Researchers from Cofense have uncovered a new malspam campaign that delivers Dridex banking trojan and Remote Manipulator System Remote Access Tool (RMS RAT) via malicious Microsoft Word document attachments.
How does it work?
What does the phishing email say?
“Hello
You have received a 11 pages fax a <day> <date> <time>. The reference number for this fax is [eFax-<10 digits>]
To view the fax, download attached archive with document inside and open with Microsoft Office Word. Password for a personal document - ******
Please contact us if you have any problem with this fax,” the phishing email read, BleepingComputer reported.
What is the RMS RAT?
What is the Dridex trojan?
Dridex is a banking trojan which also uses web injects when visiting a targeted website. This is done by injecting the data-pilfering script into the web browser, enabling the malware to steal any info typed by the victim, as well as bypassing security questions and multi-factor authentication, and redirecting traffic.
Researchers noted that in this malspam campaign, the web injects used by the Dridex trojan were hardcoded within the trojan.
“In this case, the web injects used by Dridex were unusual because of both the large number of possible web inject scripts and the fact that some of the web injects were labeled as being from the Zeus banking trojan,” wrote the researchers.
Use of web injects
Researchers noted that three types of web inject were used in this campaign.
Who are the targets?
The first type of web inject target cryptocurrency websites and banking websites. While the second type targets e-commerce websites. The cryptocurrency, banking, and e-commerce websites targeted in this campaign include Coinbase, HSBC, Synovus, PayPal, and Best Buy, among others.
“The final set of web injects are tagged as “Zeus” injects. The use of these injects is particularly unusual because several of the targeted websites overlap with those in other web injects, such as paypal[.]com and amazon[.]com,” noted the researchers.
Publisher