

Rewterz Threat Advisory – ICS: Siemens SINEC NMS Vulnerabilities
March 9, 2022
Rewterz Threat Advisory – Multiple Adobe Illustrator and After Effect Vulnerabilities
March 10, 2022
Rewterz Threat Advisory – ICS: Siemens SINEC NMS Vulnerabilities
March 9, 2022
Rewterz Threat Advisory – Multiple Adobe Illustrator and After Effect Vulnerabilities
March 10, 2022Severity
High
Analysis Summary
IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. The main purpose of this trojan is to steal financial information but aside from this, it is also a passage for a RAT. Initially, it was delivered as a later-stage payload from multiple threats including Emotet, TrickBot, and Hancitor. Recently, it is observed that its threat actors are using several new techniques to avoid detection by the sandbox and endpoint security. This trojan has capabilities similar to Zeus, Dridex, and Gozi (financial threats). IcedID can download different additional modules and a configuration file from C2. It performs its task of stealing information by deploying a man-in-the-browser attack which assists in gaining banking credentials.
Impact
- Financial Loss
- Exposure of Sensitive Data
Indicators of Compromise
Filename
- Xxg8E5bO[.]dll
MD5
- 2472891d8fc307d184b4bdad6721aea3
SHA-256
- 63d06f257647514c56b7a8cbe5ee182c834dc8bf09663d4f99a8b568d9e7ff95
SHA-1
- 6b0611b597a08906d0e80f231011be487bec38cb
URL
- http[:]//golinisye[.]top/
Remediation
- Block all threat indicators at their respective controls.
- Search for IOCs in your environment.