- Dec 27, 2014
- 3,423
A new version of the TrickBot banking Trojan continues its evolution of targeting security software in order to prevent its detection and removal. In this new version, TrickBot has set its sights on Windows Defender, which for many people is the only antivirus installed on a Windows 10 machine.
TrickBot is a banking Trojan that attempts to steal online banking credentials, cryptocurrency wallets, browser information, and other credentials saved on your PC and browser.
When TrickBot is executed it first starts a loader that gets the system ready by disabling Windows services and processes associated with security software and performing elevation to gain higher system privileges. When that is completed, it will load the "core" component by injecting a DLL that then downloads modules used to steal information from the computer, contains the communication layer, and perform other tasks.
[...]
These new methods perform the following steps, with most, if not all, being blocked by TamperProtection if enabled:
Full arcticle @ source.
TrickBot is a banking Trojan that attempts to steal online banking credentials, cryptocurrency wallets, browser information, and other credentials saved on your PC and browser.
When TrickBot is executed it first starts a loader that gets the system ready by disabling Windows services and processes associated with security software and performing elevation to gain higher system privileges. When that is completed, it will load the "core" component by injecting a DLL that then downloads modules used to steal information from the computer, contains the communication layer, and perform other tasks.
[...]
These new methods perform the following steps, with most, if not all, being blocked by TamperProtection if enabled:
- Add policies to SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection for the following:
- DisableBehaviorMonitoring: Disables behavior monitoring in Windows Defender.
- DisableOnAccessProtection: Disables scanning when you open a program or file.
- DisableScanOnRealtimeEnable: Disabled process scanning.
- Configures the following Windows Defender preferences via PowerShell:
- DisableRealtimeMonitoring: Disables real time scanning.
- DisableBehaviorMonitoring: Same as above, except as a Windows Defender preference.
- DisableBlockAtFirstSeen: Disables Defender's Cloud Protection feature.
- DisableIOAVProtection: Disables scans of downloaded files and attachments.
- DisablePrivacyMode: Disables privacy mode so all users can see threat history.
- DisableIntrusionPreventionSystem: Disables network protection for known vulnerability exploits.
- DisableScriptScanning: Disables the scanning of scripts.
- SevereThreatDefaultAction: Set the value to 6, which turns off automatic remediation for severe threats.
- LowThreatDefaultAction: Set the value to 6, which turns off automatic remediation for low threats.
- ModerateThreatDefaultAction: Set the value to 6, which turns off automatic remediation for moderate threats.
Full arcticle @ source.