Home Malware Programs Trojans Trojan.TrickBot

Trojan.TrickBot

Posted: October 17, 2016

Threat Metric

Ranking: 3,893
Threat Level: 8/10
Infected PCs: 68,586
First Seen: October 17, 2016
Last Seen: October 17, 2023
OS(es) Affected: Windows

Trojan.Trickbot Screenshot
Trojan.TrickBot is a Trojan that compromises bank accounts by monitoring bank site-specific data transactions, recording the user's input devices, or redirecting you to phishing sites. Like the Dyreza Trojan, a closely related threat, Trojan.TrickBot may not display symptoms before collecting your data and compromising your account. Rely on your anti-malware products for blocking this program's installation exploits or, in worst cases, removing Trojan.TrickBot before it hijacks your account.

When Trojan Tricks Trigger Twice

The path of a threat campaign's development often crosses with those of other threats, particularly ones with similar, widely-applicable payloads, such as a banking Trojan. With most copycats, malware experts can trace copy-pasted code or updates to an earlier threat, without which the authors would have few resources. Trojan.TrickBot, a new banking Trojan, blurs the lines of what constitutes an update for old threats by using the philosophy, but not necessarily the code, already seen in the Dyreza Trojan's campaign.

The Dyreza Trojan was a banking Trojan under maintenance by Russian con artists who were believed to be apprehended by the authorities after gathering millions of dollars. Now, the appearance of Trojan.TrickBot shows that at least one threat author related to the team may have escaped capture, or, alternately, been able to leak resources related to the Dyreza Trojan to other coders. Trojan.TrickBot shares many of the Dyreza Trojan's functions, but with all-new code written in C++, as opposed to the latter's C.

Trojan.TrickBot continues using a modular approach to compromising PCs, giving con artists the ability to add or remove features contained in specific modules between attacks. Malware experts saw the latest versions of Trojan.TrickBot, such as those targeting Australian bank users in September, using only one data-collecting modular component meant for siphoning account passwords and similar information.

However, Trojan.TrickBot's campaign also appears to be testing other attacks, such as HTML injection exploits that could modify a bank website page in the victim's browser (by asking for valuable information or redirecting you to seemingly legitimate phishing domains).

Putting the 'Treat' Bank into Your Bank Browsing

Trojan.TrickBot is an unusual example of a Trojan whose attacks borrow the implementation philosophy and hallmarks, but not necessarily the actual, underlying code of a past threat campaign. Since the coder maintaining Trojan.TrickBot is showing signs of being at least as competent as those of the Dyreza Trojan (also Dyre), similar sums of millions of dollars from hundreds of bank chains most likely are at risk.

Some of Trojan.TrickBot's infrastructure also harbors potential associations with threats connected to both the Dyreza Trojan and other banking Trojans previously. Victims may wish to refer to resources on the Cutwail spam botnet and the Pushdo Trojan downloader for further information. Spam is a particularly likely infection vector for Trojan.TrickBot, which installs itself with no symptoms and commits its data-collecting attacks without alerting the PC user, when possible.

PC users should patch their anti-malware threat databases in cases where their security software only has incorporated definitions for Trojan. TrickBot (whose first deployment dates to no earlier than September of 2016) in recent updates. Because of its high stealth features and a potential for committing other attacks not covered in full here, removing Trojan.TrickBot should always conclude with consulting your bank on additional security measures, when appropriate.

Although the Dyreza Trojan may be 'dead,' its spirit lives on in new threats accomplishing the same misdeeds with brand-new code.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%SYSTEMDRIVE%\Users\<username>\appdata\roaming\osqtfgwbhddfk_6uuom5e_whpvlf1aykllyyz_bds5ifmrgqrqih0yrdnnwxs437.exe File name: osqtfgwbhddfk_6uuom5e_whpvlf1aykllyyz_bds5ifmrgqrqih0yrdnnwxs437.exe
Size: 847.87 KB (847872 bytes)
MD5: b33d85ace606ae9ba59921d45b755cf8
Detection count: 150
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming\osqtfgwbhddfk_6uuom5e_whpvlf1aykllyyz_bds5ifmrgqrqih0yrdnnwxs437.exe
Group: Malware file
Last Updated: September 15, 2021
%SYSTEMDRIVE%\monter.exe File name: monter.exe
Size: 282.11 KB (282112 bytes)
MD5: 8dd6747e7ff790723a9449d085c86fc8
Detection count: 148
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\monter.exe
Group: Malware file
Last Updated: June 27, 2020
%SYSTEMDRIVE%\cmslase.exe File name: cmslase.exe
Size: 299 KB (299008 bytes)
MD5: c2703692c92cd9acb42a6112a2c990ac
Detection count: 143
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\cmslase.exe
Group: Malware file
Last Updated: June 26, 2020
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\alixqbuzlh7q0_rgjq0uxei67anelu_5fyn_wfzoza3e7yqb83gq8yfoasue4ckm.exe File name: alixqbuzlh7q0_rgjq0uxei67anelu_5fyn_wfzoza3e7yqb83gq8yfoasue4ckm.exe
Size: 487.42 KB (487424 bytes)
MD5: e0b6bbd9bc80c81573743aba3a1494ba
Detection count: 105
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming\alixqbuzlh7q0_rgjq0uxei67anelu_5fyn_wfzoza3e7yqb83gq8yfoasue4ckm.exe
Group: Malware file
Last Updated: September 15, 2021
7dfc76beb5d8fc3b1ecf4de9ac204ad2 File name: 7dfc76beb5d8fc3b1ecf4de9ac204ad2
Size: 3.39 KB (3396 bytes)
MD5: 7dfc76beb5d8fc3b1ecf4de9ac204ad2
Detection count: 93
Group: Malware file
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\7ejs9huc_16gtr8iopvqa5nokd6r9gnf8udwm9knch_wt2od9ea45drh1g6348ck.exe File name: 7ejs9huc_16gtr8iopvqa5nokd6r9gnf8udwm9knch_wt2od9ea45drh1g6348ck.exe
Size: 901.12 KB (901120 bytes)
MD5: d2ba8d47e97e896f1c96eb063b488fce
Detection count: 80
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming
Group: Malware file
Last Updated: September 15, 2021
%SYSTEMDRIVE%\wotrer.exe File name: wotrer.exe
Size: 512 KB (512000 bytes)
MD5: dec56a7ec9115ff81a098f2a4170504b
Detection count: 77
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\wotrer.exe
Group: Malware file
Last Updated: June 27, 2020
%SYSTEMDRIVE%\monter.exe File name: monter.exe
Size: 663.55 KB (663552 bytes)
MD5: b212e24c37596cab9338cfdd78566395
Detection count: 59
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\monter.exe
Group: Malware file
Last Updated: June 27, 2020
c:\cmslase.exe File name: cmslase.exe
Size: 443.39 KB (443392 bytes)
MD5: 26d27317025124ac585c1a463e2986e4
Detection count: 56
File type: Executable File
Mime Type: unknown/exe
Path: c:
Group: Malware file
Last Updated: January 25, 2020
C:\Users\<username>\AppData\Roaming\9nqgwv8fbtif4uwo0doaf_soay33wbvced8qyhz_gdfvk5sim8qss2lg3xls85ud.exe File name: 9nqgwv8fbtif4uwo0doaf_soay33wbvced8qyhz_gdfvk5sim8qss2lg3xls85ud.exe
Size: 632.32 KB (632320 bytes)
MD5: 682d94a60e5e5a360a1c4c5a00c45f3f
Detection count: 44
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Roaming
Group: Malware file
Last Updated: September 15, 2021
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\a0jcwvsyoru6vrdxkehkrjemn67g5vdzx8rm6zbhjeghyrphjasentbjs8k2bdtw.exe File name: a0jcwvsyoru6vrdxkehkrjemn67g5vdzx8rm6zbhjeghyrphjasentbjs8k2bdtw.exe
Size: 393.21 KB (393216 bytes)
MD5: 33e022862d91a662d0f979ff57e0a048
Detection count: 44
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming
Group: Malware file
Last Updated: September 15, 2021
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\msnetsys\44983o8uh99g8n8_pmubyhu7vfxxbh898xq8hnttmrrzf28tudu7mwrrm_11c1jn.exe File name: 44983o8uh99g8n8_pmubyhu7vfxxbh898xq8hnttmrrzf28tudu7mwrrm_11c1jn.exe
Size: 294.91 KB (294912 bytes)
MD5: 1cd7efb64b3e7bf1daaf857ba3ae4663
Detection count: 40
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming\msnetsys
Group: Malware file
Last Updated: September 15, 2021
c:\monter.exe File name: monter.exe
Size: 323.58 KB (323584 bytes)
MD5: 25a2930568080b56c849557993062735
Detection count: 36
File type: Executable File
Mime Type: unknown/exe
Path: c:
Group: Malware file
Last Updated: July 4, 2019
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\44783m8uh77g8l8_nkubyhu5vfxxbh878xo6hlttkppzf28tsdu5kwppk_11c1jl.exe File name: 44783m8uh77g8l8_nkubyhu5vfxxbh878xo6hlttkppzf28tsdu5kwppk_11c1jl.exe
Size: 733.18 KB (733184 bytes)
MD5: d4843dd4f0545ff524522a9f044e1d0f
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming
Group: Malware file
Last Updated: September 15, 2021
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\qsdruqrqvj_g8va_3dr6hwg0zee8pm43bt_gzhxj9l_1r99orqjfmvtchz2a_6p5.exe File name: qsdruqrqvj_g8va_3dr6hwg0zee8pm43bt_gzhxj9l_1r99orqjfmvtchz2a_6p5.exe
Size: 360.44 KB (360448 bytes)
MD5: 2b218368b427eca6cc2ee35a4d03a7bc
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming
Group: Malware file
Last Updated: September 15, 2021
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\_nnmyw203hl_2jipz8eiamg3qzxllt7whil9egmynr8b6_irqjccbo7spo8co8nm.exe File name: _nnmyw203hl_2jipz8eiamg3qzxllt7whil9egmynr8b6_irqjccbo7spo8co8nm.exe
Size: 233.47 KB (233472 bytes)
MD5: dd8039995c5c218eae97b0bd1f2e65b0
Detection count: 28
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming
Group: Malware file
Last Updated: September 15, 2021
%SYSTEMDRIVE%\Users\<username>\appdata\roaming\jqdhq7n98xuae9b_j6ys2aayb8jbg62tsxjck9qs85ud2fz29np_yyrrvabferaf.exe File name: jqdhq7n98xuae9b_j6ys2aayb8jbg62tsxjck9qs85ud2fz29np_yyrrvabferaf.exe
Size: 299 KB (299008 bytes)
MD5: 1495cc33f092057224f04dccef9d8219
Detection count: 26
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\appdata\roaming\jqdhq7n98xuae9b_j6ys2aayb8jbg62tsxjck9qs85ud2fz29np_yyrrvabferaf.exe
Group: Malware file
Last Updated: September 15, 2021
%SYSTEMDRIVE%\monter.exe File name: monter.exe
Size: 940B (940 bytes)
MD5: 835a3ed7cab69a3cde75402a59a843e6
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\monter.exe
Group: Malware file
Last Updated: June 27, 2020

More files

Registry Modifications

The following newly produced Registry Values are:

File name without path44893m9uh88g9l9_nkubyhu6vfxxbh989xo7hlttkppzf29ttdu6kwppk_11c1jl.exeRegexp file mask%APPDATA%\[RANDOM CHARACTERS].exe%HOMEDRIVE%\mssvca.exe%HOMEDRIVE%\mswvc.exe%HOMEDRIVE%\stcvc.exe%HOMEDRIVE%\stsvc.exe%LOCALAPPDATA%\TempQce34.exE

Additional Information

The following directories were created:
%APPDATA%\AMNI%APPDATA%\CloudApp%APPDATA%\DirectTools%APPDATA%\GpuSettings%APPDATA%\NetSocket%APPDATA%\NuiGet%APPDATA%\SystemApps%APPDATA%\WNetval%APPDATA%\WSOG%APPDATA%\WinNetCore%APPDATA%\WinSocket%APPDATA%\adirecttools%APPDATA%\anydeskadserv%APPDATA%\cashcore%APPDATA%\chromedata%APPDATA%\cleanmem%APPDATA%\cmdcache%APPDATA%\cpumon%APPDATA%\diskram%APPDATA%\dllsyslib%APPDATA%\extvisual%APPDATA%\gpuTools%APPDATA%\gpudriver%APPDATA%\gpuhealth%APPDATA%\iCloud%APPDATA%\mscache%APPDATA%\mscloud%APPDATA%\mslibrary%APPDATA%\netcache%APPDATA%\netrest%APPDATA%\nocsys%APPDATA%\safessd%APPDATA%\smcvs%APPDATA%\speedlan%APPDATA%\speedlink%APPDATA%\syscache%APPDATA%\sysexts%APPDATA%\syshealth%APPDATA%\sysswap%APPDATA%\taskhealth%APPDATA%\temporx%APPDATA%\vcneo%APPDATA%\winnet%APPDATA%\wnetwork%LOCALAPPDATA%\runningpost%LOCALAPPDATA%\wnetwork%UserProfile%\Local Settings\Application Data\wnetwork%WINDIR%\System32\config\systemprofile\AppData\Roaming\gpuTools%appdata%\WinDirectTools%appdata%\monolib%appdata%\monolibrary%appdata%\netwinlib%appdata%\services%appdata%\sysdefragler%appdata%\vpnpr%appdata%\windirect%localappdata%\deploytexas
Loading...