top of page
enfastodownrosmisc

Stealthy Trickbot Trojan Can Disable Windows Defender and Target Cloud Workloads



This post is here to inform you of the fact that stealthy banking Trojan Trickbot now can disable the Windows built-in anti-virus software Windows Defender. Check out this post more for more information.


Both attempts failed in the context of the victim. The threat actor then attempted to disable EPP/AV products on the different machines. Bitdefender was first targeted through the attempt to disable BitDefender mini-filter with the command:




Stealthy Trickbot Trojan Can Disable Windows Defender




*Reading List* -you-should-know-about-ryuk-ransomware/ -game-hunting-with-ryuk-another-lucrative-targeted-ransomware/ -and-digital-threats/ryuk-ransomware-shows-diversity-in-targets-consistency-in-higher-payouts -ryuk-ransomware-information -and-digital-threats/examining-ryuk-ransomware-through-the-lens-of-managed-detection-and-response -security-intelligence/trickbots-bigger-bag-of-tricks/ -ransomware-attacks-businesses-over-the-holidays/ -is-back-botnet-springs-back-to-life-with-new-spam-campaign/ -is-back-after-summer-break.html -is-credential-stuffing/ -ransomware-targets-av-solutions-not-just-files/ -stops-on-powershell-empire-framework-after-project-reaches-its-goal/ -technology/2019/01/new-ransomware-rakes-in-4-million-by-adopting-a-big-game-hunting-strategy/ -technology/2019/09/worlds-most-destructive-botnet-returns-with-stolen-passwords-and-email-in-tow/ -us/2019/10/04/rolling-back-ryuk-ransomware/ -hospital-pays-ryuk-ransomware-for-decryption-key/ -decryption-tools/ -report-on-publicly-available-hacking-tools -malware -powershell-protection-logging/ -us/windows-server/identity/software-restriction-policies/software-restriction-policies -whitelisting-software-restriction-policies-vs-applocker-vs-windows-defender-application-control/ -to-block-viruses-and-ransomware-using-software-restriction-policies/ -us/sccm/sum/deploy-use/automatically-deploy-software-updates -17/thursday/us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And%20Evasion-Using-Science-wp.pdf -against-common-phishing-frameworks-kits-with-splunk-enterprise-security-content-updates.html -for-investigate-and-respond-to-phishing-payloads-with-splunk-enterprise-security-content-update.html -lets-hunt-powershells.html -forensics.sans.org/blog/2012/12/17/protecting-privileged-domain-accounts-psexec-deep-dive @bromiley/digging-into-sysinternals-psexec-64c783bace2bEmotet: Trickbot: PsExec: -us/sysinternals/downloads/sysmon -dfir -zealand-comcom-suffers-breach-after-laptop-theft/


Detects Request to amsiInitFailed that can be used to disable AMSI (Antimalware Scan Interface) Scanning. More information about Antimalware Scan Interface -us/windows/win32/amsi/antimalware-scan-interface-portal. 2ff7e9595c


1 view0 comments

Recent Posts

See All

Comments


bottom of page