News Heading

BunnyLoader: Novel Feature-Rich MaaS Targets Cryptocurrencies and VPNs

Reading time: 2 min

  • Shipra Sanganeria

    Written by: Shipra Sanganeria Cybersecurity & Tech Writer

A dangerous, new malware-as-a-service is up for sale on various dark web forums. The multi-feature malware called BunnyLoader, comes laden with various functionalities, from stealing system and browser information to executing a second-stage payload.

With regular bug fixes and feature updation, the MaaS tool’s basic version is available for $250 (lifetime license). The ‘payload + stub’ version, featuring advanced anti-analysis and persistent techniques, bug fixes, database access, and more, is available for $350, revealed Zscaler ThreatLabz researchers.

Primarily written in C/C++, the tool is a fileless loader that deploys different sandbox identification and antivirus evasion techniques to avoid detection. Since its launch in early September, BunnyLoader has been enriched with more capabilities.

Its command-and-control (C2) panel allows a hacker to perform various tasks including keylogging via an integrated keylogger, deploying additional malware, remote command execution, monitoring clipboards, hijacking crypto wallet addresses, and stealing credentials.

The C2 panel also enables the threat actor to oversee the success of their campaign by providing information like, infection statistics, ongoing tasks, stealer logs, and the total number of connected and disconnected devices.

The cloud security company also revealed the functioning of BunnyLoader, by analyzing a malware sample of the MaaS tool. By creating a new registry value, the malware was able to maintain persistence, create a mutex, perform various anti-evasion checks, as well as connect with its C2 server.

When connected to the C2, the malware can exfiltrate system information like, the host system’s location, IP address, system version, administrative privileges, and anti-virus used.

In addition to monitoring and stealing from the host, the malware has modules to log credentials from different browsers, VPNs (OpenVPN & ProtonVPN), messaging applications, and cryptocurrency wallets.

All the stolen data is compressed into a ZIP archive and transferred to the threat actor controlled C2 server.

According to the researchers, the malware will continue to gain prominence in the time to come, due to its feature-rich capabilities. ‘’BunnyLoader is a new MaaS threat that is continuously evolving their tactics and adding new features to carry out successful campaigns against their targets.’’

Did you like this article? Rate it!
I hated it I don't really like it It was ok Pretty good! Loved it!
0 Voted by 0 users
Title
Comment
Thanks for your feedback
Please wait 5 minutes before posting another comment.
Comment sent for approval.

Leave a Comment

Show more...