Rewterz Threat Advisory – CVE-2022-39135 – Apache Calcite XML external Vulnerability
September 13, 2022Rewterz Threat Alert – RedLine Stealer – Active IOCs
September 13, 2022Rewterz Threat Advisory – CVE-2022-39135 – Apache Calcite XML external Vulnerability
September 13, 2022Rewterz Threat Alert – RedLine Stealer – Active IOCs
September 13, 2022Severity
High
Analysis Summary
IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. The main purpose of this trojan is to steal financial information but aside from this, it is also a passage for a RAT. Initially, it was delivered as a later-stage payload from multiple threats including Emotet, TrickBot, and Hancitor. Recently, it is observed that its threat actors are using several new techniques to avoid detection by the sandbox and endpoint security. This trojan has capabilities similar to Zeus, Dridex, and Gozi (financial threats). IcedID can download different additional modules and a configuration file from C2. It performs its task of stealing information by deploying a man-in-the-browser attack which assists in gaining banking credentials.
Impact
- Financial Loss
- Exposure of Sensitive Data
Indicators of Compromise
MD5
- 1f13e8bf4457a0237d317bdc3a35c741
- 775f8269f975b529ee94d326204bef74
- bf372220e27d8991436b05559f766945
SHA-256
- bac1b542594a0647cd3da09dece68e7f552ba83d944f3ccaaafd929dff790527
- 0cc8e8e0aba5fd04b8a0f6e6aef7b0b550a3b3e5032591bb4782b163fbf310bc
- 3bcc781fa689145f9467b3f9251db367eef2385dc7df5a7c9084a992a9d2bf63
MD5
- f5138a2bbb42672954217c05dff1c36c81f9f902
- 6a42ae062205f2952462bba858ecb6c41a97b371
- ef7b2e98731e697a5b91601bc06b744a478fdbf0
Remediation
- Block all threat indicators at their respective controls.
- Search for IOCs in your environment.