Microsoft Word becomes preferred channel for delivering Dridex banking trojan

Microsoft Word becomes preferred channel for delivering Dridex banking trojan

The Dridex banking trojan that retrieves the victims banking credentials has added a very novel method of spreading itself, via Word documents. The attackers used macros in the office suite to inject the Dridex banking trojan on targeted computers. Macros are scripts with instructions designed to automate repetitive tasks and are usually used mostly in MS Excel and MS Word.

An Evolution

Dridex is the next step in the evolution of the trojan, the predecessor versions being Feodo/Bugat/Cridex Trojans that then developed into Geodo. It preserves the bank information stealing capabilities of its previous versions but changed the method used for compromising the compute. ย Another change has been the targets. While its predecessor targeted customers of banks in Germany, Dridex banking trojan seems to be specifically targeting American citizens.

Like its precursors, Dridex is a sophisticated Banking Trojan, similar to the infamous Zeus malware. Its core functionality is to steal credentials of online banking websites and to allow the cyber criminals to siphon money from victims bank account. Dridex uses an XML-based configuration file to specify which websites it should target and other options for the malware. For instance, the configuration specifies which websites to capture form submissions from, and which to ignore with the following XML.

<formgrabber>
<url type=โ€denyโ€>\.(swf)($|\?)</url>
<url type=โ€denyโ€>/isapi/ocget.dll</url>
<url type=โ€allowโ€>^https?://aol.com/.*/login/</url>
<url type=โ€allowโ€>^https?://accounts.google.com/ServiceLoginAuth</url>
<url type=โ€allowโ€>^https?://login.yahoo.com/</url>
<url type=โ€allowโ€>^https?://login.live.com/</url>
<url type=โ€denyโ€>^https?://(\w+\.)?aol.com</url>
<url type=โ€denyโ€>^https?://(\w+\.)?facebook.com/</url>
<url type=โ€denyโ€>^https?://(\w+\.)?google</url>
<url type=โ€denyโ€>^https?://(\w+\.)?yahoo</url>
<url type=โ€denyโ€>^https?://(\w+\.)?youtube.com</url>
<url type=โ€denyโ€>^https?://(\w+\.)?live.com</url>
<url type=โ€denyโ€>^https?://(\w+\.)?twitter.com</url>
<url type=โ€denyโ€>^https?://(\w+\.)?vk.com</url>
<url type=โ€denyโ€>^https.*ocsp\..+$</url>
<url type=โ€denyโ€>^https.*safebrowsing\..+$</url>
<url type=โ€denyโ€>^https?://fhr\.data\.mozilla\.com</url>
<url type=โ€denyโ€>^https://s.*\.symcd\.com</url>
<url type=โ€denyโ€>^https://s.*\.symcb\.com</url>
<url type=โ€denyโ€>^https.*ocsp2\..+$</url>
<url type=โ€denyโ€>localhost.+skypectoc/.+$</url>
<url type=โ€denyโ€>\.messenger\.live\.com</url>
<url type=โ€denyโ€>pipe\.skype\.com</url>
<url type=โ€denyโ€>\.optimatic\.com</url>
<url type=โ€denyโ€>hiro\.tv</url>
<url type=โ€denyโ€>spotxchange\.com</url>
<url type=โ€denyโ€>nielsen\.com</url>
<url type=โ€denyโ€>mapquest\.com</url>
<url type=โ€denyโ€>^https://.+\.skype\.com/api/</url>
<url type=โ€denyโ€>(//|\.)lphbs.com</url>
<url type=โ€denyโ€>(//|\.)zynga.com</url>
</formgrabber>

The first wave of Dridex banking trojan began on October 21, with e-mails claiming to carry invoices from Humber Merchantโ€™s group. ย The country wise breakup of victims are receiving the files containing the Dridex banking trojan as below :

Microsoft Word becomes preferred channel for delivering Dridex banking trojan

The Attack

The attack is based on the premise of sending the target the infected word file. When the user opens the file, the macro in the file will automatically downloads the trojan from a remote server which the cyber criminals control. Different versions of Dridex will thus be downloaded all having the same purpose, stealing banking credentials.ย The word documents delivering the Dridex banking trojan contain a complex VBA macro that downloads an executable from one of the following URLs and executes it on the system.

https://gpsbah[.]com/images/1.exe
https://jvsfiles[.]com/common/1.exe
https://jvssys[.]com/js/1.exe
https://mirafarm[.]ro/html/js/bin.exe
https://palitosdepan[.]com/js/bin.exe
https://www.juglarsa.com[.]ar/images/1.exe

These are all legitimate websites that appear to be compromised by the cyber criminals or masterminds running this Dridex campaign. The files are each different versions of the Dridex malware that communicate with their command and control servers over HTTP.

The Remedy

This trojan uses macros in the Office suite. So the best approach to prevent such a trojan is to disable macros right from the beginning. Microsoft realises the flaws in macro use and disables them by default in the Office suite, however there is no patch for such kind of trojan as of yet. A user can however, enable and use them whenever desired.

Abuse.ch operates the Feodo Tracker, a service dedicated to keeping an eye on the command and control (C&C) servers used by the actors behind the malware campaign. Out of 93 tracked machines for communications containing the Dridex banking trojan, ย the service shows that at the moment there are 12 servers online, four of them being located in Russia.

Resource : Palo Alto Networks Research Centre

Delwyn Pinto
Delwyn Pinto
A person proud to have an alternate view

Read More

Suggested Post