ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Dridex

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Dridex

NamesDridex
Bugat v5
CategoryMalware
TypeBanking trojan, Credential stealer, Worm
DescriptionOxCERT blog describes Dridex as 'an evasive, information-stealing malware variant; its goal is to acquire as many credentials as possible and return them via an encrypted tunnel to a Command-and-Control (C&C) server. These C&C servers are numerous and scattered all over the Internet, if the malware cannot reach one server it will try another. For this reason, network-based measures such as blocking the C&C IPs is effective only in the short-term.'
According to MalwareBytes, 'Dridex uses an older tactic of infection by attaching a Word document that utilizes macros to install malware. However, once new versions of Microsoft Office came out and users generally updated, such a threat subsided because it was no longer simple to infect a user with this method.'
IBM X-Force discovered 'a new version of the Dridex banking Trojan that takes advantage of a code injection technique called AtomBombing to infect systems. AtomBombing is a technique for injecting malicious code into the 'atom tables' that almost all versions of Windows uses to store certain application data. It is a variation of typical code injection attacks that take advantage of input validation errors to insert and to execute malicious code in a legitimate process or application. Dridex v4 is the first malware that uses the AtomBombing process to try and infect systems.'
Information<https://www.us-cert.gov/ncas/alerts/aa19-339a>
<https://blog.trendmicro.com/trendlabs-security-intelligence/ursnif-emotet-dridex-and-bitpaymer-gangs-linked-by-a-similar-loader/>
<https://securelist.com/analysis/publications/78531/dridex-a-history-of-evolution/>
<https://blogs.it.ox.ac.uk/oxcert/2015/11/09/major-dridex-banking-malware-outbreak/>
<https://securityintelligence.com/dridexs-cold-war-enter-atombombing/>
<https://www.blueliv.com/downloads/documentation/reports/Network_insights_of_Dyre_and_Dridex_Trojan_bankers.pdf>
<https://www.govcert.admin.ch/blog/28/the-rise-of-dridex-and-the-role-of-esps>
<https://www.cert.pl/en/news/single/talking-dridex-part-0-inside-the-dropper/>
<https://viql.github.io/dridex/>
<https://www.flashpoint-intel.com/blog-dridex-banking-trojan-returns/>
<https://www.welivesecurity.com/2018/01/26/friedex-bitpaymer-ransomware-work-dridex-authors/>
<https://securityintelligence.com/posts/dridex-campaign-propelled-by-cutwail-botnet-and-powershell/>
<https://www.fortinet.com/blog/threat-research/new-dridex-variant-being-spread-by-crafted-excel-document>
<https://www.bleepingcomputer.com/news/security/log4j-vulnerability-now-used-to-install-dridex-banking-malware/>
<https://news.sophos.com/en-us/2022/02/23/dridex-bots-deliver-entropy-ransomware-in-recent-attacks/>
<https://unit42.paloaltonetworks.com/excel-add-ins-dridex-infection-chain/>
<https://www.trendmicro.com/en_us/research/23/a/-dridex-targets-macos-using-new-entry-method.html>
MITRE ATT&CK<https://attack.mitre.org/software/S0384/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.dridex>

Last change to this tool card: 15 February 2023

Download this tool card in JSON format

All groups using tool Dridex

ChangedNameCountryObserved

APT groups

XIndrik SpiderRussia2007-Oct 2024 HOTX
 TA505, Graceful Spider, Gold EvergreenRussia2006-Nov 2022X
 TA530[Unknown]2016-Nov 2016 

3 groups listed (3 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]