Security Experts:

Connect with us

Hi, what are you looking for?



Dridex Operators Use SDBbot RAT in Recent Attacks

TA505, the Russian-speaking threat actor known for operating the Dridex Trojan and Locky ransomware, has been using a new remote access Trojan (RAT) in recent attacks, Proofpoint reports.

TA505, the Russian-speaking threat actor known for operating the Dridex Trojan and Locky ransomware, has been using a new remote access Trojan (RAT) in recent attacks, Proofpoint reports.

Dubbed SDBbot, the backdoor is being dropped via Get2, a new downloader that distributes other payloads as well, including FlawedGrace, FlawedAmmyy, and Snatch. The RAT was initially observed (PDF) in attacks on South Korean users, as a secondary payload to the FlawedAmmyy RAT.

The use of a new RAT isn’t surprising for TA505, as the threat actor has been employing various downloaders, backdoors, information stealers, RATs, and other malicious programs after abandoning ransomware as their primary payload since last year.

The cybercriminals have been using the Get2 downloader since early September. Initially, it delivered FlawedAmmyy and FlawedGrace, but switched to dropping SDBbot in early October.

As part of these attacks, new Microsoft Office macros were used specifically with the Get2 downloader, Proofpoint’s security researchers report.

In early September, the hackers targeted financial institutions in Greece, Singapore, United Arab Emirates, Georgia, Sweden, Lithuania, and a few other countries with malicious Microsoft Excel documents.

Toward the end of September, they were targeting different verticals in the United States and Canada with Microsoft Excel and .ISO attachments.

At the beginning of October, the attackers switched from attachments to URL shortener links that would direct to a page leading to an Excel sheet. The attacks targeted various industries primarily in the United States and employed Get2, which downloaded SDBbot.

The Get2 downloader was embedded into the Microsoft Excel file as an object. Written in C++, the downloader can collect basic system information and send it via an HTTP POST request to a hardcoded command and control (C&C) server.

The SDBbot RAT, also written in C++, is composed of an installer, a loader, and a backdoor component.

The installer stores the RAT in the registry and establishes persistence for the loader. Under regular user privileges, it uses the registry “Run” method. With admin privileges, it uses the registry “image file execution options” method on Windows versions newer than Windows 7, or application shimming on Windows XP or 7.

All three persistence mechanisms require a reboot and no additional code to execute the loader and RAT components was observed. Thus, Proofpoint’s researchers believe the reboot functionality in the Get2 downloader is used to continue SDBbot’s execution.

The loader executes the loader shellcode from the binary blob stored in the registry. The shellcode decompresses the RAT and loads and executes a DLL.

The RAT component has typical functionality, including command shell, video recording of the screen, remote desktop, port forwarding, and file system access. The command and control (C&C) addresses are stored in a plaintext string or file, while communication is performed using plaintext protocol over TCP port 443.

“With this recently observed October 2019 push by TA505 with attacks on a wide range of verticals and regions, the actor’s usual “follow the money” behavioral pattern remains consistent. The new Get2 downloader, when combined with the SDBbot as its payload appears to be TA505’s latest trick (or treat) for the Fall of 2019,” Proofpoint concludes.

Related: Dridex Operator Updates Tactics and Targets

Related: Dridex Operators Use New Trojan Downloader

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...