Heimdal Security Blog

Threat Actors Reinforce Spam Campaigns: New IcedID Banking Trojan Version Discovered

The financial cybercrime world is facing new threats. As hackers become more creative day by day, they are also cunning and determined to become pros. A 2017 IBM-X-Force Research pointed out a fresh new malware entering the cybersecurity domain: the IcedID Banking Trojan. This targeted mobile service and payment card providers, bank web-mails, and e-commerce websites and acted through a modular malicious code. Now, a mid-March Kaspersky report traced two new spam campaigns that promote an enhanced variant of the malware.

What Is an IcedID Banking Trojan and How Does it Work?

IcedID stands for modular banking trojan. Its goal is to deploy several second-stage malware payloads. Among these malware Ryuk ransomware, Qakbot and TrickBot can be found. These types of malware can perform actions like: credential and financial theft, additional modules download and attempts to deploy more payload through users’ networks.

IcedID Banking Trojan and Emotet: Similar in Techniques

Emotet is part of the banking trojans family and represents a kind of malware that would spread through spam e-mails pretending to belong to reliable companies. It made its appearance in 2014 and has 3 ways of attack: phishing links, malevolent scripts, and macro-enabled files.

How is this similar to IceID Banking Trojan? Both are modular malware and they started their spreading as financial data thief malware.

Two Spam Campaigns Ongoing: Face the New Threat

Kaspersky’s researchers traced and discovered 2 new phishing campaigns targeted by the IceID Banking Trojan, upgraded versions of those from 2017.

The first campaign was called by Kaspersky analysts DotDat and it acted as below:

Image Source

The second phishing campaign, by its name Summer.gif, performed the following steps:

Upgrading Raised to Another Level: a New IcedID Downloader in Plain Sight

The main feature that enhanced the IcedID Banking Trojan was the addition of a new Downloader, as explained on ThreatPost. The IcedID is made of 2 parts: the core body and the downloader. They work in synergy, the downloader breaks the ice by obtaining the image, decrypting, and executing. After that, the main body takes over the course of action and maps into the memory, injects the web, downloads and executes payloads and exfiltrates vital data.

The downloader has now an x86-64 version compared to the x86 old one and is better in terms of  C&C addresses, as the old version provided fake C&C addresses that led to a wrong analysis.