IcedID is a Banking Trojan(used to steal banking details) which has been active since 2017.However, it’s being used these days as a downloader for dropping other malware such as Cobalt Strike, ransomware, stealers etc. Initially, IcedID used to be distributed via phishing emails but recently threat actors have started hosting the stage1 downloader on phishing sites which impersonates legitimate tools websites such as Zoom.

A researcher on Twitter with the handle @crep1x recently posted about the same. We checked the same phishing website and it was still active at the time of writing this blog. 

Figure 1: Phishing site SS

This ignited our interest, so we downloaded the fake setup of Zoom and analysed it and here are our findings

The size of the setup is around 75 mb so that it looks as a legitimate installer to the user. When we opened the setup file in 7-zip we found interesting things inside it.

Figure 2: Inside the Installer

The Installer had

  • A legitimate Zoom installer named 2.msi
  • Supported zip and cab files containing icons,dlls etc., needed for the Zoom app
  • Zoom application executable
  • IcedID dll named 38.dll

When this installer was executed, it first writes the 38.dll inside %temp% folder with the name ikm.aaa and runs its export named init using rundll32.exe which is a common method to run IcedID dll.

Figure 3: Fake setup running IcedID dll using rundll32.exe
Figure 4: Assembly view tu run IcedID dll(38.dll) as ikm.aa

After running the IcedID dll, it sends some information to the server to decide what kind of payload to send for the final infection. Since the C2 was down at the time when we were analysing the file, we were unable to find what the final payload was. As we can see from Figure 5, the IcedID dll is sending a cookie with multiple fields named as 

__gads,_gat,_ga,_u,__io and _gid which contains details such as the milliseconds passed, systeminfo,os version info ,username, computername ,cpu info and adapter info.

Figure 5: IcedID sending request to C2 server

After running the IcedID dll successfully, the setup file then copies 2.msi (the legitimate Zoom setup) as ikm.msi into temp folder and runs it which installs the legitimate Zoom tool inside C:\Program Files (x86)\Zoom.

Figure 6: Writing and running 2.msi as ikm.msi in temp folder
Figure 7: Assembly view to run 2.msi as ikm.msi file 
Figure 8: Zoom installed in C drive

After installation, IcedID keeps running in the background waiting for an appropriate response from the C2 server . As we can see the attackers are improving their ways day by day to trick users into downloading malware onto a users’ device, which is why using a reputed security product like “K7 Total Security” is a must . Our product detects the IcedID dll successfully and also against the latest threats. So users are required to invest in such AV products and keep it updated to stay protected.

IOCs

C2

Ewgahskoot[.]com

Files

HashDetection Name 
3D36E5C4CAA98515B4CBEDE14C253676 Riskware ( 0040eff71 )
C6E5E7F46763A443507178AC95D7921FTrojan-Downloader (00580ce61)

References

https://twitter.com/crep1x/status/1602026802611982337

Like what you're reading? Subscribe to our top stories.

If you want to subscribe to our monthly newsletter, please submit the form below.

    0 replies on “Legitimate Apps a safe haven for IcedID”