• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  News  /  Banking malware, Dridex bounces back through PDF
Banking malware, Dridex bounces back through PDF
10 May 2017

Banking malware, Dridex bounces back through PDF

Written by Ankita Ashesh
Ankita Ashesh
News

Dridex is a banking malware which uses macros to spread on windows systems. Spam email attachments are utilized to spread this infection. Banking malware are generally key loggers. They trick users into opening the attachment; it then records the keystrokes on user’s computer and uses them for their own benefit. Recently spotted Dridex engagement contained PDF files as the carrier. Attachment contained invoice or payment receipt.

Subject line is “Copy of your 123-reg invoice (123-458452066 )”

Message body has details about the order placed and they have attached the payment receipt. Support details are given at the end of the mail to make it look genuine and convince the user to open the attachment.

How it spreads on the system:

  • Email has a PDF file and embedded Doc file in it

PDF name – 123-149715480-reg-invoice.pdf

Spreads via spam emails and tricks user to open it, stating payment receipt or invoice.

1

  • Embedded Docm file inside the PDF

2

  • After opening the PDF file, Adobe Reader shows a warning stating the Docm file you are opening can contain malicious macros or virus

3

Here as we can see the docm file 99848 is responsible for infection.

  • Drops Docm file at %temp% location such as “99848.docm”. Observed that it always drops a numeric docm file. File gets dropped when you click on “open the file” option shown during the warning when you open the PDF.

4

  • Document file which is dropped opens in read only mode and a yellow bar appears to enable editing to gain access and execute.

5

Dridex has changed its propagation method but the action remains the same. Similar way of spreading through Docm file, PDF just acts as a carrier. Stronger technique to identify spam mails and configure stronger firewall policy is a must.

Quick Heal Detection

  • Quick Heal Email Protection feature successfully blocks such malicious attachments (the script file, in this case) even before they are executed.
  • Quick Heal has given detection for the PDF and Embedded Doc file.

Precautionary Measures

  • Email attachment containing double extension such as pdf.bin or doc.js should never be opened if they are from unknown or untrusted sources.
  • Always visit websites which are known, do not click on any link or ad which shows tempting deals.
  • Regularly update your antivirus so that your data and system is safe from the ongoing malware trends.
  • Keep your software and operating system updated to ensure a secure digital environment.

ACKNOWLEDGMENT

Subject Matter Expert
• Nayan Vairagi
– Threat Research and Response Team

 Previous PostBrute force attack on Microsoft SQL
Next Post  WannaCry Ransomware Creating Havoc Worldwide by Exploiting Patche...
Ankita Ashesh

About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild

    June 10, 2022
  • Zero-day Vulnerability

    Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

    June 3, 2022
  • Advisory on Russia-Ukraine Conflict-Related Cyberattacks

    March 15, 2022
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies