TrickBot’s operators have augmented injections with layered defenses to hinder researchers and improve theft during online banking fraud. IBM Trusteer details how TrickBot fetches per-target web injections, secures its communications, and relies on obfuscation and anti-analysis techniques to outpace security controls. Hashtags: #TrickBot #MiTB #BazarCall #Dyre #IBMTrusteer #PowerShell #CobaltStrike
Keypoints
- TrickBot uses server-side injections delivered via a downloader or JS loader to fetch the appropriate web injections for each target.
- Injections are delivered over HTTPS to a C2 server, enabling per-page customization and evading some controls through a permissive referrer policy.
- The malware hooks certificate verification to disguise malicious communications with its inject server.
- Injected web payloads collect credentials and rich device fingerprints to better impersonate victims and fraud attempts.
- TrickBot adds anti-debugging/anti-analysis features, including detecting code beautification and triggering memory overloads to crash research tools.
- Obfuscation and encoding techniques (Base64, minification, dead code, monkey patching) obscure the injected code and hinder analysis.
- The campaign is tied to TrickBot’s broader criminal ecosystem, including phishing, malspam, BazarCall, and potential ransomware/lateral movement use.
MITRE Techniques
- [T1105] Ingress Tool Transfer – TrickBot’s downloader/JS loader communicates with its inject server to fetch injections. ‘the resident TrickBot malware uses a downloader or a JavaScript (JS) loader to communicate with its inject server.’
- [T1071.001] Web Protocols – The JS downloader uses HTTPS to contact the C2 and fetch per-page injections. ‘The request to the C2 server yields a web injection…’
- [T1027] Obfuscated/Compressed Files and Information – Code is encoded/obfuscated with Base64, minified/uglified, and includes dead code and monkey patching. ‘The code TrickBot injects is meant to be obfuscated. It is first encoded with Base64…’
- [T1562.001] Impair Defenses – TrickBot hooks the certificate verification function to bypass TLS warnings during C2 communication. ‘TrickBot hooks the certificate verification function on the infected device.’
- [T1059.001] PowerShell – Living-off-the-land tactics include PowerShell scripts used by TrickBot. ‘living-off-the-land tactics like PowerShell scripts.’
- [T1566.001] Phishing – TrickBot’s distribution relies on phishing/malspam and related social engineering (e.g., BazarCall). ‘TrickBot distributes multi-stage malware through phishing emails, malspam, botnets, hijacked email conversations and even a malicious call center known as BazarCall.’
Indicators of Compromise
- [Domain] context – myca.adprimblox.fun, ksx.global-management-holdings.com, on.imagestorage.xyz, 997.99722.com, akama.pocanomics.com, web7.albertleo.com (and 4 more domains)
- [IP Address] context – 94.242.58.165, 185.14.30.111, 208.115.238.183, 51.83.210.212, 103.119.112.188, 185.198.59.85 (and 4 more IPs)
- [SHA1 Hash] context – jquery-1.10.1.js: 5acd3cddcc921bca18c36a1cb4e16624d0355de8, downloader js: ae1b927361e8061026c3eb8ad461b207522633f2
Read more: https://securityintelligence.com/posts/trickbot-bolsters-layered-defenses-prevent-injection/