If the first thing that comes to mind on the topic of banking Trojans is Dridex, prepare to add the word ‘FriedEx' or ‘BitPaymer' to the list of related words.
ESET researchers have discovered that the creators of the Dridex banking Trojan are also responsible for FriedEx (also known as BitPaymer), a ransomware that was discovered in mid-2017.
The ransomware goes after high profile targets through a remote desktop protocol (RDP) brute force attack. It encrypts all files with an individual key and then hardcoded through a 1024-bit RSA public key.
ESET senior research fellow Nick FitzGerald explains that although there is limited detection data, attackers are looking for poorly-protected RDP hosts that are exposed to the internet.
“As such poorly-secured systems tend to be run by less-security-aware folk, there is a higher chance of gaining access to a privileged account (administrator, domain administrator),” he says.
Researchers examined one of the FriedEx samples and found similarities between its code and the Dridex code.
FriedEx also uses the same techniques to hide its behaviour, has similar PDB paths, timestamps and compiler information to what Dridex uses.
Dridex was first discovered in 2014. The banking Trojan has continued to evolve, with the latest version (Dridex 4.80) released on December 14 last year.
The Trojan apparently receives weekly updates and fixes.
Because FriedEx is a ransomware, researchers admit it does have some functions not present in Dridex, including the file encryption look and creation of ransom message files.
FitzGerald adds that the large ransom demands, which can be between 20-50 Bitcoins ($US12,000 - $500,000), there is further suggestion that the attackers are targeting those that they think are able to pay the larger ransom demands.
Attackers are also able to gain access to a computer in a network and move laterally to compromise more computers and gain higher privileges. If they grab domain-wide credentials, they can inflict Dridex across many computers on a network, he continues.
"In such an attack, once the attacker obtains sufficiently elevated privileges, they can disable security products and take other steps to hamper their detection. It is very common in such cases that the attackers disable endpoint and server protection products just before running the ransomware.
ESET says that the Dridex creators are not a ‘one trick pony' that remain focused on their Trojan – as evidence reveals they are adapting to trends and creating different malware that is able to compete against the most advanced in its category.