The new variant of infamous trickbot malware comes with the capability of grabbing remote application login credentials.
Trickbot is a banking malware which steals login credentials from applications, it was discovered long back ago, the threat actors continiously adding new capabilities to the malware.
Security researchers from TrendMicro observed the bew variant that bagged with extensive number of tricks to grab the login credentials.
The infection chains start with an Email appear to be a tax incentive notification from a financial institution. The Email contains an macro enabled Microsoft Excel spreadsheet. For string encryption the trickbot variant uses XOR or SUB routines.
Once the user open’s malicious spreadsheet the macro runs and downloads the trickbot malware and activate’s on the infected machine.
The 2019 trickbot variant adds the the following three new functions
Inorder to grab login credentials, the pwgrab modules uses to search for vnc.lnk located in the following directories, ready TrendMicro blog post.
%APPDATA%\Microsoft\Windows\Recent
%USERPROFILE%\Documents, %USERPROFILE%\Downloads
It exfiltrates the following information from the infected machine and post to the command-and-control (C&C) servers.
To grab the putty credentials it queries the Software\SimonTatham\Putty\Sessions to identify the saved sessions and grabs the following information.
It uses the CredEnumerateA API to look for the saved login credentials and exfiltrates the hostname, username, and password.
Trickbot (Detected as TrojanSpy.Win32.TRICKBOT.AZ)
Trickbot (Detected as Trojan.Win32.MERETAM.AD)
Also Read:
Trickbot Malware Re-emerging via MS Word Documents with Powerful Code-Injection Technique
Upgraded TrickBot Malware Attack Point-of-Sale Machines & Services to Steal Credit/Debit card Data
In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer overflow…
A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing attackers…
Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a cyberattack…
The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens, has…
A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing unauthenticated…
Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities…