BunnyLoader

12403126298?profile=RESIZE_400xThe technical article below from Palo Alto Networks focuses on the newly released BunnyLoader 3.0, a historical observation of BunnyLoader infrastructure, and an overview of its capabilities.  BunnyLoader is dynamically developing malware that can steal information, credentials, and cryptocurrency and deliver additional malware to its victims.  In an increasingly cutthroat market, cybercriminals must regularly update and retool their malware to compete with other cybercriminals, security tools, and researchers.   Since its initial discovery in September of 2023, BunnyLoader malware as a service (MaaS) has frequently updated its functionality to include the following:

  • Bug fixes
  • Additional antivirus evasion and protections
  • Multiple data recovery functionalities for the stealer portion
  • Additional browser paths
  • Keylogger functionality

Additional activity discovered in October 2023 by Unit 42 threat researchers revealed the threat actor continued to modify and retool BunnyLoader. The threat actor frequently changed their tactics to deliver and execute the malware, which appears to be an attempt to further obfuscate and evade detection.

Samples collected during this time included packed binaries using PureCrypter, UPX, and Themida during various November campaigns.  In December, the BunnyLoader payload was delivered as a follow-up payload to a Nanocore infection using a novel .NET injector.  Threat actors changed the filenames of the malware to mimic legitimate video games and other applications.

Frequent changes in tactics, techniques and procedures (TTPs) like infrastructure, packers, encryption and method of exfiltration help the attacker evade detection.  It’s also meant to undermine cybersecurity researchers’ ability to detect and analyze the threat actor’s activities.

On 11 February 2024, the threat actor behind BunnyLoader announced the release of BunnyLoader 3.0, boasting the malware has been “completely redesigned and enhanced by 90%.”

The threat actor claims enhancements to BunnyLoader payloads include:

  • Payloads/modules “completely rewritten for improved performance.”
  • Reduced payload size
  • Advanced keylogging capabilities

By revealing the threat actor’s continued development of the malware and its evolving TTPs, we aim to empower readers to detect and hopefully prevent this threat. 

If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team.

Behind the Ears of BunnyLoader

BunnyLoader has had a rapid development cycle.  Version 1.0 was first seen in September 2023, advertised on the dark web as a MaaS botnet and loader malware written in C/C++.  It had a variety of capabilities, such as the following:

  • Fileless loading
  • Credential theft
  • Cryptocurrency theft
  • Clipboard theft

The threat actor behind this malware is known as “Player” or “Player_Bunny.”  The buyer determines what malware BunnyLoader delivers.  The author of this malware prohibits its use against Russian systems.  Malware authors residing in or around Russian territory commonly prohibit the use of their malware against Russian targets. Threat actors likely use this restriction as a way to stay off of Russian law enforcement’s radar.  As early as 4 September 2023, the threat actor “Player” initially offered BunnyLoader version 1.0 on various forums at $250 for lifetime access.  An example of this advertisement is shown below in Figure 1.

12403130073?profile=RESIZE_710xFigure 1. Dark web post advertising BunnyLoader 1.0. Source: @DailyDarkWeb on X (Twitter).

By the end of September 2023, BunnyLoader underwent a rapid retooling.  According to the BunnyLoader advertisement, new features include the following:

Command-and-control (C2) panel bug fixes

  • Antivirus evasion
  • Multiple data recovery methods used for information theft
  • Added browser paths
  • Keylogger functionality
  • Anti-analysis protections

The malware loader ecosystem usually is in a state of flux.  During the previous month, August 2023, there was a significant impact on the prolific malware family Qakbot with the joint law enforcement takedown operation.  This event likely signaled an opportunity for other MaaS loader operators to gain a market foothold.  As such, the aggressive retooling and updating by the BunnyLoader author might have been to attract market interest and increase its adoption.  By the end of September, the author had released BunnyLoader 2.0 and it was seen in the wild.

In October, the author offered a “private” malware version for $350.  Unlike the original version, the author obfuscated this private version, and they made regular updates to evade antivirus protections.  Threat actors were likely motivated to make these updates because security researchers discovered the malware in late September.

The threat actor advertised their most recent version, BunnyLoader 3.0, on their Telegram channel on 11 February 2024.

Observed Infrastructure: From Burrows to Bytes

When security researchers initially discovered BunnyLoader 1.0 in September, it used 37.139.129[.]145 for its C2 server, as noted in Figure 2.
12403129880?profile=RESIZE_400xFigure 2. X (formerly known as Twitter) was posted by a security researcher, 0xperator. Source: @0xperator on X (Twitter).

In the earliest known samples of BunnyLoader, the client communicated with C2 servers using a standardized directory structure of http://[url]/Bunny/[PHP endpoint], as shown below in Figure 3. This pattern remains consistent throughout all samples leading up to the release of BunnyLoader 3.0.

12403130669?profile=RESIZE_710xFigure 3. URLs we have observed reflecting the directory structure on the C2 server at 37.139.129[.]145.BunnyLoader 2.0 uses URLs ending with Add.php to initially register the BunnyLoader client with the C2 server. Prior to registration, the malware enumerates the device and uses the collected information as a fingerprint to identify distinct targets.

Once BunnyLoader establishes communication with the C2, it repeatedly sends requests using URLs ending with TaskHandler.php. Responses from these requests initialized further malicious tasks performed by BunnyLoader.

Threat authors coded these tasks into separate functions, which included the following:

  • Keylogging
  • Clipboard theft
  • Downloading additional malware
  • Remote command execution
  • Crypto wallet theft
  • Application credential theft

During October, analysts observed new C2 infrastructure hosted at 185.241.208[.]83.  That month, we also found BunnyLoader samples delivered via a conspicuous ZIP archive named Shovel Knight.zip.  Further analysis revealed the contents of Shovel Knight.zip include a Windows executable, which is the stager for BunnyLoader 2.0.

Shovel Knight is a well-known video game for which development was crowdfunded.  It was then released by major video game platforms.  The threat actors’ use of the names of legitimate software is undoubtedly an effort to trick users into opening and executing the malicious files.

During November, we identified subsequent campaigns using C2 servers hosted at:

195.10.205[.]23

172.105.124[.]34

Samples we collected in November 2023 used Themida to pack Windows executable files for BunnyLoader.  In addition to Themida, analyst observed a cluster of PureCrypter samples in November 2023 designed to deliver BunnyLoader.  These techniques indicate the operators of BunnyLoader started taking additional measures to protect their malware.

During December, Palo Alto observed new C2 servers at:

134.122.197[.]80

91.92.254[.]31

That month’s infection chain was far more complex than seen in previous months. We observed additional changes in TTPs, where the infection chain started with a previously unseen dropper leading to PureCrypter and forking into two branches as shown in Figure 4.

12403130501?profile=RESIZE_710xFigure 4. Overview of December infection chain.

One branch from the PureCrypter infection continues to deploy additional Pure malware by dropping the PureLogs loader and then delivering the PureLogs stealer. The second branch results in PureCrypter leveraging a .NET injector to deliver BunnyLoader, masquerading as the file notepet.exe. Notepet is a pet health tracker application for pet owners.  The analyst also observed BunnyLoader using a misspelling of the app for the filename notep.exe.  Threat actors used this file to deliver the Meduza stealer malware.  Following the December activity, the threat author advertised another massive retooling with the release of BunnyLoader 3.0 on Feb. 11, 2024, as shown in Figure 5. Senior threat intelligence researcher @RussianPanda9xx first publicly shared this announcement on X (Twitter), as shown below in Figure 6.
12403131062?profile=RESIZE_584xFigure 5. Advertisement for BunnyLoader 3.0 on Telegram.


12403131262?profile=RESIZE_584xFigure 6. X (formerly known as Twitter) post by threat intelligence researcher @RussianPanda.

The latest version of BunnyLoader, version 3.0, uses a different directory structure on its C2 servers than we saw in version 2.0.  This directory structure is formatted as http://[C2]/[path]/[PHP API].  Analysts discuss this information in more detail in the Hopping Through the Bytes section.  In BunnyLoader 3.0, the threat actor uses a dropper delivered via a CMD file with the BunnyLoader malware embedded in the dropper to provide the actual malicious payload.  Once attackers deliver BunnyLoader to the target machine, the malware reaches out to a C2 server at 91.92.247[.]212, which then responds and waits for further instruction from the threat actor.

Sample Analysis: Hopping Through the Bytes of BunnyLoader 3.0

On 14 February 2024, security researcher Germán Fernández identified the first known sample of BunnyLoader 3.0 contained in a malicious .cmd script discovered by @ViriBack.  Palo Alto researchers tracking this threat analyzed the updated BunnyLoader file extracted from the .cmd script.  They identified several significant changes from prior versions, including updates to the C2 communication protocol and modularization of the binary.  As many aspects of BunnyLoader have not changed and are well documented in other write-ups, we focused our analysis in this article on new features.  The following sections are not a comprehensive analysis but rather highlight key features found in the latest version.

Command and Control Update

The base URI structure of the C2 communication remains unchanged from prior versions, using the format http://[C2]/[path]/[PHP API].  The sample of BunnyLoader mentioned previously is configured to communicate with the C2 server located at hxxp://ads[.]hostloads[.]xyz/BAGUvIxJu32I0/gate.php.  While previous versions of BunnyLoader used the string Bunny in the URL path, BunnyLoader 3.0 allows the operator to specify the path name.

Before the release of version 3.0, BunnyLoader servers used multiple PHP API endpoints to receive communication from clients (shown in Figure 3).  All samples of BunnyLoader 3.0 observed by Unit 42 use one endpoint, gate.php.  Rather than sending HTTP parameters in cleartext, as seen in previous versions, BunnyLoader 3.0 will obfuscate these values using RC4 encryption.  A random 32-character key is generated each time BunnyLoader is executed, which is used to RC4 encrypt all HTTP query parameter values.  The encrypted values are converted into char code and URL encoded, as seen in Figure 7, wherein a client makes an initial connection to the C2 server.
12403131272?profile=RESIZE_584xFigure 7. Example of HTTP headers from an initial connection to the BunnyLoader C2 server.

For the C2 server to differentiate between client requests, each client function uses a unique URI parameter format, along with a specific user agent. Table 1. below outlines all possible C2 communication routines, including their purpose and parameters used.  HTTP query parameter names and values are listed in the rightmost column, with notations in parentheses to indicate usage. Unit 42 created the ID column for reference purposes.

ID

Purpose

User Agent

HTTP/S URI Parameters

1

Establishes an initial connection to the C2 server.

Windows Defender

ipaddress
hostname
version (BunnyLoader version)
system (Operating System)
privileges (Local or Admin)
arch (CPU Architecture)
antivirus
disk_id (Bot ID)
key (BL Operator Key)
enc_key (RC4 Key)

2

Sends a heartbeat to the C2 every 50 seconds.

Avast

heart (BL Operator Key)
hostname
system (Operating System)
arch (CPU Architecture)
heart_enc_key (RC4 Key)

3

Sends a request every two seconds. The expected response is a command run via the Windows command line.

ESET SECURITY

hostname
system
arch
cecho (BL Operator Key)
enc_cecho (RC4 Key)

4

Response to the C2 after executing the command in the previous row.

McAffe

val (BL Operator Key)
hostname
system
arch
value (command output)
va_enc_key (RC4 Key)

5

Sends a request every two seconds. The expected response is a specially formatted command parsed by the client.

AVG

BID (Bot ID)
bid_enc_key (RC4 Key)

6

Response to the C2 after executing the command in the previous row.

Google Chrome

CID (Command ID)
bid (Bot ID)
enc_key (RC4 Key)

7

Sends a request every two seconds. The expected response is a specially formatted command parsed by the client. Used to download the denial-of-service (DoS) module.

Avast

DBID (Bot ID)
DBID_enc_key (RC4 Key)

8

Response to the C2 after executing the command in the previous row.

Google Chrome

DCID (Command ID)
DBID (Bot ID)
d_enc_key (RC4 Key)

 

Task Name

Summary

Download & Inject (Executable) [FileLess]

Downloads .exe specified by Task_Arg and injects it into notepad.exe, which is entirely in memory.

Download & Inject (DLL) [RTI]

Downloads .dll specified by Task_Arg to the %localappdata%/Temp folder and injects it into calc.exe. 

Download & Execute (Executable)

Downloads .exe specified by Task_Arg to the %localappdata%/Temp folder and executes it using CreateProcessA.

Download & Execute (DLL)

Downloads .dll specified by Task_Arg to the %localappdata%/Temp folder and executes it using rundll32.

Download & Execute (Batch)

Downloads .bat or .cmd script specified by Task_Arg to the %localappdata%/Temp folder and executes it using CreateProcessA.

Download & Execute (PowerShell)

Downloads .ps1 specified by Task_Arg to the %localappdata%/Temp folder and executes it using powershell -ExecutionPolicy Bypass -File.

Download & Execute (VBS)

Downloads .vbs specified by Task_Arg to the %localappdata%/Temp folder and executes it using cscript.exe.

Run Stealer

Downloads the BunnyLoader stealer module from a path hard-coded in the binary and injects it into notepad.exe, entirely in memory.

Run Keylogger

Downloads the BunnyLoader keylogger module from a path hard-coded in the binary and injects it into notepad.exe, entirely in memory.

(Any of the following) Bitcoin, Bitcoin Cash, Monero, Ethereum, Litecoin, Dogecoin, ZCash, Tether, XRP

Downloads the BunnyLoader clipper module from a path hard-coded in the binary and injects it into notepad.exe, entirely in memory.

Table 1. BunnyLoader C2 functions and associated communications.

The C2 address, C2 path, BunnyLoader version, and operator ID are all hard-coded in the binary.  This function also generates the RC4 key, as shown in Figure 8 below.

12403132467?profile=RESIZE_710xFigure 8. BunnyLoader client configuration function as seen using IDA Pro.


Modularization of BunnyLoader Binary

The second major change in BunnyLoader 3.0 is the transition from one file to a smaller base client with features available as downloadable modules.  While most client code is similar to previous versions, BunnyLoader’s custom stealer, clipper, keylogger, and new DoS functions are now separated into distinct binaries.  Operators of BunnyLoader can choose to deploy these modules or use BunnyLoader’s built-in commands to load their choice of malware.  When running on a target computer, BunnyLoader will check in with the C2 every two seconds (see row five in Table 1), awaiting a specifically formatted command.  These instructions facilitate the download and execution of additional malware on the target’s computer and are formatted in the following manner:

1

ID --> [value]; Task_Name --> [value]; Task_Args --> [value]; DLL --> [value]

The Task_Name and Task_Arg values are extracted from the command and passed to corresponding functions, which instruct the client how to download and execute the new payload.  All HTTP download requests performed via these commands will utilize either the user agent ESET NOD32 (download is saved to disk) or curl/1.0 (fileless injection), and all downloaded files are saved to the victim’s %localappdata%\Temp folder.  The client will send a response back to the C2 containing the Command ID (CID) value extracted from the command, using the format shown in row six of Table 1.

Table 2 below summarizes all possible tasks that the C2 can send to the client.

Task Name

Summary

Download & Inject (Executable) [FileLess]

Downloads .exe specified by Task_Arg and injects it into notepad.exe, which is entirely in memory.

Download & Inject (DLL) [RTI]

Downloads .dll specified by Task_Arg to the %localappdata%/Temp folder
and injects it into calc.exe. 

Download & Execute (Executable)

Downloads .exe specified by Task_Arg to the %localappdata%/Temp folder
and executes it using CreateProcessA.

Download & Execute (DLL)

Downloads .dll specified by Task_Arg to the %localappdata%/Temp folder
and executes it using rundll32.

Download & Execute (Batch)

Downloads .bat or .cmd script specified by Task_Arg to the %localappdata%/Temp folder
and executes it using CreateProcessA.

Download & Execute (PowerShell)

Downloads .ps1 specified by Task_Arg to the %localappdata%/Temp folder
and executes it using PowerShell -ExecutionPolicy Bypass -File.

Download & Execute (VBS)

Downloads .vbs specified by Task_Arg to the %localappdata%/Temp folder
and executes it using cscript.exe.

Run Stealer

Downloads the BunnyLoader stealer module from a path hard-coded in the binary
and injects it into notepad.exe, entirely in memory.

Run Keylogger

Downloads the BunnyLoader keylogger module from a path hard-coded in the binary
and injects it into notepad.exe, entirely in memory.

(Any of the following) Bitcoin, Bitcoin Cash, Monero, Ethereum, Litecoin, Dogecoin, ZCash, Tether, XRP

Downloads the BunnyLoader clipper module from a path hard-coded in the binary
and injects it into notepad.exe, entirely in memory.

Table 2. BunnyLoader commands.

The new DoS module download is handled in a separate thread, which will check in with the C2 every two seconds (see row seven in Table 1), awaiting a specifically formatted command.  Upon receiving the appropriate command, the client will download and inject the DoS module into notepad.exe.  Researchers noted the following URL structures used to download the BunnyLoader 3.0 modules, as shown in Table 3 below.  The filenames and URL format remained constant across multiple samples.

Module URL

Purpose

http://[C2]/[path]/Modules/eSentire.exe

Stealer module

http://[C2]/[path]/Modules/zScaler.exe

DoS module

http://[C2]/[path]/Modules/any_run.exe

Clipper module

http://[C2]/[path]/Modules/NextronSystems.exe

Keylogger module

Table 3. BunnyLoader 3.0 module URLs.

The following sections highlight the key functions of each BunnyLoader 3.0 module.


Keylogger Module

The BunnyLoader 3.0 keylogger records all keystrokes, saving them to log files in the % localappdata%Temp folder. The keylogger also attempts to identify when the victim authenticates to sensitive applications or services. To do so, it uses the GetForegroundWindow and GetWindowTextA APIs to identify when the victim interacts with targeted applications or services. It will log the respective keystrokes to separate, hard-coded files, as shown in Table 4 below.

Window Title or Application Name

Log Location (Hard-Coded)

CredentialUIBroker.exe

mstsc.exe

%localappdata%\Temp\ADE_RDP.txt

Log in to your PayPal

%localappdata%\Temp\ADE_PAYPAL.txt

Nord Account

%localappdata%\Temp\ADE_NORD.txt

Sign in - chase.com

%localappdata%\Temp\ADE_CHASE.txt

Bank of America - Banking, Credit Cards, Loans

%localappdata%\Temp\ADE_BOA.txt

Sign On to View Your Personal Accounts | Wells Fargo

%localappdata%\Temp\ADE_WF.txt

Citi.com

%localappdata%\Temp\ADE_CITI.txt

All other keystrokes

%localappdata%\Temp\ADE_KEY.txt

Table 4. BunnyLoader keylogger log file locations.

Stealer Module

The BunnyLoader 3.0 stealer module operates autonomously, stealing credentials and exfiltrating data directly to the C2 server, using the same http://[C2]/[path]/[PHP API] format as the base client.  All information theft functions will store collected data in the %localappdata%\Temp\ADE_LOGS folder. The stealer is also responsible for uploading logs from the keylogger module, which it will search for and copy to the same folder.

Once all data has been collected, the stealer will use PowerShell to compress the ADE_LOGS folder into a .zip file. Before exfiltrating the .zip, the stealer will send a GET request to the C2 with a summary of the stolen data, using Windows Defender as the user agent.

Query parameters of the HTTP GET requests are outlined in Table 5 below.

HTTP Query Parameter

Value

theft_id

Bot ID

ipaddress

Target IP address

system

Operating system

chromium

Number of browsers captured

messages

Number of messaging services captured

wallets

Number of crypto wallets captured

keystrokes

Number of keystroke log files found

games

Number of gaming platforms captured

vpns

Number of VPN services captured

files

Number of targeted files captured (see Appendix for targeted file extensions)

extensions

Number of Chrome extensions captured

type

Hard-coded value of ZIP

size

Size of ZIP file

link

String in the format: http://[C2]/[path]/Logs/ADE_LOGS_[hostname].zip

key_code

Operator ID

enc_key

RC4 Key

Table 5. BunnyLoader stealer module, parameters in the first request to C2.

If the C2 responds appropriately, the stealer module will upload the .zip file, using the user agent Uploader and a custom Content-Type HTTP header, as shown in Figure 9 below.  Once the upload is complete, the stealer will delete the collected data and the .zip file.

12403133056?profile=RESIZE_710xFigure 9. HTTP traffic of data exfiltration by BunnyLoader’s stealer module.

Clipper Module

The BunnyLoader 3.0 clipper module periodically checks in with the C2, using the communication routine specified in rows five and six of Table 1.  The C2 activates the clipper by sending the name of a cryptocurrency wallet to the target, along with a corresponding wallet address controlled by the threat actor.

The clipper uses regex patterns to identify whether the target’s clipboard contains a desired wallet address type.  If it finds a match, it will replace the victim’s address with the malware operator’s address.  Table 6 below shows the targeted wallets and the regex statements used to identify them.

Wallet

Regex

Bitcoin_Legacy

^(bc1|[13])[a-zA-HJ-NP-Z0-9]{25,39}$

Bitcoin_Bech32

^[13][a-km-zA-HJ-NP-Z1-9]{25,34}$

erc-20

^T[1-9A-HJ-NP-Za-km-z]{33}$

try-20

^0x[0-9a-fA-F]{40}$

Bitcoin Cash

^((bitcoincash:)?(q|p)[a-z0-9]{41})

Monero

^4([0-9]|[A-B])(.){93}

Litecoin

^[LM3][a-km-zA-HJ-NP-Z1-9]{26,33}$

Dogecoin

^[DB][1-9A-HJ-NP-Za-km-z]{26,34}$

ZCash

^t1[a-zA-Z0-9]{33}$

xrp_address

r[1-9A-HJ-KM-NP-Za-km-z]{25,34}

Table 6. Wallets targeted by the BunnyLoader 3.0 clipper module and their associated regex patterns.

Denial of Service Module

The BunnyLoader 3.0 DoS module waits for commands from the C2 using the communication routine specified in rows seven and eight of Table 1.  The C2 can instruct the module to perform a GET or POST HTTP flood attack against a specified URL.  To perform the attack, the module will spawn a new thread and enter an infinite loop, repeatedly sending GET or POST requests to the target server with the following user agent:

Mozilla/5.0 (compatible; U; ABrowse 0.6; Syllable) AppleWebKit/420+ (KHTML, like Gecko)

Conclusion

In the ever-changing landscape of MaaS, BunnyLoader continues to evolve, demonstrating the need for threat actors to retool to evade detection frequently.  Revealing these changing tactics and the dynamic nature of this threat empowers readers to bolster their defense posture and better protect their assets.

Indicators of Compromise

Files for BunnyLoader:

SHA256

Notes

First Seen

3a64f44275b6ff41912654ae1a4af1d9c629f94b8062be441902aeff2d38af3e

UPX-packed EXE

Sep. 9, 2023

0f425950ceaed6578b2ad22b7baea7d5fe4fd550a97af501bca87d9eb551b825

UPX-packed EXE

Sep. 9, 2023

82a3c2fd57ceab60f2944b6fea352c2aab62b79fb34e3ddc804ae2dbc2464eef

Themida-packed EXE

Nov. 11, 2023

2ab21d859f1c3c21a69216c176499c79591da63e1907b0d155f45bb9c6aed4eb

PureCrypter EXE

Nov 18, 2023

c006f2f58784671504a1f2e7df8da495759227e64f58657f23efee4f9eb58216

PureCrypter EXE

Nov. 18, 2023

52b7cdf5402f77f11ffebc2988fc8cdcd727f51a2f87ce3b88a41fd0fb06a124

PureCrypter EXE

Nov. 18, 2023

5f09411395c8803f2a735b71822ad15aa454f47e96fd10acc98da4862524813a

PureCrypter EXE

Nov. 18, 2023

cc2acf344677e4742b22725ff310492919499e357a95b609e80eaddc2b155b4b

PureCrypter EXE

Nov. 18, 2023

ebc17dbf5970acb38c35e08560ae7b38c7394f503f227575cd56ba1a4c87c8a4

PureCrypter EXE

Nov. 18, 2023

2d39bedba2a6fb48bf56633cc6943edc6fbc86aa15a06c03776f9971a9d2c550

PureCrypter EXE

Nov. 18, 2023

2e9d6fb42990126155b8e781f4ba941d54bcc346bcf85b30e3348dde75fbeca1

PureCrypter EXE

Nov. 18, 2023

74c56662da67972bf4554ff9b23afc5bdab477ba8d4929e1d7dbc608bdc96994

PureCrypter EXE

Nov. 18, 2023

fffdf51cdb54f707db617b29e2178bb54b67f527c866289887a7ada4d26b7563

PureCrypter EXE

Nov. 18, 2023

62f041b12b8b4e0debd6e7e4556b4c6ae7066fa17e67900dcbc991dbd6a8443f

PureCrypter EXE

Dec. 16, 2023

1a5ad9ae7b0dcdc2edb7e93556f2c59c84f113879df380d95835fb8ea3914ed8 (BunnyLoader 3.0 Dropper)

.cmd script

Feb. 14, 2024

c80a63350ec791a16d84b759da72e043891b739a04c7c1709af83da00f7fdc3a (BunnyLoader 3.0)

EXE payload from the above .cmd script

Feb. 14, 2024

 

BunnyLoader Network Indicators:

BotID

C2 IP address

Seen

BotID=880873019

37.139.129[.]145

September 2023

BotID=3565265299

37.139.129[.]145

September 2023

BotID=272148461

37.139.129[.]145

September 2023

BotID=2475708340

37.139.129[.]145

September 2023

BotID=2341255921

37.139.129[.]145

September 2023

BotID=3763204704

185.241.208[.]83

October 2023

BotID=337525325

185.241.208[.]83

October 2023

BotID=2098524523

185.241.208[.]83

October 2023

BotID=774055690

185.241.208[.]83

October 2023

BotID=3408378377

195.10.205[.]23

November 2023

BotID=2219025839

195.10.205[.]23

November 2023

 

172.105.124[.]34

November 2023

 

185.241.208[.]104

November 2023

BotID=4040267350

134.122.197[.]80

December 2023

BotID=1662989558

134.122.197[.]80

December 2023

BotID=3860674539

134.122.197[.]80

December 2023

YARA Rule

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

rule u42_crime_win_bunnyloader_3: windows_memory

{

 meta:

  author = "Unit 42 Threat Intelligence"

  date = "2024-02-28"

  description = "Detects Bunnyloader 3.0, a loader with additional capabilities including keylogger, stealer, clipper, and DoS modules."

  hash1 = "c80a63350ec791a16d84b759da72e043891b739a04c7c1709af83da00f7fdc3a"

  malware_family = "bunnyloader"

 

 

 strings:

  $x1 = "Windows Defender" fullword ascii

  $x2 = "ONLINE" fullword ascii

  $x3 = "Blacklisted" fullword ascii

  $x4 = "ESET NOD32" fullword ascii

  $x5 = "McAffee" fullword ascii

  $x6 = "SecurityCenter2 path AntiVirusProduct get displayName" fullword ascii

  $cc1 = "&va_enc_key=" fullword ascii

  $cc2 = "&value=" fullword ascii

  $cc3 = "&arch=" fullword ascii

  $cc4 = "&system=" fullword ascii

  $cc5 = "&hostname" fullword ascii

  $cc6 = "&DBID_enc_key=" fullword ascii

  $cc7 = "/gate.php?DBID=" fullword ascii

  $cc8 = "/gate.php?DCID=" fullword ascii

  $cc9 = "(ID|Layer|Windows_Argument)" ascii

 

 

 condition:

  all of them

}

Additional Resources

 

This article is shared at no charge for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225 or feedback@redskyalliance.com    

Weekly Cyber Intelligence Briefings:

REDSHORTS - Weekly Cyber Intelligence Briefings

https://attendee.gotowebinar.com/register/5993554863383553632

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!