TrickBot actors behind the TrickBot trojan developed a private post-exploitation toolkit called PowerTrick to spread malware laterally throughout a network. TrickBot has started to focus more on the enterprise environment with the release of new modules and by partnering with the Ryuk ransomware actors. SentinelLabs researchers have created a mock command and control panel and various PowerShell commands that emulate the tool to test network security against the tool. The end-goal of the Powertrick backdoor is to bypass restrictions and security controls to adapt to the new age of security controls and exploit the most protected and secure high-value networks.
Source: https://www.bleepingcomputer.com/news/security/trickbot-gang-created-a-custom-post-exploitation-framework/