IMPORTANT ANNOUNCEMENT: On May 6, 2024, Carbon Black User eXchange (UeX) and Case Management will move to a new platform!
The Community will be in read-only mode starting April 19th, 7:00 AM PDT. Check out the blog post!
You will still be able to use the case portal to create and interact with your support cases until the transition, view more information here!

CB PSC: How to Prevent DRIDEX?

CB PSC: How to Prevent DRIDEX?

Environment

  • CB Defense PSC Console: All Versions
  • CB Defense PSC Sensor: All Versions

Question

What policy rules should be in place to prevent DRIDEX?

Answer

Based on the malware analysis by the Carbon Black threat time, the following policy rules are recommended:
  • Known malware Runs or is running Terminate
  • Adware or PUP Runs or is running Terminate
  • Suspected malware Runs or is running Terminate
  • Applications at Path **\Microsoft Office\** Communicates over the network Terminate

Additional Notes

  • Malware analysis by the Carbon Black Threat team, indicates that a network connection from winword.exe to the domain found within the embedded macro is made. Then following the netconn, winword.exe appears to write an executable file to the user’s temp directory. See Malware Analysis: Dridex for more information

Related Content


Was this article helpful? Yes No
No ratings
Article Information
Author:
Creation Date:
‎11-20-2019
Views:
463
Contributors