Wednesday, May 14, 2025
HomeMalwareTrickbot Malware Campaign Targets users with COVID-19 Themed Malspam

Trickbot Malware Campaign Targets users with COVID-19 Themed Malspam

Published on

SIEM as a Service

Follow Us on Google News

The Cyberthreat uses COVID-19 themed malspam to distribute the Trickbot malware, says IBM Security Researchers. This time attacker utilizes FMLA (Family and Medical Leave Act) to lure the user over COVID-19 medical leaves with the attachment named “Family and Medical Leave of Act 22.04.doc” to distribute the malware. Spam mail disguised to come from the U.S. Department of Labor (DoL).

Trickbot Campaigns

TrickBot is a sophisticated banking Trojan operated by an organized cybercrime gang. Users infected with the TrickBot Trojan becomes part of a botnet that can allow attackers to gain complete control of the device.

Typical consequences of TrickBot infections are bank account takeover, high-value wire fraud, and possibly ransomware attacks targeting organizational networks. Mainly financially motivated cyber-attacks.

- Advertisement - Google News

DocuSign themes used by Trickbot

Sample email US-DoL.eml, contains three attachments: uslogo.png, faq.png, and Family and Medical Leave of Act 22.04.doc.

As first two attachments were just image files and the third one “Family and Medical Leave of Act 22.04.doc” asks users to enable macros ((ThisDocument.cls), to drops the bat file into the user machine location ”C:\Test\terop.bat”.

Trickbot Malware Campaign

Using the cURL utility, the terop.bat file attempts to download an executable from what appears to be a hijacked or compromised domain: hxxps://www.omegasystemsuae[.]com/9hfudnsfl.exe .The file is set to be written to %APPDATA%\Bio_Tecs.exe.

Terop.bat contains TIMEOUT /T 30 and ping 8.8.8.8 commands to evade detection and delay execution.

Overall, the following files are used in the infection chain:

File NameFile CategoryFile HashParent
US-DoL.emlEmailf481ba37fdcfaee9fa991e203963bad8N/A
Family and Medical Leave of Act 22.04.docCarrier Filed341215eb15167870aeff64d5380a69bUS-DoL.eml
terop.batDownloader9f52f07856cdf2b076c27ae60cb0d100Family and Medical Leave of Act 22.04.doc
faq.pngBenigneb77c6a9fc86bd73d77b92c24ca889dbUS-DoL.eml
us-logo.pngBenign1af19e6717acf7f38b8f1a651c738954US-DoL.eml
Infection chain – Trickbot

Infection chain – Trickbot This has been observed that the “Macro on Close” function used in the Docusign theme became a tactic for Trickbot distributors.

Other Trickbot Campaigns

New TrickBot Module BruteForce RDP Connections Attacks Telecommunication Industry

Hackers Abusing Window 10 Remote Desktop ActiveX control to Install New Version of Trickbot Malware

TrickBot Credential Stealer Malware Abuses Google Suite to Hide Malicious Activity

Latest articles

Weaponized PyPI Package Targets Developers to Steal Source Code

Security researchers at RL have discovered a malicious Python package called "solana-token" on PyPI...

Microsoft Alerts on AD CS Flaw Enabling Remote Denial-of-Service Attacks

Microsoft has issued a security advisory for a newly identified vulnerability in Active Directory...

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...

Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

A group of cybersecurity specialists from Hunters, working under the prestigious Team Axon, have...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords

Threat actors have successfully exploited the widely-used open-source password manager, KeePass, to spread malware...

Researchers Uncover Remote IT Job Fraud Scheme Involving North Korean Nationals

The United States indicted fourteen North Korean nationals for orchestrating a sophisticated scheme to...

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...