Cridex Analysis using Volatility - by Andre' DiMino - samples and memory analysis resources Archived: 2026-04-05 23:38:03 UTC Andre' DiMino posted an excellent analysis of Cridex banking malware using Volatility on sempersecurus.blogspot.com and if you wish to repeat his steps or interested in this malware, I am posting the corresponding samples. Cridex is a complex financial trojan and is being distributed via spam messages (carrying exe files in zipped attachments) and Blackhole Exploit kit. The messages have various themes - from UPS, Fedex, USPS to Groupon deals and "HP-scan" and other lures. Some message screenshots and corresponding malware are posted below. If you are interested in memory analysis, please see the resource section of this post (links to the tools: Volatility, Mandiant Redline, memory dumps and other memory analysis done by Andre' and other researchers) Download  Download  all files listed below (email me if you need the password) Analysis Preview Exerpt:  Read the full version at sempersecurus.blogspot.com - Cridex Analysis using Volatility Using the Volatility 'plist' command, we can see a list of the running processes. However it's instructive to use this in conjunction with the 'psscan' command in order to see those processes that have terminated, are unlinked, or hidden.  In this case, no discrepancies between the two commands jump out at me, but I do notice a couple of things.   First, I see a process, reader_sl.exe, PID1640 start exactly at the same time as its parent process, explorer.exe, PID1484.  I see that the parent process ID for explorer.exe is 1464, which is not listed in either 'pslist' or 'psscan'.  reader_sl.exe is a supposedly a safe process, associated with Adobe Speed Launcher, but the launch chain for this seems odd, so I'll http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html Page 1 of 10 keep note of this for now. Next, I see a secondwuauclt.exe process start about 15 seconds after the first.  This isn't a major flag, but just something to note. pslist command psscan command The next useful Volatility command that I use for malware analysis is the 'connections' and the 'connscan'commands. Again, running both of these will allow you to see variances, as 'connscan' will show artifacts from previous connections. File information Cridex file analyzed by Andre DiMino  File: readme.exe Size: 112096 MD5:  734AADD62D0662256A65510271D40048 http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html Page 2 of 10 Other cridex samples: File: about.exe Size: 160768 MD5:  C497B4D6DFADD4609918282CF91C6F4E File: HP_Scan_N989397452.exe Size: 80896 MD5:  E187763C92E2ACC6BB1C804309EBB381 File: Booking_Confirmation_08012012.exe Size: 98304 MD5:  213D5022047029071AFD372302E07DD8 File: UPS_Label_N8882342.exe Size: 145408 MD5:  43CD850FCDADE4330A5BEA6F16EE971C Resources Memory Analysis links and dumps ( in no particular order) Volatility (Free. Linux) Sharing of Forensically Interesting Objects by Andre' DiMino Andre' DiMino Using "volatility" to study the CVE-2011-0611 Adobe Flash 0-day Zeus Analysis in Volatility 2.0 by malwarereversing Abstract Memory Analysis: Zeus Encryption Keys MNIN Security Blog Coding, Reversing, Exploiting  Carberp Analysis via Volatility by Evilcry - Giuseppe Bonfa Volatility 2.0: Timeliner, RegistryAPI, evtlogs and more by JL toolsmith: Memory Analysis with DumpIt and Volatility ShmooCon 2012: Android Mind Reading: Memory Acquisition and Analysis with DMD and Volatility  Mandiant Redline  (Free. Windows.  It is am easy to use new tool with a clean nice user interface, powerful features and integration with IOC - Indicators of Compromise tool ) Analyze Memory of an infected system with Mandiant's Redline by Lenny Zeltser Mandiant Using Redline & OpenIOC to Build Effective Indicators SANS blog. Live Memory Forensic Analysis A few public memory dumps are here http://code.google.com/p/volatility/wiki/PublicMemoryImages Cridex distribution Email examples http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html Page 3 of 10 Some of the possible subjects Groupon dicount gifts UPS Tracking Number H9942472682  United Postal Service Tracking Number H5642970529 Fedex Tracking Number UPS Your Package H8522250271 Your Package US168933 HP-Officejet 10167 HP Scan 5601 Automatic scans SHA256: 046a7fac35a29f66e37193a2048f6a324754df131bad07c21f87fc814d7763f5 SHA1: 67e9c32c97b47e058aeee928c4cdc28773883b90 MD5: 734aadd62d0662256a65510271d40048 http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html Page 4 of 10 File size: 109.5 KB ( 112096 bytes ) File name: 734aadd62d0662256a65510271d40048 File type: Win32 EXE Detection ratio: 36 / 42 Analysis date:  2012-06-26 15:00:58 UTC ( 1 month, 1 week ago ) 01 More details Antivirus Result Update AhnLab-V3 Win-Trojan/Dapato.112096 20120626 AntiVir Worm/Cridex.E.5 20120626 Antiy-AVL Trojan/Win32.Dapato.gen 20120626 Avast Win32:Dropper-gen [Drp] 20120626 AVG PSW.Generic9.CMJF 20120625 BitDefender Trojan.Generic.KDV.647871 20120626 ClamAV - 20120626 Commtouch W32/Zbot.DQ3.gen!Eldorado 20120626 Comodo UnclassifiedMalware 20120626 DrWeb Trojan.DownLoader6.17427 20120626 Emsisoft Worm.Win32.Cridex!IK 20120626 eSafe Win32.PWS.Zbot.Xs 20120624 F-Prot W32/Zbot.DQ3.gen!Eldorado 20120626 F-Secure Trojan.Generic.KDV.647871 20120626 Fortinet W32/Dapato.BHXH!tr 20120626 GData Trojan.Generic.KDV.647871 20120626 Ikarus Worm.Win32.Cridex 20120626 Jiangmin TrojanDropper.Dapato.ize 20120626 K7AntiVirus Spyware 20120625 Kaspersky Trojan-Dropper.Win32.Dapato.bhxh 20120626 McAfee PWS-Zbot.gen.uh 20120626 McAfee-GW-Edition PWS-Zbot.gen.uh 20120626 Microsoft Worm:Win32/Cridex.E 20120626 NOD32 Win32/AutoRun.Spy.Banker.P 20120626 Norman W32/Injector.AQSI 20120625 nProtect Trojan/W32.Agent.112096.B 20120626 Panda Generic Malware 20120625 PCTools Malware.Cridex 20120626 Rising - 20120626 Sophos Troj/DwnLdr-KAY 20120626 TheHacker Trojan/Dropper.Dapato.bhxh 20120625 TrendMicro TROJ_KRYPTIK.MIC 20120626 TrendMicro-HouseCall TROJ_KRYPTIK.MIC 20120625 VBA32 TrojanDropper.Dapato.bhxh 20120625 http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html Page 5 of 10 VIPRE Trojan.Win32.Generic.pak!cobra 20120626 ViRobot Dropper.A.Dapato.112096 20120626 VirusBuster Worm.AutoRun!tSqW3tx0AYY 20120625 #Cridex worm ========================================================= SHA256: a7e62a16c47fede2772d4f4bf980cdb58b5d110887e001ab632d7f40159dfa13 SHA1: d186e8ebb104ba0d64ad6052107420debef3da00 MD5: c497b4d6dfadd4609918282cf91c6f4e File size: 157.0 KB ( 160768 bytes ) File name: KB00385258.exe / about.exe File type: Win32 EXE Tags: peexe upx Detection ratio: 1 / 41 Analysis date: 2012-08-02 19:53:34 UTC ( 5 hours, 53 minutes ago ) Kaspersky UDS:DangerousObject.Multi.Generic 20120802 http://hookpublications.com/wp-admin/atbilred.html http://advancementwowcom.org/main.php?page=19152be46559e39d http://advancementwowcom.org/w.php?f=14095&e=2 Posted 7 hours, 58 minutes ago by BornSlippy #cridex http://tevrom.ro/modules/atbilred.html http://advancementwowcom.org/main.php?page=19152be46559e39d http://advancementwowcom.org/w.php?f=14095&e=2 Posted 8 hours, 9 minutes ago by BornSlippy trojan Cridex, payload of Blackhole exploit kit at hxxp://unboxhibernation.org/w.php?f=14095&e=2 http://camas.comodo.com/cgi-bin/submit? file=a7e62a16c47fede2772d4f4bf980cdb58b5d110887e001ab632d7f40159dfa13 ======================================================= SHA256: 65bd088579107f13bf5e3aaba25b07b413343a823e7a3499d907b1bf564f36e5 SHA1: 7263fe0d3a095d59c8e0c895a9c585e343e7141c MD5: 43cd850fcdade4330a5bea6f16ee971c File size: 142.0 KB ( 145408 bytes ) File name: 43cd850fcdade4330a5bea6f16ee971c File type: Win32 EXE Tags: peexe Detection ratio: 29 / 41 Analysis date: 2012-08-02 17:21:11 UTC ( 9 hours, 54 minutes ago ) 04 http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html Page 6 of 10 More details Antivirus Result Update AhnLab-V3 - 20120802 AntiVir TR/Spy.145408.64 20120802 Antiy-AVL - 20120802 Avast Win32:Downloader-PUU [Trj] 20120802 AVG SHeur4.AKQG 20120802 BitDefender Trojan.Generic.KD.684302 20120802 ByteHero - 20120723 CAT-QuickHeal - 20120802 ClamAV - 20120802 Commtouch W32/Trojan3.DWW 20120802 Comodo TrojWare.Win32.Trojan.Agent.Gen 20120802 DrWeb Trojan.Necurs.21 20120802 Emsisoft Trojan.Win32.Buzus!IK 20120802 eSafe Win32.Trojan 20120802 ESET-NOD32 Win32/AutoRun.Spy.Banker.R 20120802 F-Prot W32/Trojan3.DWW 20120802 F-Secure Trojan-Spy:W32/Agent.DUCE 20120802 Fortinet W32/Palevo.EYYX!worm 20120802 GData Trojan.Generic.KD.684302 20120802 Ikarus Trojan.Win32.Buzus 20120802 Jiangmin Backdoor/RBot.obc 20120802 K7AntiVirus Riskware 20120802 Kaspersky P2P-Worm.Win32.Palevo.eyyx 20120802 McAfee PWS-Zbot.gen.ajh 20120802 McAfee-GW-Edition Generic.dx!bf3x 20120802 Microsoft Worm:Win32/Cridex.E 20120802 Norman W32/Troj_Generic.DDRRO 20120802 nProtect Worm/W32.Palevo.145408.AE 20120802 Panda - 20120802 Rising - 20120802 Sophos Troj/Agent-XGF 20120802 SUPERAntiSpyware - 20120802 Symantec W32.Cridex 20120802 TheHacker - 20120801 TotalDefense - 20120802 TrendMicro TROJ_INJECTR.PAL 20120802 TrendMicro-HouseCall TROJ_INJECTR.PAL 20120802 VBA32 - 20120802 VIPRE Trojan.Win32.Generic!BT 20120802 ViRobot Worm.Win32.A.P2P-Palevo.145408.AD 20120802 http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html Page 7 of 10 VirusBuster - 20120802 Comments Votes Additional information Behavioural information #backdoor bot http://keaaushoppingcenter.com/mail.htm online-cammunity.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c online-cammunity.ru:8080/forum/w.php?f=182b5&e=2 File uploaded for analysis to ; http://jsunpack.jeek.org/dec/go?report=07777d69d6d6f5e180519988ad3df85613285e58 =============================================================== SHA256: c11a3d4f4630211cd458a022fa8c346d8a1a836561897e9ba6b4098605cf49b7 SHA1: ef006795e39b4cc7469107c0b04d37ca492e062a MD5: 213d5022047029071afd372302e07dd8 File size: 96.0 KB ( 98304 bytes ) File name: Booking_Confirmation_08012012.exe File type: Win32 EXE Tags: peexe Detection ratio: 21 / 41 Analysis date: 2012-08-02 13:31:05 UTC ( 13 hours, 53 minutes ago ) 00 More details Antivirus Result Update AhnLab-V3 Win32/Cridex.worm.98304.B 20120802 AntiVir TR/Graftor.385561 20120802 AVG SHeur4.AKTK 20120802 BitDefender Trojan.Generic.KDV.686322 20120802 ByteHero - 20120801 CAT-QuickHeal - 20120802 Commtouch W32/Trojan3.DXI 20120802 DrWeb Trojan.Necurs.20 20120802 Emsisoft Worm.Win32.Cridex!IK 20120802 eSafe - 20120731ESET-NOD32 Win32/AutoRun.Spy.Banker.M 20120802 F-Prot W32/Trojan3.DXI 20120802 F-Secure Trojan.Generic.KDV.686322 20120802 GData Trojan.Generic.KDV.686322 20120802 Ikarus Worm.Win32.Cridex 20120802 Kaspersky Worm.Win32.Cridex.gt 20120802 http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html Page 8 of 10 McAfee PWS-Zbot.gen.ajm 20120802 McAfee-GW-Edition - 20120802 nProtect Trojan.Generic.KDV.686322 20120802 Panda Suspicious file 20120802 Sophos Troj/Cridex-O 20120802 SUPERAntiSpyware - 20120802 Symantec W32.Cridex 20120802 TrendMicro PAK_Generic.012 20120802 TrendMicro-HouseCall PAK_Generic.012 20120802 VIPRE Trojan.Win32.Generic!BT 20120802 ========================================================== SHA256: 76b22b77e5df1134619e8ac3fd6a8c8cf72de879e0c4afbd11ebcaa14bc2a38e SHA1: d64623b8b5bbfa20bb7a08a43d7fed0e7d503e4f MD5: e187763c92e2acc6bb1c804309ebb381 File size: 79.0 KB ( 80896 bytes ) File name: smona_76b22b77e5df1134619e8ac3fd6a8c8cf72de879e0c4afbd11ebcaa14bc2a38e.bin File type: Win32 EXE Tags: peexe Detection ratio: 33 / 40 Analysis date: 2012-08-01 23:38:20 UTC ( 1 day, 3 hours ago ) 06 More details Antivirus Result Update AhnLab-V3 Win32/Cridex.worm.80896.C 20120801 AntiVir TR/Cehscok.A 20120801 Antiy-AVL - 20120801 Avast Win32:Kryptik-JJP [Trj] 20120802 AVG Generic28.CNKE 20120801 BitDefender Trojan.Generic.KDV.681199 20120802 ByteHero - 20120723 CAT-QuickHeal Trojan.Yakes.ahur 20120801 ClamAV W32.Trojan.Yakes-25 20120801 Commtouch W32/Falab.F.gen!Eldorado 20120801 Comodo TrojWare.Win32.Kryptik.AITM 20120802 DrWeb Trojan.Necurs.21 20120802 Emsisoft Trojan.Win32.Yakes!IK 20120801 ESET-NOD32 Win32/AutoRun.Spy.Banker.R 20120801 F-Prot W32/Falab.F.gen!Eldorado 20120801 F-Secure Trojan:W32/Injector.AA 20120802 Fortinet W32/Kryptik.AB!tr 20120801 GData Trojan.Generic.KDV.681199 20120802 http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html Page 9 of 10 Ikarus Trojan.Win32.Yakes 20120801 Jiangmin Trojan/JboxGeneric.kue 20120801 K7AntiVirus Trojan 20120801 Kaspersky Trojan.Win32.Yakes.ahur 20120801 McAfee PWS-Zbot.gen.air 20120802 McAfee-GW-Edition PWS-Zbot.gen.air 20120801 Microsoft Worm:Win32/Cridex.E 20120802 Norman W32/Troj_Generic.DBZPN 20120801 nProtect Trojan.Generic.KDV.681199 20120801 Panda Generic Trojan 20120801 Rising - 20120801 Sophos Troj/Katusha-AG 20120802 SUPERAntiSpyware - 20120801 Symantec W32.Cridex 20120801 TheHacker Trojan/Yakes.ahur 20120801 TotalDefense - 20120801 TrendMicro TROJ_INJECTR.VYQ 20120802 TrendMicro-HouseCall TROJ_INJECTR.VYQ 20120801 VIPRE Trojan.Win32.Generic!BT 20120802 ViRobot Trojan.Win32.A.Yakes.80896.D 20120801 http://bartblaze.blogspot.com/2012/07/scan-from-hewlett-packard-scanjet.html Posted 1 week ago by bartblaze Source: http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html Page 10 of 10