Home Malware Programs Trojans Cridex Trojan

Cridex Trojan

Posted: October 8, 2012

Threat Metric

Threat Level: 8/10
Infected PCs: 400
First Seen: February 11, 2012
Last Seen: August 16, 2024
OS(es) Affected: Windows

The Cridex Trojan can refer to any member of the Cridex family, a group of worms that steal account/financial information and use removable devices to distribute themselves to new computers. As SpywareRemove.com malware researchers have observed, Cridex Trojans usually are installed by drive-by-download exploits (such as the Blackhole Exploit Kit), by hacked websites or by other Trojans with explicit downloading functions. Cridex Trojan attacks, despite their invasiveness, don't display obvious symptoms, and you should use anti-malware programs to block Cridex Trojan installations and remove the Cridex Trojan when you need to do so. As a form of spyware that targets extremely confidential information, the Cridex Trojan should be classified an eminent threat to your computer's privacy until its removal.

When That Blog Offers Cridex Trojan Along with Its Posts

Prominent Cridex Trojan attacks often begin with e-mail spam links that redirect victims to hacked WordPress sites. These sites will use several exploits (via Java, Adobe software, etc) to install a Cridex Trojan automatically. SpywareRemove.com malware analysts note that avoiding suspicious links, blocking exploitable browser features, keeping your software updated and running anti-malware software can be useful to barricade these sources of Cridex Trojan infections. These links are often disguised as LinkedIn invitations or Better Business Bureau notifications of complaints.

Cridex Trojan can also infect computers through removable devices such as USB drives. SpywareRemove.com malware researchers have found that these attacks use standard worm tactics – by concealing hidden files for the Cridex Trojan in the USB drive and using AutoRun features to install the Cridex Trojan as soon as the device is plugged in to a new PC. Such devices shouldn't be shared with other computers until you can scan them with anti-malware programs and remove any traces of a Cridex Trojan infection.

The Info-Snatching Goal That You Should Keep Cridex Trojan from Achieving

Variants of Cridex Trojans can be identified by several names, including Worm:Win32/Cridex.B, Worm:Win32/Cridex.E and Worm:Win32/Cridex.D. However, all variants of the Cridex Trojan are known to contact a C&C server and make dangerous alterations to Internet Explorer's security settings. Cridex Trojan attacks tend to specialize in theft of account or online bank information. SpywareRemove.com malware researchers have listed some of the most vulnerable targets of Cridex Trojan attacks as follows:

  • Information that's stored in cookies, which websites can use to contain passwords, account names and settings preferences.
  • Certificate information – which validates protected information transactions.
  • Login details for bank websites like bankofamerica.com or nsbank.com. Credentials are monitored and transmitted to the Cridex Trojan's C&C server once they're sent to the website.
  • Login details for popular social networks: Twitter, Facebook, Livejournal, Flickr and Blogger have been targeted in past Cridex Trojan attacks.

After removing Cridex Trojans with your choice of anti-malware program, you should change any compromised passwords to prevent account theft and related attacks.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Cridex Trojan may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



dutsikerte.jpg File name: dutsikerte.jpg
Size: 176.12 KB (176128 bytes)
MD5: d1a9c19ea705f1c24218549200baf1b4
Detection count: 73
Mime Type: unknown/jpg
Group: Malware file
Last Updated: October 9, 2012
file.exe File name: file.exe
Size: 345.6 KB (345600 bytes)
MD5: eaa5115124e0fb7864a54cb0c2a4c8aa
Detection count: 45
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 27, 2016
%AppData%\KB<eight-digit number>.exe File name: %AppData%\KB<eight-digit number>.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

More files

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run KB.exe

Related Posts

Loading...
Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.