{"id":82419,"date":"2016-03-25T14:23:11","date_gmt":"2016-03-25T08:53:11","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=82382"},"modified":"2016-03-30T19:31:46","modified_gmt":"2016-03-30T14:01:46","slug":"report-the-dridex-trojan-is-back","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/report-the-dridex-trojan-is-back\/","title":{"rendered":"Report: The Dridex Trojan is Back"},"content":{"rendered":"<p>\u201cDridex\u201d, also known as \u2018Buget\u2019, is the successor of \u201cCridex\u201d, a banking Trojan created for stealing victim credentials. After its takedown by the US Government in late 2015, the malware has come up with new versions and techniques. This report aims to provide detailed insights into the infection vector of Dridex, its behavior, work flow and the precautions users must exercise against this malware.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-weight: bold;\">Infection Vector<\/span><\/p>\n<p>Dridex infiltrates the victim&#8217;s machine via spam emails containing malicious attachments. The attachment is a macro-based .doc or .xls file. As the victim opens the attached file, the embedded macro downloads the next payload without the user&#8217;s consent. As Microsoft has disabled macros from Office 2007, the malware provides guidelines to enable the same. Also, the same family uses known vulnerabilities in MS Office like CVE-2012-0158 to spread the infection.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82383\" aria-describedby=\"caption-attachment-82383\" style=\"width: 712px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/CryptoWall-4-1_figure-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82383 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/CryptoWall-4-1_figure-11.png\" alt=\"Spam email with malicious attachment\" width=\"712\" height=\"418\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/CryptoWall-4-1_figure-11.png 712w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/CryptoWall-4-1_figure-11-300x176.png 300w\" sizes=\"(max-width: 712px) 100vw, 712px\" \/><\/a><figcaption id=\"caption-attachment-82383\" class=\"wp-caption-text\">Figure 01 &#8211; Spam email with malicious attachment<\/figcaption><\/figure>\n<p><span style=\"font-size: 15px; color: #006bb2; font-weight: bold;\">Structure of the Macro<\/span><\/p>\n<p>Malware authors have been increasingly making using of macro to propagate malware due to its high rate of success. Macro used for this purpose are highly obfuscated to evade AV detection and to make its analysis difficult. The images below show some of the obfuscation techniques used by malware.<\/p>\n<p><span style=\"font-size: 16px; color: #ff6600; font-weight: bold;\">Code Obfuscation Technique 1<\/span><\/p>\n<figure id=\"attachment_82461\" aria-describedby=\"caption-attachment-82461\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-02-Obfuscation-technique-1-Uses-decimals-instead-of-characters.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82461 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-02-Obfuscation-technique-1-Uses-decimals-instead-of-characters.png\" alt=\"Figure 02 - Obfuscation technique 1 - Uses decimals instead of characters\" width=\"500\" height=\"72\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-02-Obfuscation-technique-1-Uses-decimals-instead-of-characters.png 500w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-02-Obfuscation-technique-1-Uses-decimals-instead-of-characters-300x43.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><figcaption id=\"caption-attachment-82461\" class=\"wp-caption-text\">Figure 02 &#8211; Obfuscation technique 1 &#8211; Uses decimals instead of characters<\/figcaption><\/figure>\n<p><span style=\"font-size: 16px; color: #ff6600; font-weight: bold;\">Code Obfuscation Technique 2<\/span><\/p>\n<figure id=\"attachment_82464\" aria-describedby=\"caption-attachment-82464\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-03-Obfuscation-technique-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82464 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-03-Obfuscation-technique-2.png\" alt=\"Figure 03 \u2013 Obfuscation technique 2\" width=\"500\" height=\"221\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-03-Obfuscation-technique-2.png 500w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-03-Obfuscation-technique-2-300x133.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><figcaption id=\"caption-attachment-82464\" class=\"wp-caption-text\">\u00a0 Figure 03 \u2013 Obfuscation technique 2<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>In this technique, the malware stores the encrypted bytes in an array which is passed to the custom decryption routine. It uses different seed values to decrypt these bytes. After this decryption, it comes with a URL which points to the next downloadable payload of the infection chain.<\/p>\n<p><span style=\"font-size: 16px; color: #ff6600; font-weight: bold;\">Format of the URL<\/span><\/p>\n<figure id=\"attachment_82466\" aria-describedby=\"caption-attachment-82466\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-04-Downloadable-URL.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82466 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-04-Downloadable-URL.png\" alt=\"Figure 04 - Downloadable URL\" width=\"300\" height=\"56\" \/><\/a><figcaption id=\"caption-attachment-82466\" class=\"wp-caption-text\">Figure 04 &#8211; Downloadable URL<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82470\" aria-describedby=\"caption-attachment-82470\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-05-Request-header.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82470 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-05-Request-header.png\" alt=\"Figure 05 \u2013 Request header\" width=\"300\" height=\"76\" \/><\/a><figcaption id=\"caption-attachment-82470\" class=\"wp-caption-text\">Figure 05 \u2013 Request header<\/figcaption><\/figure>\n<p>Once the connection is established, it downloads the file into %temp%\/. The file name is present in the macro itself. The downloaded file is the dropper of Dridex.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-weight: bold;\">Hosting Dridex<\/span><\/p>\n<p>The following figure shows the Dridex-hosting countries.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82472\" aria-describedby=\"caption-attachment-82472\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-06-Dridex-hosting-countries.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82472 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-06-Dridex-hosting-countries.png\" alt=\"Figure 06 - Dridex hosting countries\" width=\"650\" height=\"405\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-06-Dridex-hosting-countries.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-06-Dridex-hosting-countries-300x187.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption id=\"caption-attachment-82472\" class=\"wp-caption-text\">Figure 06 &#8211; Dridex hosting countries<\/figcaption><\/figure>\n<p><span style=\"font-size: 15px; color: #006bb2; font-weight: bold;\">Workflow of Dridex<\/span><\/p>\n<p>Malware authors of Dridex regularly update the internals to evade AV detection and keep the infection persistent. The following figure shows the workflow of Dridex.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82473\" aria-describedby=\"caption-attachment-82473\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-07-Worklow-of-Dridex.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82473 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-07-Worklow-of-Dridex.png\" alt=\"Figure 07 - Worklow of Dridex\" width=\"650\" height=\"383\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-07-Worklow-of-Dridex.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-07-Worklow-of-Dridex-300x177.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption id=\"caption-attachment-82473\" class=\"wp-caption-text\">Figure 07 &#8211; Worklow of Dridex<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<ul>\n<li>Downloaded binary is the dropper of Dridex which is just an obfuscated wrapper. It uses custom logic to decrypt the downloader of Dridex. After decryption, the result is a RtlCompressed downloader binary.<\/li>\n<li>This downloader contains an encrypted form of information required for C2 communication in last section, which is decrypted using hard-coded DWORD key with XOR operation and then uncompressed with APLib.<\/li>\n<li>We observed some changes in the configuration files it uses. Figure 08 shows the structure of the configuration file present with old files of Dridex.<\/li>\n<li>In the new version of the malware this information is stored in .data section in hex format. The malware converts it into decimal value when decrypting it. Figure 09 shows the structure of the new configuration file.<\/li>\n<\/ul>\n<figure id=\"attachment_82474\" aria-describedby=\"caption-attachment-82474\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-08-Configuration-file-in-old-version.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-82474\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-08-Configuration-file-in-old-version.png\" alt=\"Figure 08 - Configuration file in old version\" width=\"300\" height=\"141\" \/><\/a><figcaption id=\"caption-attachment-82474\" class=\"wp-caption-text\">Figure 08 &#8211; Configuration file in old version<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82475\" aria-describedby=\"caption-attachment-82475\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-09-Configuration-file-in-new-version.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82475 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-09-Configuration-file-in-new-version.png\" alt=\"Figure 09 - Configuration file in new version\" width=\"300\" height=\"80\" \/><\/a><figcaption id=\"caption-attachment-82475\" class=\"wp-caption-text\">Figure 09 &#8211; Configuration file in new version<\/figcaption><\/figure>\n<p><span style=\"font-size: 16px; color: #ff6600; font-weight: bold;\">Some observed BOT IDs: 120, 122, 200, 220, 222, 301<\/span><\/p>\n<p>Looking at the above configuration file, it is clear that the malware uses a non-standard port to communicate. The malware tries to connect these servers and once the connection is established, it uses POST request for further communication with bot server.<\/p>\n<p><b>Non-standard port:<\/b> 243, 343, 448, 543, 643, 666, 843, 1143, 1443, 1743, 2443, 2448, 3448, 4143, 4433, 4438, 4443, 4483, 4493, 4538, 5445, 6446, 7443, 7447, 8143, 8443, 8843, 9943<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-weight: bold;\">Dissecting Dridex<\/span><\/p>\n<p>Let us now take a look at the internal fragments of binary. As discussed earlier, the last section of the file contains an encrypted configuration file. The malware also used the encryption to get the required DLL and API names. The .rdata section contains this encrypted data. Operation to be performed is XOR on QWORD data. Let\u2019s have a look at the structure of .rdata section.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82476\" aria-describedby=\"caption-attachment-82476\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-10-Encrypted-data-structure.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82476 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-10-Encrypted-data-structure.png\" alt=\"Figure 10 - Encrypted data structure\" width=\"300\" height=\"115\" \/><\/a><figcaption id=\"caption-attachment-82476\" class=\"wp-caption-text\">Figure 10 &#8211; Encrypted data structure<\/figcaption><\/figure>\n<p>Once the required DLL\u2019s are loaded in memory, it collects all the information about the victim&#8217;s machine like user account name, operating system, and installed software in the following format.<\/p>\n<p><b>&lt;get_module_Unique=&#8221;acc_name-952?840B?_f4bd870915d84616b34abc222bc41032&#8243;botnet=&#8221;220&#8243;system=&#8221;23128&#8243;name=&#8221;bot&#8221; bit=&#8221;32&#8243;\/&gt; <\/b><\/p>\n<p>To collect the above information, it walks through the following registries in the system.<\/p>\n<p>HKEY_CURRENT_USER<b>Volatile Environment<\/b><br \/>\nHKEY_LOCAL_MACHINESoftwareMicrosoftCryptography<b>MachineGuid<\/b><br \/>\nHKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersion<b>InstallDate<\/b><br \/>\nHKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersion<b>CurrentVersion<\/b><\/p>\n<p>The bot sends this information to the servers listed in the configuration file. Before sending this information, it encrypts it with a custom encryption routine.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82477\" aria-describedby=\"caption-attachment-82477\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-11-Encryption-routine.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82477 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-11-Encryption-routine.png\" alt=\"Figure 11 - Encryption routine\" width=\"300\" height=\"62\" \/><\/a><figcaption id=\"caption-attachment-82477\" class=\"wp-caption-text\">Figure 11 &#8211; Encryption routine<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82478\" aria-describedby=\"caption-attachment-82478\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-12-Data-sent-to-C2-server.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82478 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-12-Data-sent-to-C2-server.png\" alt=\"Figure 12 - Data sent to C2 server\" width=\"650\" height=\"185\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-12-Data-sent-to-C2-server.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-12-Data-sent-to-C2-server-300x85.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption id=\"caption-attachment-82478\" class=\"wp-caption-text\">Figure 12 &#8211; Data sent to C2 server<\/figcaption><\/figure>\n<p>The above image shows the data transferred to C&amp;C server for further processing. It sends this data, until POST operation succeeds and if the server doesn\u2019t respond, then it tries the next one in the loop. Once the connection takes place, C2 server responds with a few SSL certificates. The following image shows a few SSL communications.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82479\" aria-describedby=\"caption-attachment-82479\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-13-SSL-communication.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82479 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-13-SSL-communication.png\" alt=\"Figure 13 - SSL communication\" width=\"500\" height=\"206\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-13-SSL-communication.png 500w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-13-SSL-communication-300x124.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><figcaption id=\"caption-attachment-82479\" class=\"wp-caption-text\">Figure 13 &#8211; SSL communication<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82480\" aria-describedby=\"caption-attachment-82480\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-14-Some-SSL-certificates.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82480 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-14-Some-SSL-certificates.png\" alt=\"Figure 14 - Some SSL certificates\" width=\"500\" height=\"190\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-14-Some-SSL-certificates.png 500w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-14-Some-SSL-certificates-300x114.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><figcaption id=\"caption-attachment-82480\" class=\"wp-caption-text\">Figure 14 &#8211; Some SSL certificates<\/figcaption><\/figure>\n<p>At this point, the malware is about to download the DLL which is implemented for stealing the victim\u2019s login credentials.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-weight: bold;\">Stealing Mechanism<\/span><\/p>\n<ul>\n<li>Earlier version of Dridex used the browser hooking technique while the current version is using a redirection scheme &#8211; used earlier by another banking Trojan known as Dyre.<\/li>\n<li>While Dyre uses a proxy connection to redirect the user to a malicious server on which the malicious page is being hosted, Dridex malware uses the DNS poisoning mechanism to accomplish the same feat.<\/li>\n<li>It poisons the DNS cache and whenever the victim connects with the specified financial target site, the malware redirects them to a malicious server controlled by the malware author.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_82481\" aria-describedby=\"caption-attachment-82481\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-15.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82481 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-15.png\" alt=\"Figure 15\" width=\"500\" height=\"247\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-15.png 500w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-15-300x148.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><figcaption id=\"caption-attachment-82481\" class=\"wp-caption-text\">Figure 15<\/figcaption><\/figure>\n<p><span style=\"font-size: 15px; color: #006bb2; font-weight: bold;\">Anti Automation Tricks<\/span><\/p>\n<p>Dridex malware hibernates in-between its execution in order to evade automation tools which monitor malware behavior for specific periods. After every request to <b>HttpSendRequestW()<\/b> the malware goes into sleep mode for a long time.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-weight: bold;\">Dridex C&amp;C Distribution<\/span><\/p>\n<figure id=\"attachment_82452\" aria-describedby=\"caption-attachment-82452\" style=\"width: 450px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-16.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-82452\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/03\/Figure-16.png\" alt=\"Figure 16\" width=\"450\" height=\"271\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-16.png 450w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-16-300x181.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/03\/Figure-16-250x150.png 250w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/a><figcaption id=\"caption-attachment-82452\" class=\"wp-caption-text\">Figure 16<\/figcaption><\/figure>\n<p><span style=\"font-size: 15px; color: #006bb2; font-weight: bold;\">Prevention Against Dridex<\/span><\/p>\n<ul>\n<li>As Microsoft has disabled auto execution of the macros in .doc files from 2007 it is important that you do not enable these macros unless you know them to be trustworthy.<\/li>\n<li>Your MS Office should be updated with the latest security patches to avoid exploitation of any vulnerability.<\/li>\n<li>Your security software should always be up-to-date.<\/li>\n<\/ul>\n<p><span style=\"font-size: 15px; color: #006bb2; font-weight: bold;\">ACKNOWLEDGMENT<\/span><\/p>\n<p><span style=\"font-size: 16px; color: #ff6600; font-weight: bold;\">Subject Matter Expert<\/span><\/p>\n<p>&#8211; Swapnil Patil, Threat Research &amp; Response Team, Quick Heal<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cDridex\u201d, also known as \u2018Buget\u2019, is the successor of \u201cCridex\u201d, a banking Trojan created for stealing victim credentials. After its takedown by the US Government in late 2015, the malware has come up with new versions and techniques. This report aims to provide detailed insights into the infection vector of Dridex, its behavior, work flow [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":82444,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,4,842],"tags":[1227,1228,47,40],"class_list":["post-82419","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-news","category-privacy","tag-dridex","tag-report","tag-security","tag-trojan"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82419"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=82419"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82419\/revisions"}],"predecessor-version":[{"id":82487,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82419\/revisions\/82487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/82444"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=82419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=82419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=82419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}