April 2, 2023

The TrickBot gang is working together with the TA551 threat group,operating via remote malware distribution sites based in European countries such as Slovakia, the Netherlands, and Germany.

The potential victim receives a password protected archive in phishing emails. This archive comes with malicious documents whose macros download and execute TrickBot and BazarBackdoor from the remote distribution site. These malware carry out other malicious activities, such as reconnaissance, credential theft,data exfiltration. Reconnaissance and exfiltration have a duration of two days.


The operators of the campaign use the abandoned BazarBackdoor for enumerating users, domain administrators, shared resources, and shared computers, as well as for network reconnaissance. They deploy the Cobalt Strike beacon on the compromised system and add scheduled tasks for persistence. 

Hackers steal user credentials, Active Directory data, password hashes, and abuse anything exploitable to spread across the network. They fiddle with registry values to enable RDP connectivity and tamper with Windows Firewall rules using ‘netsh’ command.

The real time monitoring feature of Windows Defender is disabled as well to stop any alert during the encryption process. In the final stage before file encryption, Conti uses the Rclone tool to exfiltrate data and send it to a remote endpoint. Two days after the initial infection, Conti is deployed.

The recent collaborations between Trickbot and TA551 show how threat groups help each other grow. It further increases the risks of destructive attacks and therefore organizations should be prepared with adequate security steps, including regular backup of important data at a secure remote location.


Indicators of Compromise

  • 3abcbdbafaed11429934767646da6759c288838167e3a9171f082022a0a21973
  • 9090a926b84b232269a324ac188a627c8f5fbfeb602e4d6d8612d29cb6bbf088
  • 992dc59ba7124aae9761d280deed3ec381be7c1379538722687a40573a48f470
  • db8a4ab4b2f7f68c2ddb6ef4f57558e81352996d57b883fbd062741d137df5f3
  • 4f820c838d1a374070fe0191857e11725826141817e0d3784f7aa98b1b5a788a
  • 46cd1a68f397cbbc4149a8343262714de7a03193d02c368a16e4a3a5c441934f
  • 6a7d7aebd64287988b2329f8fa45e763b130d5425d76181ee08fb62f6966b9f2
  • 7bbcb876e8d7b3ce6bc5e6e19f1be88a6406b938fade15d652e98ba9890bed6e
  • 87537d2187545d9db3014decd71c5bf43b1a524feb6c8b0e56fb87a50860466c
  • 4f423d4ab78a5201862d4a04c294f33bd6e01df2bf8d1c38053e3e099723496d
  • 2ff7ade2fd356849d1ed18c299f92f1ecce8494bdd98265040affd0d9264d84e
  • 5c8bf6e86f7b7bfb36966d2737e7cbc1bf7bcae3029706be4a35142da007806c
  • d3533b471df155bcbff081d02b3c174aca7b3d15f0759b9b3180174365cbab95
  • 22ade5dbd3fb6a4d10a8b2f177e85d86672dbd3c8c2863815d8f774388750362
  • 4e821e4ca09ab2122dc14836a643915f4a2d5014a7391e4e9a912826f3dec88e
  • e63c268fcff21829a77e71e5a0b94bfb7cbe9a926d5f63c80f1170a743f4eb38
  • 6287062e2aea32cc3d58a88d6a8b576d205cbb9864f64dd213f58002e20a321e
  • 1843c2bc9d93bca343709c0ee29f559a3ed4356e97eb7f39933942d5130f56f6
  • 1ea5a52237a5a6310388c39cb0a5c3c16c363e6abb575a7691706074bd126cc9
  • 64b8b098f4c87dfa5013066be465eda8c191011236609fab8ccad3aa5e09d9b0
  • 47f42ce0c6b02324f4e56b98518d74199a328903ac8f8f8514e8022413bac7f6
  • 785e7a1f4e7d48efff95dd5d5574d7326845e67ccf3dc9b4dd228d25246ba933
  • 7d0f98716c1ee3e5a93d3403132770c0a5ff5e1e9cd9283ef8f9a1fcae77a5ab

Leave a Reply

%d bloggers like this: