Sign In with your
Trend Micro Account
需要協助?
需要協助?

若您需要技術支援,請 按此建立案件。

TRICKBOT’s newly released modules makes it even trickier

    • 更新於:
    • 12 Dec 2019
    • 產品/版本:
    • Deep Security
    • Email Encryption Gateway
    • OfficeScan
    • Worry-Free Business Security Advanced
    • 作業系統:
    • N/A N/A
概要

Trickbot is a banking Trojan which is used in cyber attacks against small and medium-sized businesses. It is designed to access online accounts, especially bank accounts to obtain Personally Identifiable Information (PII) to be used in identity fraud.

Trickbot was first discovered on August 2016 as a banking Trojan which infected computers to steal email passwords and address books to spread malicious emails from compromised email accounts. It had developed new capabilities and techniques with new modules to trick users into revealing their online banking credentials. It then exfiltrates and receives the information on the attacker’s side.

Trickbot now has an additional spamming module which is known as “TrickBooster” which sends spam mails from infected computers to increase the spread of Trickbot infections. It then removes the sent messages from both outbox and sent item folders to avoid detection. It is commonly distributed in spearphishing attacks by using fake invoices and bank documents. This malware can also leverage a vulnerability in Server Message Block (SMB) to quickly propagate to other systems on the same network. Emotet, another widespread Trojan malware is also known to drop Trickbot as part of its secondary infection in Emotet-infected machines.

Some of Trickbot’s new modules steal credentials for remote computer access with a newer version targeting passwords for Virtual Networking Computing (VCN), PuTTY and Remote Desktop Protocol (RDP). The other modules perform tasks for stealing bank information, system/network reconnaissance, credential harvesting, and network propagation.

Behaviors

  • Dropped by Emotet’s Malware-as-a-Service capability as part of secondary infection
  • Remains undetected by user and gains persistence by creating a Scheduled Task
  • Takes advantage of open redirections and server side injections to steal login information from user’s banking session
  • Steals user data such as login state, website preferences, personalized content
  • Steals remote desktop application credentials, email credentials, internet browser credentials
  • Steals computer data operating system (OS) information, memory information, user accounts, installed programs, installed services, network information
  • Steals information regarding Point-of-Sale (POS) systems in the network
  • Disables Windows Defender and lowers down machine security

Capabilities

  • Information Theft
  • Exploits
  • Rootkit Capability
  • Propagation
  • Download Routine

Impact

  • Financial loss – steals banking information
  • Compromise system security - can disable someone’s security software
  • Violation of user privacy - gathers and steals user credentials of various applications

Infection Routine

Trickbot

Trickbot

詳情
Public

VSAPI

Detection/Policy/RulesPattern Branch/VersionRelease Date
TrojanSpy.Win32.TRICKBOT.THCBOAI
TrojanSpy.Win32.TRICKBOT.TIGOCAY
TrojanSpy.Win32.TRICKBOT.TIGOCAS
Trojan.W97M.TRICKBOT.A
TrojanSpy.Win32.TRICKBOT.TIGOCBO
TrojanSpy.Win32.TRICKBOT.SMTH
TrojanSpy.Win32.TRICKBOT.TIGOCAW
TrojanSpy.Win32.TRICKBOT.TIGOCBJ
TrojanSpy.Win32.TRICKBOT.TIGOCBC
TrojanSpy.Win32.TRICKBOT.SMXF
TrojanSpy.Win32.TRICKBOT.THCBBAI
TrojanSpy.Win32.TRICKBOT.THCAIAI
TrojanSpy.Win32.TRICKBOT.TIGOCBH
Ent OPR 14.885.01March 20, 2019
Trojan.VBS. TRICKBOT.SM
TrojanSpy.Win32. TRICKBOT.CET
ENT OPR 15.543.00December 7, 2019

TrendX

Detection/Policy/Rules
Troj.Win32.TRX.XXPE50F13006
TROJ.Win32.TRX.XXPE50FFF028
TSPY.Win32.TRX.XXPE50FFF029
Troj.Win32.TRX. XXPE50FFF033

Behavior Monitoring

Pattern Branch/VersionRelease Date
TMTD OPR 1761March 12, 2018
TMTD OPR 1699September 8, 2017
TMTD OPR 1761September 30, 2019

Web Reputation

Detection/Policy/RulesPattern Branch/Version
URL ProtectionIn-the-cloud

Anti-Spam

Detection/Policy/RulesPattern Branch/VersionRelease Date
Email ProtectionAS 4510.006March 25, 2019
-AS Pattern 5092December 9, 2019

Network Patterns

Detection/Policy/RulesPattern Branch/VersionRelease Date
HTTP_TRICKBOT_REQUESTNCIP 1.13637.00
NCCP 1.13601.00
March 20, 2019

Recommendation

Threat Report

Blogs

Premium
Internal
Partner
評價:
分類:
Remove a Malware / Virus
解決方案ID:
1122411
評定這個解決方案
本文是否幫助解決您的問題?

感謝您的意見!

請留下您的Email方便進一步的聯繫,協助我們改進文章內容:
我們不會透過以上Email寄送任何可能騷擾您的垃圾信.

本意見調查系統為自動運作,將不會回覆如銷售、技術、產品等一般問題.

若您需要協助,請聯繫對應的技術支援窗口. 聯絡我們


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.