Threat Database Malware BunnnyLoader Malware

BunnnyLoader Malware

Security professionals have unearthed a new threatening tool called BunnyLoader, available for purchase in the cybercriminal underground. BunnyLoader offers a range of capabilities, including the ability to download and run a secondary payload, pilfer browser credentials and system data and numerous other functionalities.

BunnyLoader is Equipped with Potent Intrusive Capabilities

BunnyLoader boasts a range of harmful functions, including the capability to execute remote commands on the compromised machine, employ a keylogger to record keystrokes and utilize a clipper feature to monitor the clipboard of victims, replacing cryptocurrency wallet addresses with addresses controlled by fraud-related actors.

This C/C++-based loader is available for a lifetime license at $250 and has been in continuous development since its initial appearance on September 4, 2023. The ongoing development of the threat has seen BunnyLoader's abilities being expanded with new features and enhancements, including anti-sandbox and antivirus evasion techniques.

Later updates of the threat have addressed issues related to the Command-and-Control (C2, C&C) system and critical SQL injection vulnerabilities within the C2 panel. These vulnerabilities could have provided unauthorized access to the database. An important feature of BunnyLoader is its fileless loading capability, making it challenging for antivirus programs to remove the attacker's malware.

The C2 panel offers various options for buyers, allowing them to monitor active tasks, view infection statistics, track the number of connected and inactive hosts and access logs from the keylogger. Additionally, it grants cybercriminals the ability to delete data and remotely control the infected machines.

The Operational Chain of the BunnyLoader Malware

After installation, the malware establishes persistence by making changes to the Windows Registry. It then initiates a series of checks to detect sandbox and virtual machine environments before proceeding with its unsafe activities. This involves sending task requests to a remote server and receiving the desired responses.

These tasks encompass various functions, such as executing Trojan downloader tasks to download and run subsequent-stage malware, using the Intruder component to operate a keylogger and data-collecting mechanism, which targets messaging applications, VPN clients and Web browsers. Additionally, the malware employs Clipper to divert cryptocurrency payments for illicit gains.

The final step involves packaging all the collected data into a ZIP archive and transmitting it back to the controlling server.

Take Effective Measures against Malware Infections

Protecting your devices against malware infections requires a comprehensive approach that involves both proactive and reactive measures. Here, I'll describe the essential steps users can take to safeguard their devices without providing a simple list:

  • Stay Informed and Educated: One of the first and most crucial steps is to educate yourself about the various types of malware, their methods of infection, and the potential risks they pose. Understanding the threat landscape will help you make informed decisions.
  •  Use Reliable Security Software: Invest in reputable anti-malware software. Ensure it's up-to-date and set to perform regular scans of your system. This software can find and remove malware before it causes harm.
  •  Keep Operating Systems Updated: Regularly update your device's operating system (e.g., Windows, macOS, or Linux) and software applications. Updates often deliver patches for known vulnerabilities that malware can exploit.
  •  Secure Your Network: Use a unique password for your Wi-Fi network and enable encryption (e.g., WPA3). Regularly change router login credentials, and consider using a firewall to filter the incoming and outgoing traffic.
  •  Practice Safe Browsing Habits: Be cautious when interacting with links or downloading files from the Internet, especially from unfamiliar or suspicious websites. Use ad-blockers and avoid visiting unsafe or untrustworthy websites.
  •  Email Vigilance: Be skeptical of unsolicited emails, especially those with attachments or links. Don't open attachments or interact with links in emails from unknown senders. Verify the sender's identity when in doubt.

Incorporating these measures into your digital routine will greatly enhance your device's security against malware threats. Remember that staying vigilant and proactive is key to maintaining a safe computing environment.


Most Viewed