Researchers Discover Packer Employed by Several Malware to Avoid Being Identified For Six Years

Researchers Discover Packer Employed by Several Malware to Avoid Being Identified For Six Years

Over the past six years, a shellcode-based packer known as TrickGate has been functioning successfully without drawing attention while enabling threat actors to spread a variety of malware, including TrickBot, Emotet, AZORult, Cerber, Agent Tesla, FormBook, Maze, and REvil. “TrickGate managed to stay under the radar for years because it is transformative – it undergoes changes periodically,” said Check Point Research’s Arie Olshtein, describing it as a “master of disguises.”

TrickGate has been made available as a service to other threat actors since at least late 2016. It assists in hiding payloads behind a layer of wrapper code in an effort to get past security measures placed on a host. Packers can also act as crypters by using the malware’s encryption as an obfuscation technique. According to a Proofpoint report from December 2020, Packers have a variety of characteristics that enable them to evade detection measures by pretending to be innocuous files, being challenging to reverse engineer, or employing sandbox evasion tactics.

However, TrickGate has been followed since 2019 under a number of names, including new loaderLoncom, and NSIS-based crypter, due to the commercial packer-as-a-service’s updates. According to telemetry data acquired by Check Point, TrickGate-using threat actors have targeted the industrial industry predominantly, with smaller concentrations in education, healthcare, government, and finance.

FormBook, LokiBot, Remcos, Agent Tesla, and Nanocore are the most frequently employed malware families in recent cyberattacks, with notable concentrations recorded in Taiwan, Turkey, Germany, Russia, and China. Sending phishing emails with malicious attachments or click-bait URLs that download a shellcode loader responsible for decrypting and releasing the actual payload into memory is the first step in the infection chain.

According to a study of it by an Israeli cybersecurity company, the shellcode has been modified often, although the core features have been present on all samples since 2016. Olshtein found that the injection module has been the component that has been the most reliable over time and can be seen in all TrickGate shellcodes.

About the author

Yehudah Sunshine

Yehudah Sunshine

Bringing together his diverse professional cyber know-how, intellectual fascination with history and culture, and eclectic academic background focusing on diplomacy and the cultures of Central Asia, Yehudah Sunshine keenly blends his deep understanding of the global tech ecosystem with a nuanced worldview of the underlying socio-economic and political forces which drive policy and impact innovation in the cyber sectors. Yehudah's current work focuses on how to create and or opportunities enhance marketing strategies and elevate cyber driven thought leadership for cyfluencer (www.cyfluencer .com), the cybersecurity thought leadership platform. Sunshine has written and researched extensively within cybersecurity, the service sectors, international criminal accountability, Israel's economy, Israeli diplomatic inroads, Israeli innovation and technology, and Chinese economic policy.

Share: