Scully Spider, TA547

Description

(Proofpoint) TA547 is responsible for many other campaigns since at least November 2017. The other campaigns by the actor were often localized to countries such as Australia, Germany, the United Kingdom, and Italy. Delivered malware included ZLoader (a.k.a. Terdot), Gootkit, Ursnif, Corebot, Panda Banker, Atmos, Mazar Bot, and Red Alert Android malware.

It is worth noting that samples of DanaBot found in a public malware repository contained different campaign IDs (the “a=” parameter) than the ones we observed in the wild, suggesting that there may be activity other than that which we observed.

Finally, we should mention that DanaBot bears some similarities in its technical implementation and choices of technology to earlier malware, in particular Reveton and CryptXXX [1], which were also written in Delphi and communicated using raw TCP to port 443. These malware strains also featured similarities in the style of C&C traffic.

DanaBot has been observed to be distributed by Smoke Loader (operated by Smoky Spider).

DanaBot itself has been observed to distribute CoreBot (Boson Spider), GandCrab and Sodinokibi (Pinchy Spider, Gold Southfield) and TrickBot (Wizard Spider, Gold Blackburn).

Names

NameName-Giver
Scully SpiderCrowdStrike
TA547Proofpoint

Country

Motivation

  • Financial crime
  • Financial gain

First Seen

2017

Observed Sectors

Observed Countries

Tools

Operations

Information

Other Information

Uuid

23122dca-5529-4f8f-b69d-d4a31a00c20a

Last Card Change

2024-04-22