Updated July 06, 2017 (originally published December 01, 2016) Updated July 06, 2017

Trickbot Now Targeting German Banking Group Sparkassen-Finanzgruppe

2 min. read

Trickbot, the latest arrival to the banking malware scene and successor to the infamous Dyre botnet, is in constant flux, and its authors are continually adding new targets and functionality. F5 malware researchers have been monitoring Trickbot and have uncovered a new variant that substantially increases the number of German banks being targeted. Trickbot was previously focused on banks in Australia, the UK, and Canada, but only a very small number of banks in Germany, as shown in our November 7, 2016 article Little TrickBot Growing Up: New Campaign.

This latest variant, version “1000007” as shown in the base configuration below, targets banks belonging to one of Germany’s largest banking groups: Sparkassen-Finanzgruppe.


Figure 1: TrickBot Version 1000007

Figure 1: TrickBot Version 1000007


Figures 2 and 3 directly below show configuration snippets that identify some of the targeted banking domains:

Figures 2 & 3: Banking targets in webinject configuration

Figures 2 & 3: Banking targets in webinject configuration


TrickBot version 1000007 targets the following German banks:

  • Stadtsparkasse Hilchenbach
  • Sparkasse Goettingen
  • Kreissparkasse Traunstein-Trostberg
  • Kreissparkasse Freudenstadt
  • Kreissparkasse Boeblingen
  • Landessparkasse zu Oldenburg
  • OstseeSparkasse Rostock
  • Sparkasse Kulmbach-Kronach
  • Sparkasse Maerkisches Sauerland Hemer-Menden

The malware sample analyzed is referenced below with its corresponding Virus Total report. This particular sample only has a 25% detection ratio within the world’s top antivirus providers. Only time will tell if this newcomer will reach the epic scale of its predecessor, but if history is any lesson, TrickBot will surely continue to expand its target portfolio and abilities to commit fraud just as Dyre did in its heyday.

Sampled MD5: 43cfa53d6d327356f23bc73dc737bfcd


Expertly picked stories on threat intelligence

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.


9 hrs

a critical vulnerability—with the potential for remote code execution—is released.