2023-01-16 (MONDAY) - ICEDID (BOKBOT) WITH BACKCONNECT, KEYHOLE VNC AND COBALT STRIKE
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2023-01-16-IOCs-for-IcedID-infection-with-backconnect-and-Keyhole-VNC-and-Cobalt-Strike.txt.zip 2.2 kB (2,192 bytes)
- 2023-01-16-IcedID-infection-with-Backonnect-and-Keyhole-VNC-and-Cobalt-Strike.pcap.zip 7.4 MB (7,384,478 bytes)
- 2023-01-16-malware-and-artifacts-for-IcedID-and-Cobalt-Strike.zip 1.7 MB (1,678,830 bytes)
2023-01-16 (MONDAY) - ICEDID (BOKBOT) INFECTION WITH BACKCONNECT TRAFFIC, KEYHOLE VNC, AND COBALT STRIKE NOTES: - Big thanks to @pr0xylife for sharing the PDF sample on Malware Bazaar. INFECTION CHAIN: - email --> PDF attachment with firebasestorage link --> downloaded zip file --> extracted ISO --> Windows shortcut runs IcedID installer --> IcedID C2 --> backconnect traffic --> Keyhole VNC and Cobalt Strike ASSOCIATED MALWARE: - SHA256 hash: c2e3097e2de547d70f1d4543b51fdb0c016a066646e7d51b74ca4f29c69f5a85 - File size: 111,961 bytes - File name: Scan_34262_INV.pdf - File description: Email attachment, PDF file used to download password-protected zip archive below - Sample avaiable at: https://bazaar.abuse.ch/sample/c2e3097e2de547d70f1d4543b51fdb0c016a066646e7d51b74ca4f29c69f5a85/ - SHA256 hash: 778f1cbd036de33d6e6eb5b0face18c276732e365111bdfae447b30ccfebf8c5 - File size: 145,276 bytes - File name: Document-2325.zip - File location: hxxps[:]//firebasestorage.googleapis[.]com/v0/b/atlantean-field-372418.appspot.com/o/vnnaLMV3ii%2F Document-2325.zip?alt=media&token=3eb21a6e-77b3-453c-a091-cae359354173 - File description: Password-protected zip archive - Password: 53842 - SHA256 hash: f96779056b8390e4329b2012fc1bf7bc7b55aca84665ba41c9e3674169080413 - File size: 1,441,792 bytes - File name: Document-2325.iso - File description: ISO image extracted from the above zip archive CONTENTS OF ISO IMAGE: - SHA256 hash: 377aaa472ab194cdd112cc225fcf56e37506685186df6e9508347bf9ae78d5fc - File size: 1,978 bytes - File name: REF_Scan_01-16.lnk - File description: Windows shortcut - SHA256 hash: 95c7ec322d35e25ed95ff77a0f7e05352158b6a5b921ebd93a06e37072d8e6ee - File size: 1,503 bytes - File name: raycatmady\vatphiefts.cmd - File description: .cmd script run by above Windows shortcut - SHA256 hash: c06805b6efd482c1a671ec60c1469e47772c8937ec0496f74e987276fa9020a5 - File size: 233,864 bytes - File name: raycatmady\kickboxing.dat - File description: 64-bit DLL for IcedID installer, run by above .cmd script FILES FROM THE INFECTION: - SHA256 hash: 0f08d92c3d1ffd8ca2555dbc08d0d90a88a6d02139897fcd33abb650c0a4a74c - File size: 583,427 bytes - File location: hxxp[:]//dgormiugatox[.]com/ - File description: Gzip binary retrieved by IcedID installer - SHA256 hash: 509628d0ce1f30b6ce77aa484fb687aa23fa9d7ee73ed929e149eee354b3a3b0 - File size: 352,906 bytes - File location: C:\Users\[username]\AppData\Roaming\SupremeRail\license.dat - File description: Data binary used to run persistent IcedID DLL - SHA256 hash: 09d005017ec20c72934a64a507bb3f1165239d56c4edf95587ba7b8fdf13835d - File size: 229,768 bytes - File location: :\Users\[username]\AppData\Roaming\Doaw3\Jopeqi\nifoedcm1.dl - File description: 64-bit DLL for persistent IcedID infection - Run method: rundll32.exe [filename],init --daebro="[path to license.dat]" - SHA256 hash: 58e13af4b331aea02c255dbc64b0a1f224da0c6a7f587ff4fbd7b773edf392ac - File size: 114,688 bytes - File location: C:\ProgramData\p64.dll - File description: 64-bit DLL for Cobalt Strike stager - Run method: rundll32.exe [filename],DllRegisterServer INFECTION TRAFFIC: ICEDID INSTALLER RETRIEVES GZIP BINARY: - 168.100.10[.]178 port 80 - dgormiugatox[.]com - GET / HTTP/1.1 ICEDID C2: - 89.44.9[.]157 port 443 - ijoyzymama[.]com - HTTPS traffic - 5.230.74[.]203 port 443 - felzater[.]lol - attempted TCP connections, unsuccessful - 45.12.109[.]195 port 443 - siantdarik[.]lol - HTTPS traffic BACKCONNECT TRAFFIC AND KEYHOLE VNC: - 51.195.169[.]87 port 8080 COBALT STRIKE TRAFFIC: - 23.227.202[.]188 port 80 - clarkitservices[.]com - GET /wp-includes/br.jpg HTTP/1.1 - 23.227.202[.]188 port 80 - clarkitservices[.]com - GET /ms?operation=false HTTP/1.1 - 23.227.202[.]188 port 80 - clarkitservices[.]com - POST /FAQ HTTP/1.1 (application/x-www-form-urlencoded)
Click here to return to the main page.