TrickBot is a Trojan spyware program written in C++ that first emerged in September 2016 as a possible successor to Dyre. TrickBot was developed and initially used by Wizard Spider for targeting banking sites in North America, Australia, and throughout Europe; it has since been used against all sectors worldwide as part of "big game hunting" ransomware campaigns.[1][2][3][4]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
TrickBot can obtain passwords stored in files from web browsers such as Chrome, Firefox, Internet Explorer, and Microsoft Edge, sometimes using esentutl.[7][8][9] |
| .005 | 从密码存储中获取凭证: Password Managers |
TrickBot can steal passwords from the KeePass open source password manager.[8] |
||
| Enterprise | T1005 | 从本地系统获取数据 |
TrickBot collects local files and information from the victim’s local machine.[1] |
|
| Enterprise | T1090 | .002 | 代理: External Proxy |
TrickBot has been known to reach a command and control server via one of nine proxy IP addresses. [10] [9] |
| Enterprise | T1036 | 伪装 |
The TrickBot downloader has used an icon to appear as a Microsoft Word document.[8] |
|
| Enterprise | T1112 | 修改注册表 | ||
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
TrickBot establishes persistence by creating an autostart service that allows it to run whenever the machine boots.[7] |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
TrickBot uses a custom crypter leveraging Microsoft’s CryptoAPI to encrypt C2 traffic.[2]Newer versions of TrickBot have been known to use |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
TrickBot decodes the configuration data and modules.[2][8][11] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder | |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
TrickBot has been known to use PowerShell to download new payloads, open documents, and upload data to command and control servers. [9] |
| .003 | 命令与脚本解释器: Windows Command Shell |
TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine.[13] |
||
| Enterprise | T1008 | 回退信道 |
TrickBot can use secondary C2 servers for communication after establishing connectivity and relaying victim information to primary C2 servers.[8] |
|
| Enterprise | T1495 | 固件篡改 |
TrickBot module "Trickboot" can write or erase the UEFI/BIOS firmware of a compromised device.[14] |
|
| Enterprise | T1482 | 域信任发现 |
TrickBot can gather information about domain trusts by utilizing Nltest.[15][8] |
|
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools | |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
TrickBot uses HTTPS to communicate with its C2 servers, to get malware updates, modules that perform most of the malware logic and various configuration files.[1][8] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1083 | 文件和目录发现 |
TrickBot searches the system for all of the following file extensions: .avi, .mov, .mkv, .mpeg, .mpeg4, .mp4, .mp3, .wav, .ogg, .jpeg, .jpg, .png, .bmp, .gif, .tiff, .ico, .xlsx, and .zip. It can also obtain browsing history, cookies, and plug-in information.[1][7] |
|
| Enterprise | T1110 | .004 | 暴力破解: Credential Stuffing |
TrickBot uses brute-force attack against RDP with rdpscanDll module.[12][16] |
| Enterprise | T1552 | .001 | 未加密凭证: Credentials In Files |
TrickBot can obtain passwords stored in files from several applications such as Outlook, Filezilla, OpenSSH, OpenVPN and WinSCP.[7][8] Additionally, it searches for the ".vnc.lnk" affix to steal VNC credentials.[13] |
| .002 | 未加密凭证: Credentials in Registry |
TrickBot has retrieved PuTTY credentials by querying the |
||
| Enterprise | T1106 | 本机API |
TrickBot uses the Windows API call, CreateProcessW(), to manage execution flow.[1] TrickBot has also used |
|
| Enterprise | T1069 | 权限组发现 |
TrickBot can identify the groups the user on a compromised host belongs to.[8] |
|
| Enterprise | T1185 | 浏览器会话劫持 |
TrickBot uses web injects and browser redirection to trick the user into providing their login credentials on a fake or modified web page.[2][3][6][7] |
|
| Enterprise | T1027 | 混淆文件或信息 |
TrickBot uses non-descriptive names to hide functionality.[1] |
|
| .002 | Software Packing |
TrickBot leverages a custom packer to obfuscate its functionality.[1] |
||
| .013 | Encrypted/Encoded File |
TrickBot uses an AES CBC (256 bits) encryption algorithm for its loader and configuration files.[1] |
||
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
TrickBot has attempted to get users to launch malicious documents to deliver its payload. [13][8] |
| Enterprise | T1082 | 系统信息发现 |
TrickBot gathers the OS version, machine name, CPU type, amount of RAM available, and UEFI/BIOS firmware information from the victim’s machine.[1][2][8][14] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
TrickBot can identify the user and groups the user belongs to on a compromised host.[8] |
|
| Enterprise | T1007 | 系统服务发现 |
TrickBot collects a list of install programs and services on the system’s machine.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
TrickBot obtains the IP address, location, and other relevant network information from the victim’s machine.[1][7][8] |
|
| Enterprise | T1135 | 网络共享发现 |
TrickBot module shareDll/mshareDll discovers network shares via the WNetOpenEnumA API.[12][16] |
|
| Enterprise | T1497 | .003 | 虚拟化/沙盒规避: Time Based Evasion |
TrickBot has used |
| Enterprise | T1087 | .001 | 账号发现: Local Account | |
| .003 | 账号发现: Email Account | |||
| Enterprise | T1105 | 输入工具传输 |
TrickBot downloads several additional files and saves them to the victim's machine.[5][9] |
|
| Enterprise | T1056 | .004 | 输入捕获: Credential API Hooking |
TrickBot has the ability to capture RDP credentials by capturing the |
| Enterprise | T1057 | 进程发现 |
TrickBot uses module networkDll for process list discovery.[12][16] |
|
| Enterprise | T1055 | 进程注入 |
TrickBot has used |
|
| .012 | Process Hollowing | |||
| Enterprise | T1559 | .001 | 进程间通信: Component Object Model |
TrickBot used COM to setup scheduled task for persistence.[12] |
| Enterprise | T1021 | .005 | 远程服务: VNC |
TrickBot has used a VNC module to monitor the victim and collect information to pivot to valuable systems on the network [17][9] |
| Enterprise | T1210 | 远程服务漏洞利用 |
TrickBot utilizes EternalBlue and EternalRomance exploits for lateral movement in the modules wormwinDll, wormDll, mwormDll, nwormDll, tabDll.[12] |
|
| Enterprise | T1018 | 远程系统发现 | ||
| Enterprise | T1219 | 远程访问软件 |
TrickBot uses vncDll module to remote control the victim machine.[12][16] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
TrickBot can send information about the compromised host and upload data to a hardcoded C2 server.[8][9] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware[13] |
| .002 | 钓鱼: Spearphishing Link |
TrickBot has been delivered via malicious links in phishing e-mails.[8] |
||
| Enterprise | T1564 | .003 | 隐藏伪装: Hidden Window |
TrickBot has used a hidden VNC (hVNC) window to monitor the victim and collect information stealthily.[18] |
| Enterprise | T1571 | 非标准端口 |
Some TrickBot samples have used HTTP over ports 447 and 8082 for C2.[1][2][5] Newer versions of TrickBot have been known to use a custom communication protocol which sends the data unencrypted over port 443. [9] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
TrickBot creates a scheduled task on the system that provides persistence.[1][5][6] |
| Enterprise | T1542 | .003 | 预操作系统引导: Bootkit |
TrickBot can implant malicious code into a compromised device's firmware.[14] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing | |