https://thehackernews.com/2024/03/new-bunnyloader-malware-variant.html #Cybercrime #Malware #BunnyLoader
π¨ New threat: #BunnyLoader 3.0 #malware variant emerges with advanced modules for data theft, keylogging, and evasion tactics.
https://thehackernews.com/2024/03/new-bunnyloader-malware-variant.html
Another day, another cybersecurity threat - BunnyLoader 3.0 aims at your login credentials, crypto and more!
https://hackread.com/bunnyloader-3-0-malware-steals-credentials-crypto/
via @HackRead
#CyberSecurity #BunnyLoader #Malware #Crypto
BunnyLoader Malware Targets Browsers and Cryptocurrency - https://www.redpacketsecurity.com/bunnyloader-malware-targets-browsers-and-cryptocurrency/
#threatintel #Malware-as-a-Service_(MaaS) #BunnyLoader #Cybersecurity_threats
Once installed, the malware establishes persistence through a Windows Registry change and undergoes sandbox and virtual machine checks before executing its malicious behavior.
#BunnyLoader #Cybersecurity #Malware #Cyberthreat #MaaS #GitHub
Cybersecurity researchers have recently uncovered a new malware-as-a-service (MaaS) threat known as BunnyLoader, which is being advertised for sale on the dark web. According to an analysis by Zscaβ¦
"π° BunnyLoader Unleashed: The Newest Kid on the Malware Block π°"
In a recent discovery, Zscaler ThreatLabz stumbled upon a new Malware-as-a-Service (MaaS) threat named "BunnyLoader" being peddled on various forums. This nefarious service offers a plethora of malicious functionalities including downloading and executing a second-stage payload, pilfering browser credentials and system information, keylogging, and even cryptocurrency theft through clipboard manipulation. π΅οΈββοΈπ»
The malware, written in C/C++, is sold for a lifetime price of $250 and is under rapid development with multiple feature updates and bug fixes. It employs various anti-sandbox techniques during its attack sequence to evade detection and has a fileless loader feature which executes further malware stages in memory. BunnyLoader's C2 panel allows the threat actor to control infected machines remotely, showcasing a list of various tasks including keylogging, credential theft, and remote command execution among others. ππ
The detailed technical analysis reveals how BunnyLoader maintains persistence, performs anti-VM techniques, registers with the C2 server, and executes its core malicious tasks. The malware also harbors a clipper module to replace cryptocurrency addresses in a victim's clipboard with addresses controlled by the threat actor, targeting multiple cryptocurrencies like Bitcoin, Ethereum, and Monero. πͺπΈ
The article is a comprehensive dive into the technical intricacies of BunnyLoader, shedding light on its modus operandi and the potential threat it poses to individuals and organizations alike. π§π
Source: Zscaler ThreatLabz
Tags: #BunnyLoader #MalwareAsAService #CyberSecurity #ThreatAnalysis #Malware #CryptocurrencyTheft #Zscaler #ThreatLabz #InfoSec
Authors: NIRAJ SHIVTARKAR, SATYAM SINGH