Dridex is a prolific banking Trojan that first appeared in 2014. By December 2019, the US Treasury estimated Dridex had infected computers in hundreds of banks and financial institutions in over 40 countries, leading to more than $100 million in theft. Dridex was created from the source code of the Bugat banking Trojan (also known as Cridex).[1][2][3]
| Name | Description |
|---|---|
| Bugat v5 |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1090 | 代理 |
Dridex contains a backconnect module for tunneling network traffic through a victim's computer. Infected computers become part of a P2P botnet that can relay C2 traffic to other infected peers.[1][4] |
|
| .003 | Multi-hop Proxy |
Dridex can use multiple layers of proxy servers to hide terminal nodes in its infrastructure.[4] |
||
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| .002 | 加密通道: Asymmetric Cryptography | |||
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
Dridex can abuse legitimate Windows executables to side-load malicious DLL files.[5] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Dridex has used POST requests and HTTPS for C2 communications.[2][4] |
| Enterprise | T1106 | 本机API |
Dridex has used the |
|
| Enterprise | T1185 | 浏览器会话劫持 |
Dridex can perform browser attacks via web injects to steal information such as credentials, certificates, and cookies.[1] |
|
| Enterprise | T1027 | 混淆文件或信息 | ||
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
Dridex has relied upon users clicking on a malicious attachment delivered through spearphishing.[4] |
| Enterprise | T1218 | .010 | 系统二进制代理执行: Regsvr32 | |
| Enterprise | T1082 | 系统信息发现 |
Dridex has collected the computer name and OS architecture information from the system.[4] |
|
| Enterprise | T1518 | 软件发现 |
Dridex has collected a list of installed software on the system.[4] |
|
| Enterprise | T1219 | 远程访问软件 | ||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Dridex can maintain persistence via the creation of scheduled tasks within system directories such as |