2021-02-22 (MONDAY) - ICEDID (BOKBOT) FROM SAME TYPE OF URL THAT NORMALLY DELIVERS QAKBOT

NOTICE:

ASSOCIATED FILES:

  • 2021-02-22-IOCs-for-IcedID-infection.txt   (2,651 bytes)
  • 2021-02-22-IcedID-infection-traffic.pcap   (9,336,185 bytes)
  • 2021-02-22-scheduled-task-for-IcedID.txt   (3,914 bytes)
  • document-550193913.xls   (93,696 bytes)
  • user1/rieuro.vnt   (3,115,520 bytes)
  • user1/local/Temp/directx32.tmp   (3,110,400 bytes)
  • user1/local/{3EBBD96D-9EB0-D370-8F85-A89B5E4EBD7E}/zilifc64.dll   (3,110,400 bytes)
  • user1/Roaming/PlayTravel/license.dat   (340,874 bytes)

NOTE:

 

IMAGES

 


Shown above:  Screenshot of the Excel spreadsheet used for today's infection.

 


Shown above:  Traffic from the infection filtered in Wireshark.

 


Shown above:  IcedID persistent on the infected Windows host.

 

Click here to return to the main page.