Rewterz Threat Advisory –CVE-2023-30441 – IBM Java Vulnerability
April 30, 2023Rewterz Threat Advisory –CVE-2023-29334 – Microsoft Edge (Chromium-based) Vulnerability
May 1, 2023Rewterz Threat Advisory –CVE-2023-30441 – IBM Java Vulnerability
April 30, 2023Rewterz Threat Advisory –CVE-2023-29334 – Microsoft Edge (Chromium-based) Vulnerability
May 1, 2023Severity
Medium
Analysis Summary
IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. IcedID malware is known for its sophisticated tactics, techniques, and procedures (TTPs) that allow it to evade detection and steal sensitive information from its victims. It is typically delivered via phishing emails, but it can also be delivered via exploit kits and other methods.
Once the malware is installed on a system, it begins to gather information about the infected computer and the user. This information is used to tailor the malware’s attacks to the specific victim. IcedID malware is known to use several methods to steal sensitive information, including keylogging, web injections, and form-grabbing.
The malware is also able to download additional malware and open a backdoor for the attackers to gain access to the infected system. This allows the attackers to gain a foothold on the victim’s network and steal sensitive information and move laterally to other systems.
The malware is also known to use a technique called “living off the land” to evade detection and make it harder for security software to detect and remove it. This includes using legitimate tools and processes that are present on the system and disguising the malware’s code to look like legitimate software.
IcedID malware is a serious threat to individuals and organizations alike, and it is important to be vigilant and take the necessary steps to protect yourself and your organization from this type of malware.
Impact
- Financial Loss
- Exposure to Sensitive Data
Indicators of Compromise
MD5
- df9c26963c7ad4f7245e04f8ab785681
- 31cae265e95ccad4fb868d1e9f1643c5
- 9e74202c220fd2d4f3e906d04407a2a7
- 08f1066319f0b180c9beec112d668250
- ce3e0885ae66b08546f73ac302b63cc6
SHA-256
- 9d228252fd19c92d22e11c0e3236015af4326903cf6fd015b72622a598b86cff
- 77e3de59fc2635e481327200cfb3b9dcdf0e5e199d3357bb724e10592a399858
- 4cdab0573e8b094fe8937a00c833cee67b8ccd9dbb5ae706624e5c12bdb7ae21
- 61e30e5027e36f945125634a1c363d2245404ec2d94071007fca55976dd6c2b6
- 27483870f4df637c7532e41c61e2ee1b6734b28bf511855b68c61abad031c8c8
SHA-1
- 2f059a2a417628d770355a07d7c909169b816858
- 27183c2b0d1d9aefc5099e159e992979d63ff783
- 440d3d5948dcce0d3c45a4cdf1d546f0208d3d38
- 833255426919a15c7d3a3c072a9829ad9b9bb261
- 59abe7945ba872b79e7a62d8356f373af4cd6637
URL
- https://fdorepolass.com/
- https://alomegodarks.com/news/1/255/0
- https://miolicelis.com/
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Patch and upgrade any platforms and software timely and make it into a standard security policy.
- Enforced Access Management Policies.