DarkCrystal RAT (DCRat) – Active IOCs
September 20, 2022Rewterz Threat Alert – Hive Ransomware – Active IOCs
September 20, 2022DarkCrystal RAT (DCRat) – Active IOCs
September 20, 2022Rewterz Threat Alert – Hive Ransomware – Active IOCs
September 20, 2022Severity
High
Analysis Summary
IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. The main purpose of this trojan is to steal financial information but aside from this, it is also a passage for a RAT. Initially, it was delivered as a later-stage payload from multiple threats including Emotet, TrickBot, and Hancitor. Recently, it is observed that its threat actors are using several new techniques to avoid detection by the sandbox and endpoint security. This trojan has capabilities similar to Zeus, Dridex, and Gozi (financial threats). IcedID can download different additional modules and a configuration file from C2. It performs its task of stealing information by deploying a man-in-the-browser attack which assists in gaining banking credentials.
Impact
- Financial Loss
- Exposure of Sensitive Data
Indicators of Compromise
Domain Name
- pildofraften[.]com
MD5
- a1ad27d72e6d91650411155017c27611
- a2f269e07c4e4be9e7d295bd34331146
- 719bfd2965e4b36658eac79caa92dedd
SHA-256
- 3ce0cdd5bec7b36c0fabcca442e764363db96ce584fbaf84f95a883530b5da75
- 7e06cdff2b667d8748bc8822ef11173cd7a66c5a52d2d2fbaf78c92a94c5f69c
- 612ec2950cd183b7180e27bf204952ef2de3c4524fb0ec9f6e107953d30f18cc
SHA-1
- 12527afb63cd2978ddb82899f791872df12169dc
- 573a2862f0b067f503bd53cda70add0a5f5930c3
- 884c79438d69a746f453fea321343c94fc8a06a0
Remediation
- Block all threat indicators at their respective controls.
- Search for IOCs in your environment.