Researchers looked into PowerShell-based backdoor called “PowerTrick” traces back to the initial infection, it was assessed with high confidence at least some of the initial PowerTrick infections are being kicked off as a PowerShell task through normal TrickBot infections utilizing a repurposed backconnect module that can accept commands to execute called “NewBCtest”.
After the initial stager for the “PowerTrick backdoor” is kicked off, then the actor issues the first command which is to download a larger backdoor.
PowerTrick is designed to execute commands and return the results in Base64 format, the system uses a generated UUID based on computer information as a “botID.”
The Victim data is then posted back to the controller.
PowerTrick is simply designed to execute commands and return results.