Trickbot, Emotet Use Text About Trump to Evade Detection
07 lutego 2020

Trickbot’s use of Trump-related text
Trickbot, discovered in 2016, is a banking malware used to steal personally identifiable information (PII). A recent variant of Trickbot can be dropped by Emotet as part of secondary infection.
Vitali Kremez of SentinelLab and security researcher MalwareHunterTeam reported that texts from articles about Trump were used to mask the Trickbot malware. Snippets from an impeachment story by The Independent were lifted and placed under InternalName, FileDescription, and OriginalFileName of one sample. Another took text from a CNN article about Trump’s impeachment, and added them as custom exif data tags.
Kremez said the technique added and appended “goodware” strings to binaries in order to bypass static machine learning engines.
Emotet’s use of the technique
Emotet was discovered by Trend Micro researchers in 2014 as a banking malware family also used to steal PII. At present, the malware has evolved to add more damage inducers in its arsenal; recent versions of Emotet have since been found delivering other malicious payloads and improving their evasion technique.
Trend Micro researchers detected Emotet samples using text from another article about Trump, based on an interview conducted a few hours before this year’s Super Bowl.

Figure 1. Emotet samples observed by Trend Micro researchers (using Virus Total)

Figure 2. Metadata of a file carrying Emotet malware
Trumping security threats
As cybersecurity experts come up with new ways to strengthen the protection of systems, cybercriminals at the same time learn more ways to circumvent security solutions. To defend themselves and their companies against threats, users should practice good cybersecurity hygiene and do the following:
- Don’t forgo or delay the installation of patches and updates to ensure that even newly discovered vulnerabilities can’t be exploited.
- Observe lags and glitches, especially when they happen frequently. These may be caused by a malware infection.
- Don’t settle for default passwords and security settings. Change and update passwords regularly, and configure security settings depending on specific needs.
- Conduct cybersecurity awareness trainings in your organization or even at home.
- Control access based on the principle of least privilege.
In these particular Emotet and Trickbot campaigns, it is highly likely that the points of entry used are socially engineered emails carrying a malicious attachment, since this is the typical method to propagate both Trickbot and Emotet. Also, the use of recent news to propagate malware has been used as a bait in other attacks before. As a defense from such attacks, users are also advised to closely inspect emails, and to be careful of clicking links and downloading attachments especially from unknown sources.
Further build up the security of systems by employing a multilayered security approach that will protect gateways, endpoints, networks, and servers while allowing centralized visibility and control. Such methods are recommended since threat actors can use any of these layers as entry points, and a threat that affects a single layer usually spreads to other layers soon after as well.
Additional research by Angelo Deveraturda and Raymart Paraiso
Additional research by Angelo Deveraturda and Raymart Paraiso
HIDE
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- CES 2025: A Comprehensive Look at AI Digital Assistants and Their Security Risks
- Metaverse or Metaworse? How the Apple Vision Pro Stacks Up Against Predictions
- Understanding Hacktivists: The Overlap of Ideology and Cybercrime
- Across the Span of the Spanish Cybercriminal Underground: Current Activities and Trends
- Bridging Divides, Transcending Borders: The Current State of the English Underground