

Rewterz Threat Alert – Mirai Botnet aka Katana – Active IOCs
December 28, 2022
Rewterz Informative Update – Bitcoin Mining Pool BTC.com Lost $3M Worth Of Cryptocurrency In Cyberattack
December 28, 2022
Rewterz Threat Alert – Mirai Botnet aka Katana – Active IOCs
December 28, 2022
Rewterz Informative Update – Bitcoin Mining Pool BTC.com Lost $3M Worth Of Cryptocurrency In Cyberattack
December 28, 2022Severity
Medium
Analysis Summary
IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. The main purpose of this trojan is to steal financial information but aside from this, it is also a passage for a RAT. Initially, it was delivered as a later-stage payload from multiple threats including Emotet, TrickBot, and Hancitor. Recently, it is observed that its threat actors are using several new techniques to avoid detection by the sandbox and endpoint security. This trojan has capabilities similar to Zeus, Dridex, and Gozi (financial threats). IcedID can download different additional modules and a configuration file from C2. It performs its task of stealing information by deploying a man-in-the-browser attack which assists in gaining banking credentials.
Recently, a new IcedID malware campaign was observed in the wild.
Impact
- Financial Loss
- Exposure to Sensitive Data
Indicators of Compromise
Domain Name
trbiriumpa.com
MD5
- 2f39a11049419baf7305d6abf0d45dfc
- bdc362abb981e8aa18b4c19b41efec24
SHA-256
- f3a9b733cb33c4d257589e70c8d9cf4b5136cb3932bce2ea1b31bc9d5b06a5ae
- b1566f9c7ffa839554b96575e2a34ea79416f03df75b5048f561e96808975555
SHA-1
- 2c9b2484039b387aac6f1c6fbe3c6ab05e728edd
- d29b9c28636513071a169fc6dd293c21de890852
Remediation
- Emails from unknown senders should always be treated with caution.
- Never trust or open ” links and attachments received from unknown sources/senders.
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets