Cybereason uncovers how IcedID swings into action under 48 hours

Share post:

Cybereason has demonstrated how the IcedID banking Trojan can be used to exploit an initial infection on a corporate user. It claims that its perpetrators only need a few days to gain access to your entire corporate network and exfiltrate its data.

According to Cybereason, users in this attack campaign receive and open a password-protected archive containing an ISO file. When the user clicks on the ISO file, it creates a virtual disk. If the user navigates to and clicks on the only visible file, a Link File Format file, the LNK file initiates infection by launching a batch file. This executes a Dynamic Link Library file in a temporary directory. The DLL file then retrieves the IcedID payload from a remote server and inserts it into the process.

The malware then employs the genuine net.exe binary from the compromised device to glean data about the domain, workstation, and Domains Admins group members.

Following the initial IcedID infection, an interactive command line (cmd.exe) session is launched, which downloads files onto the compromised device. A Cobalt Strike beacon is used on the infected. 15 minutes after the initial infection, attackers obtain the credentials of a service account via Kerberoasting, a well-known technique based on abusing valid Kerberos tickets. The lateral movement operation begins only 57 minutes after the infection.

The IcedID malware then infiltrates Internet browsers, stealing credentials, session cookies, and saved data. Furthermore, the intruders used the genuine rclone fine syncing tool to encrypt and send a selection of directories to the Mega file sharing service. Around 50 hours after the initial compromise, the data exfiltration begins.

The sources for this piece include an article in TechRepublic.

SUBSCRIBE NOW

Related articles

Exploited ChatGPT Vulnerability Poses Risks to Organizations

A server-side request forgery (SSRF) vulnerability in OpenAI's ChatGPT infrastructure, tracked as CVE-2024-27564, is being actively exploited by...

Free Online File Converters Found Installing Malware: Malwarebytes Sounds the Alarm

Cybersecurity company Malwarebytes is urging internet users to exercise caution when seeking free online file conversion tools, warning...

Researchers Crack Akira Ransomware Using High-End GPUs

The Akira ransomware group emerged in 2023 with a mix of dark humour and ruthless tactics, famously requesting...

DOGE Staffer Sends Unencrypted Personal Data

Court documents reveal that Marko Elez, a staff member of the Department of Government Efficiency (DOGE), breached Treasury...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways