Original Article Text

Click to Toggle View

New BunnyLoader threat emerges as a feature-rich malware-as-a-service. Security researchers discovered a new malware-as-a-service (MaaS) named 'BunnyLoader' advertised on multiple hacker forums as a fileless loader that can steal and replace the contents of the system clipboard. The malware is under rapid development, with updates adding new features and bug fixes. It can currently download and execute payloads, log keys, steal sensitive data and cryptocurrency, and execute remote commands. The first version of BunnyLoader emerged on September 4. Since then, its developers added more functions, like multiple anti-detection mechanisms and extra info-stealing capabilities, releasing a second major version towards the end of the month. Researchers at cloud security company Zscaler note that BunnyLoader is quickly becoming popular among cybercriminals as a feature-rich malware available for a low price. BunnyLoader overview BunnyLoader's command and control panel allows even low-skilled cybercriminals set a second-stage payload, enable keylogging, credential stealing, clipboard manipulation (for stealing cryptocurrency), and running remote commands on infected devices. In a recent report, researchers say that after being executed on a compromised device, BunnyLoader creates a new value in the Windows Registry for persistence, hides its window, sets a mutex to avoid multiple instances of itself, and registers the victim into the control panel. The malware performs several checks to determine if it's running on a sandbox or simulated environment and throws a fake architecture incompatibility error if the result is positive. Apart from the mentioned functions, the malware also features modules to steal data stored on web browsers (passwords, credit cards, browsing history), cryptocurrency wallets, VPNs, messaging apps, and more, essentially acting as a standard info-stealer. All stolen data are compressed into a ZIP archive before they are exfiltrated to the threat actor's command and control (C2) server. According to the researchers, BunnyLoader supports writing payloads to the disk before executing them, and can also run them from the system memmory (fileless) using the process hollowing technique. Rapid development Zscaler monitored the malware's development and announcements on multiple hacking forums and noticed that it went through numerous updates since its initial release. Here's a summary of BunnyLoader's development timeline: In its current state, BunnyLoader is sold for $250, while the "private stub" version, which features stronger anti-analysis, in-memory injection, AV evasion, and additional persistence mechanisms, sells for $350. This low price, combined with the rapid development cycle, make BunnyLoader a lucrative choice for cybercriminals seeking early-bird deals on emerging malware projects before they gain prominence and increase their rates. Zscaler's report provides technical details that can help detect the malware before it establishes persistence as well as indicators of compromise that could prevent an infection. 

Daily Brief Summary

MALWARE // New Malware-as-a-service 'BunnyLoader' Poses Growing Threat

A new malware-as-a-service called 'BunnyLoader' has been discovered, which can steal and replace the contents of the system clipboard.

BunnyLoader is under rapid development with new features and bug fixes being added regularly.

The malware has the ability to download and execute payloads, log keys, steal sensitive data and cryptocurrency, and execute remote commands.

According to researchers at Zscaler, BunnyLoader is becoming popular among cybercriminals due to its rich features and low price.

The researchers also note that BunnyLoader has the capability of evading detection and can install, hide and register itself on a victim's device.

BunnyLoader can steal data stored on web browsers, including passwords and credit card information, as well as data from cryptocurrency wallets, VPNs, and messaging apps. This stolen data is then compressed into a ZIP archive and sent to the hacker's server.

The threat posed by BunnyLoader is increasing due to its low price and rapid development, making it an appealing choice for cybercriminals seeking to exploit new malware projects.