• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Mirai Botnet aka Katana – Active IOCs
December 28, 2022
Rewterz Informative Update – Bitcoin Mining Pool BTC.com Lost $3M Worth Of Cryptocurrency In Cyberattack
December 28, 2022

Rewterz Threat Alert – New IcedID banking Malware Campaign – Active IOCs

December 28, 2022

Severity

Medium

Analysis Summary

IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. The main purpose of this trojan is to steal financial information but aside from this, it is also a passage for a RAT. Initially, it was delivered as a later-stage payload from multiple threats including Emotet, TrickBot, and Hancitor. Recently, it is observed that its threat actors are using several new techniques to avoid detection by the sandbox and endpoint security. This trojan has capabilities similar to Zeus, Dridex, and Gozi (financial threats). IcedID can download different additional modules and a configuration file from C2. It performs its task of stealing information by deploying a man-in-the-browser attack which assists in gaining banking credentials.

Recently, a new IcedID malware campaign was observed in the wild.

Impact

  • Financial Loss
  • Exposure to Sensitive Data

Indicators of Compromise

Domain Name

trbiriumpa.com

MD5

  • 2f39a11049419baf7305d6abf0d45dfc
  • bdc362abb981e8aa18b4c19b41efec24

SHA-256

  • f3a9b733cb33c4d257589e70c8d9cf4b5136cb3932bce2ea1b31bc9d5b06a5ae
  • b1566f9c7ffa839554b96575e2a34ea79416f03df75b5048f561e96808975555

SHA-1

  • 2c9b2484039b387aac6f1c6fbe3c6ab05e728edd
  • d29b9c28636513071a169fc6dd293c21de890852

Remediation

  • Emails from unknown senders should always be treated with caution.
  • Never trust or open ” links and attachments received from unknown sources/senders.
  • Block all threat indicators at your respective controls.
  • Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
  •  Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
  • Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.