From URSNIF IoCs to Software Spoofing | WhoisXML API

Threat Reports

From URSNIF IoCs to Software Spoofing: Using DNS Intel to Connect the Dots

The URSNIF banking Trojan has consistently evolved throughout the years, threatening financial organizations with data theft. It was recently seen being used by TA544 to target Italian banks.

More than 40 IP addresses and domains were publicly listed1, 2, 3, 4 as URSNIF indicators of compromise (IoCs). WhoisXML API researchers subjected them to a DNS intelligence analysis to uncover more connected artifacts, including:

  • 18 IP- and email-connected artifacts, eight of which were flagged as malicious based on a bulk malware check 
  • 1,067 string-connected artifacts likely targeting Avast and Debian
  • 653 unique IP addresses hosting the string-connected artifacts, some of which were malicious according to a bulk malware check

Download a sample of the threat research materials now or contact us to access the complete set of research materials.

  • [1]
  • [2]
  • [3]
  • [4]
  • [5]
Try our WhoisXML API for free
Get started