
Dell Sonicwall Threats research team have discovered a new variant of the Cridex Banking Trojan. The Trojan utilizes the blackhole exploit kit for drive-by system infection. The purpose of this Trojan is to steal online banking credentials. It has the ability to intercept encrypted communications between banking websites and their customers.
The infection occurs when visiting a webpage with a malicious blackhole script :


The Trojan creates the following file on the filesystem:
The Trojan creates the following key in the Windows registry to enable startup after reboot:
Upon infection the Trojan injects code into explorer.exe, causing it to send the following sensitive data, encrypted, to a remote C&C server:

In the same manner as in a previous variant, it hooks various Winsock internet communication API's to intercept incoming and outgoing browser traffic.

It also hooks crypto API's such as CryptDecrypt, CryptEncrypt, EncryptMessage and DecryptMessage. This is for the purposes of intercepting SSL communication between banking websites and thier customers and injecting html code into webpages to steal credentials. Below is a sample of a decrypted configuration file that we recieved from a remote C&C server:

SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News