Parent class: TrojWare
Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate. Trojans are classified according to the type of action they perform on an infected computer.Class: Trojan
A malicious program designed to electronically spy on the user’s activities (intercept keyboard input, take screenshots, capture a list of active applications, etc.). The collected information is sent to the cybercriminal by various means, including email, FTP, and HTTP (by sending data in a request).Read more
Platform: Win32
Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.Description
Trojan.Win32.Trickster (also known as TrickLoader and TrickBot) is capable of infecting 32- and 64-bit versions of Windows. The Trojan is generally small in size (less than 500 KB) and does not use additional packaging or encryption for the main body. Judging by the protocol used to communicate with the command-and-control server, the malware was rewritten from the source code for Dyre (Dyreza) but, unlike Dyre, is able to perform web injects. The main body of Trojan.Win32.Trickster contains the following characteristic strings in Unicode format: • TrickLoader • Global\TrickBot • BotLoader A characteristic and easily identifiable trait of the malware is the presence of the "TrickLoader" string in the User-Agent field of network packets. A file with the list of command-and-control servers for Trojan.Win32.Trickster is stored in encrypted form in resources. The AES encryption algorithm is used for decrypting the list as well as modules received from command-and-control servers. The key consists of a hash in RSA-256 format. Currently known information about the modules used by the malware: • systeminfo – the first module for Trojan.Win32.Trickster • injectDll – module injected into the browser and used for web injectsTop 10 countries with most attacked users (% of total attacks)
1
Australia
17.56%
2
USA
6.29%
3
United Kingdom
6.17%
4
Singapore
4.98%
5
India
3.68%
6
Russian Federation
3.32%
7
Japan
3.20%
8
France
3.08%
9
Italy
3.08%
10
China
2.85%
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!