Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
TrickBot now crashes researchers' browsers to block malware analysis
#1
https://www.bleepingcomputer.com/news/se...-analysis/    TrickBot now crashes researchers' browsers to block malware analysis
By Bill Toulas
January 25, 2022 03:06 PM    The notorious TrickBot malware has received new features that make it more challenging to research, analyze, and detect in the latest variants, including crashing browser tabs when it detects beautified scripts.

TrickBot has dominated the malware threat landscape since 2016, constantly adding optimizations and improvements while facilitating the deployment of damaging malware and ransomware strains.

As TrickBot is modular, the threat actors can deploy modules that perform a wide variety of malicious activities, including man-in-the-browser attacks to steal online banking credentials, the stealing of active directory databases, spreading through a network, data exfiltration, and more.

Apart from being a banking trojan, TrickBot is also used to deploy other payloads thanks to its stealthiness and effectiveness.

Most recently, it has been linked to the Diavol ransomware group, the Conti ransomware gang, and even the re-emergence of Emotet.

Researchers at IBM Trusteer have analyzed recent samples to see what new anti-analysis features have been introduced recently by the authors and present some interesting findings in their report.

Researchers not welcome
First, TrickBot's developers use a range of obfuscation and base64 encoding layers for the scripts, including minify, string extraction and replacement, number base and representing, dead code injection, and monkey patching.

Obfuscation is expected in the malware world, but TrickBot features many layers and redundant parts to make analysis slow, cumbersome, and often produce inconclusive results.

Second, when injecting malicious scripts into web pages to steal credentials, the injections don't involve local resources but rely solely on the actors' servers. As such, analysts cannot retrieve samples from the memory of infected machines.

TrickBot communicates with the command and control (C2) server using the HTTPS protocol, which supports encrypted data exchange.

Also, the injection requests include parameters that flag unknown sources, so analysts cannot retrieve samples from the C2 using an unregistered endpoint.

By gathering the device's fingerprint, TrickBot operators can inject a custom script into each victim's browser, targeting a specific bank and persuading its system that it's interacting with the actual customer.

Finally, TrickBot features an anti-debugging script in the JS code, which helps it anticipate when it is being analyzed and triggers a memory overload that crashes the page.

TrickBot previously attempted to determine if it's being analyzed by checking the host's screen resolution, but now it also looks for signs of "code beautifying."

Code beautifying is the transformation of obfuscated code or unwrapped text into content more easily readable by a human eye and thus easier to identify interesting code within it.

Recent variants of TrickBot use regular expressions to detect when one of its injected scripts has been beautified, typically indicating a security researcher is analyzing it.

If beautified code is found, TrickBot now crashes the browser to prevent further analysis of the injected script.

"TrickBot uses a RegEx to detect the beautified setup and throw itself into a loop that increases the dynamic array size on every iteration. After a few rounds, memory is eventually overloaded, and the browser crashes," IBM Trusteer researchers explain in a new blog post.

How to stay safe
TrickBot usually arrives on the target system through phishing emails that include a malicious attachment that executes macros to download and install malware.

Apart from treating incoming emails with caution, it is also advisable to enable multi-factor authentication on all your accounts and regularly monitor login logs where possible.

Because many TrickBot infections end with ransomware attacks, following network segmentation practices and a regular offline backup schedule are also vital to containing potential threats.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  What Is Dynamic Malware Analysis? (Bitdefender) mrtrout 0 573 03-23-2023 , 05:00 PM
Last Post: mrtrout
  Microsoft creates tool to scan MikroTik routers for TrickBot infections tarekma7 0 972 03-19-2022 , 02:35 PM
Last Post: tarekma7
  New ways to phish found by academic researchers mrtrout 0 685 01-07-2022 , 12:14 AM
Last Post: mrtrout
  Researchers Uncover 'Process Ghosting' — A New Malware Evasion Technique mrtrout 0 971 06-17-2021 , 08:34 PM
Last Post: mrtrout
  APT Charming Kitten Pounces on Medical Researchers Bjyda 0 1,233 03-31-2021 , 09:40 PM
Last Post: Bjyda



Users browsing this thread: 2 Guest(s)