromising sensitive financial data, intellectual property, or personal information. The multi-tiered C2 infrastructure complicates takedown efforts and allows the malware to maintain control even if some servers are neutralized. European financial institutions, critical infrastructure providers, and enterprises with international operations are particularly at risk. The malware’s use of phishing and exploitation of valid credentials increases the likelihood of successful initial compromise, especially in environments with insufficient user awareness or weak credential management. The stealth tactics employed reduce the chances of early detection, potentially allowing prolonged unauthorized access and data exfiltration. Additionally, the geopolitical context, including tensions involving Russia, may increase the likelihood of targeted attacks against European entities perceived as strategic or high-value targets.
Mitigation Recommendations
1. Implement advanced email filtering and phishing detection solutions to reduce the risk of initial infection via spear-phishing campaigns (T1566.001, T1566.002). 2. Enforce strict credential hygiene policies, including multi-factor authentication (MFA) for all remote and privileged access to mitigate risks from credential theft and reuse (T1078, T1078.004). 3. Deploy network segmentation and strict access controls to limit lateral movement within networks, particularly focusing on restricting SMB and remote desktop protocol (RDP) usage (T1021.005). 4. Utilize endpoint detection and response (EDR) tools capable of identifying stealthy malware behaviors, such as unusual process injections, command-line execution patterns (T1059), and anomalous network traffic to known or suspected C2 servers (T1071, T1090). 5. Regularly update and audit firewall and intrusion detection/prevention systems (IDS/IPS) to detect and block communications with known DanaBot C2 infrastructure, leveraging threat intelligence feeds including the provided IOCs. 6. Conduct continuous user training focused on recognizing social engineering and phishing attempts, emphasizing the risks of executing unsolicited attachments or links (T1204). 7. Establish incident response plans that include rapid containment and eradication procedures for malware infections, with particular attention to multi-tiered C2 infrastructures. 8. Collaborate with national cybersecurity agencies and industry information sharing groups to stay informed on emerging DanaBot activity and participate in coordinated defense efforts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.team-cymru.com/post/inside-danabots-infrastructure-in-support-of-operation-endgame-ii","https://raw.githubusercontent.com/blacklotuslabs/IOCs/refs/heads/main/DanaBot_IOCs_txt"]
- Adversary
- DanaBot
- Pulse Id
- 6830c33591b2e16fa30806c3
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip172.86.75.229 | — | |
ip179.43.176.41 | — | |
ip185.223.93.118 | — | |
ip185.196.10.20 | — | |
ip199.119.138.187 | — | |
ip23.137.105.248 | — | |
ip45.145.7.97 | — | |
ip46.105.141.51 | — | |
ip5.149.255.208 | — | |
ip107.173.160.166 | — | |
ip135.181.170.163 | — | |
ip135.181.242.179 | — | |
ip139.60.163.90 | — | |
ip144.172.100.208 | — | |
ip156.253.227.5 | — | |
ip157.180.65.252 | — | |
ip157.180.74.97 | — | |
ip162.33.179.34 | — | |
ip178.156.170.132 | — | |
ip179.43.176.42 | — | |
ip179.43.176.43 | — | |
ip185.121.235.211 | — | |
ip185.177.59.56 | — | |
ip185.196.9.52 | — | |
ip185.224.0.250 | — | |
ip185.245.106.72 | — | |
ip193.233.232.101 | — | |
ip194.116.216.91 | — | |
ip195.123.233.68 | — | |
ip196.251.116.36 | — | |
ip207.2.121.127 | — | |
ip23.137.105.249 | — | |
ip23.137.105.250 | — | |
ip23.137.105.251 | — | |
ip23.137.105.90 | — | |
ip31.192.232.25 | — | |
ip45.134.174.235 | — | |
ip45.137.116.57 | — | |
ip45.61.136.125 | — | |
ip45.61.136.204 | — | |
ip45.61.136.240 | — | |
ip47.253.151.139 | — | |
ip47.254.159.244 | — | |
ip47.254.81.3 | — | |
ip5.34.179.193 | — | |
ip5.34.179.197 | — | |
ip77.238.249.183 | — | |
ip77.73.129.134 | — | |
ip81.19.137.119 | — | |
ip82.24.200.28 | — | |
ip85.209.134.250 | — | |
ip85.209.153.112 | — | |
ip86.54.42.5 | — | |
ip89.116.64.46 | — | |
ip89.23.105.6 | — | |
ip91.242.163.235 | — | |
ip91.242.163.37 | — | |
ip91.242.163.44 | — | |
ip92.246.136.182 | — | |
ip94.131.109.182 | — | |
ip94.131.115.254 | — | |
ip94.232.249.215 | — | |
ip95.217.65.166 | — | |
ip98.159.108.137 | — | |
ip98.159.108.138 | — |
Threat ID: 6830c74b0acd01a24927526c
Added to database: 5/23/2025, 7:06:51 PM
Last enriched: 6/22/2025, 7:35:00 PM
Last updated: 8/17/2025, 6:23:00 AM
Views: 39
Related Threats
Fake ChatGPT Desktop App Delivering PipeMagic Backdoor, Microsoft
MediumPhishing Scam with Fake Copyright Notices Drops New Noodlophile Stealer Variant
MediumSupply Chain Risk in Python: Termcolor and Colorama Explained
MediumMicrosoft 365 Direct Send Abuse: Phishing Risks & Security Recommendations
MediumThreatFox IOCs for 2025-08-17
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.