Cridex Trojan
Posted: October 8, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 386 |
First Seen: | February 11, 2012 |
---|---|
Last Seen: | July 11, 2023 |
OS(es) Affected: | Windows |
The Cridex Trojan can refer to any member of the Cridex family, a group of worms that steal account/financial information and use removable devices to distribute themselves to new computers. As SpywareRemove.com malware researchers have observed, Cridex Trojans usually are installed by drive-by-download exploits (such as the Blackhole Exploit Kit), by hacked websites or by other Trojans with explicit downloading functions. Cridex Trojan attacks, despite their invasiveness, don't display obvious symptoms, and you should use anti-malware programs to block Cridex Trojan installations and remove the Cridex Trojan when you need to do so. As a form of spyware that targets extremely confidential information, the Cridex Trojan should be classified an eminent threat to your computer's privacy until its removal.
When That Blog Offers Cridex Trojan Along with Its Posts
Prominent Cridex Trojan attacks often begin with e-mail spam links that redirect victims to hacked WordPress sites. These sites will use several exploits (via Java, Adobe software, etc) to install a Cridex Trojan automatically. SpywareRemove.com malware analysts note that avoiding suspicious links, blocking exploitable browser features, keeping your software updated and running anti-malware software can be useful to barricade these sources of Cridex Trojan infections. These links are often disguised as LinkedIn invitations or Better Business Bureau notifications of complaints.
Cridex Trojan can also infect computers through removable devices such as USB drives. SpywareRemove.com malware researchers have found that these attacks use standard worm tactics – by concealing hidden files for the Cridex Trojan in the USB drive and using AutoRun features to install the Cridex Trojan as soon as the device is plugged in to a new PC. Such devices shouldn't be shared with other computers until you can scan them with anti-malware programs and remove any traces of a Cridex Trojan infection.
The Info-Snatching Goal That You Should Keep Cridex Trojan from Achieving
Variants of Cridex Trojans can be identified by several names, including Worm:Win32/Cridex.B, Worm:Win32/Cridex.E and Worm:Win32/Cridex.D. However, all variants of the Cridex Trojan are known to contact a C&C server and make dangerous alterations to Internet Explorer's security settings. Cridex Trojan attacks tend to specialize in theft of account or online bank information. SpywareRemove.com malware researchers have listed some of the most vulnerable targets of Cridex Trojan attacks as follows:
- Information that's stored in cookies, which websites can use to contain passwords, account names and settings preferences.
- Certificate information – which validates protected information transactions.
- Login details for bank websites like bankofamerica.com or nsbank.com. Credentials are monitored and transmitted to the Cridex Trojan's C&C server once they're sent to the website.
- Login details for popular social networks: Twitter, Facebook, Livejournal, Flickr and Blogger have been targeted in past Cridex Trojan attacks.
After removing Cridex Trojans with your choice of anti-malware program, you should change any compromised passwords to prevent account theft and related attacks.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:file.exe
File name: file.exeSize: 212.99 KB (212992 bytes)
MD5: dface417f2172cc55566dcb1cc8d00b7
Detection count: 75
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2012
dutsikerte.jpg
File name: dutsikerte.jpgSize: 176.12 KB (176128 bytes)
MD5: d1a9c19ea705f1c24218549200baf1b4
Detection count: 73
Mime Type: unknown/jpg
Group: Malware file
Last Updated: October 9, 2012
file.exe
File name: file.exeSize: 345.6 KB (345600 bytes)
MD5: eaa5115124e0fb7864a54cb0c2a4c8aa
Detection count: 45
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 27, 2016
%AppData%\KB<eight-digit number>.exe
File name: %AppData%\KB<eight-digit number>.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
Registry Modifications
HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run KB
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.