• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Malware • Security  /  IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs
IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs
01 December 2017

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

Written by Bajrang Mane
Bajrang Mane
Malware, Security

IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all Internet traffic through it. Additionally, it can download and execute components required for stealth.

Infection vector

Normally, IcedID spreads through spam email or dropped by other malware families. In our analysis, we found the family to be Emotet. In early 2017, Emotet was widely used to spread other banking Trojans such as Qkabot and Dridex.

IcedID contains a network spreading module which is rarely observed in other banking Trojans. Looking at the API sequence in IcedID, it has adopted similar techniques which were successfully used by malware such as BadRabit, Petya/Not-Petya.

Analysis of sample

On execution, the sample drops a copy of itself on to the folder %LOCAL_APPDATA% with a random name in a randomly named folder. The name of the dropped file and folder is the same and contains 9 characters. The name of the dropped file is generated using a security identifier (SID) of the current user. Below is the code that generates the SID for the current logged on user.

Fig 1. Generating SID
Fig 1. Generating SID

The name of the dropped file with a random name in a randomly named folder.

“%LOCALAPPDATA%\[a-z]{9}\[a-z]{9}.exe”

Example: –

“C:\Documents and Settings\Administrator\Local Settings\Application Data\homatluna\homatluna.exe”

It maintains its persistence by creating a registry entry in “Run”.

“HKCU\Software\Microsoft\Windows\CurrentVersion\Run\homatluna”

Next IcedID writes a RSA crypto-key to the system into the AppData folder. It then writes a certificate file in %TEMP% folder.

Example – “C:\Documents and Settings\Administrator\Local Settings\Temp\0137194B.tmp”

Network activity

It creates two socket connections. One for local proxy and another to serve as a backdoor for CnC communication. In our analysis, the port with the local proxy bind is 49158 and the backdoor is created on port number 49161.

It creates a local proxy. Using certificates of different banks and custom module, it implements its own SSL layer. Using this it performs MITM. IcedID can intercept all traffic and extract user credentials from it.

Once the malware enters the system, it sends the bot ID and basic system information to the CnC server through the POST request as seen in Fig 1 and Fig 2.

Fig 2. Code to get basic system information
Fig 2. Code to get basic system information
Fig 3. Post basic system info
Fig 3. Post basic system info

Following is the decoded post request details to be sent:

K – System Name

B – BOT ID

L – Work Group

M – OS Version

IcedID’s communication with CnC takes place over an encrypted SSL whose certificate is decided by the malware itself from the certificate store. The temp file which is dropped by the malware is used to store the certificate. The below code is used for certificate enumeration.

Fig 4. Code to enumerate certificate
Fig 4. Code to enumerate certificate
Fig 5. Certificate stored in the tmp file
Fig 5. Certificate stored in the tmp file

Spreading in the network

IcedID is different from other banking Trojans because it can spread within the network. It first finds the live system on the local network and copies itself on to the new system.

Fig 6. Connects to other machines
Fig 6. Connects to other machines
Fig 7. Drop a copy on the other system on the network
Fig 7. Drop a copy on the other system on the network

Indicator of compromises

csuwbru[.]net
comeontrk[.]com
medicalciferol[.]com
38921f28bb74fea2cab6e70039ee65f3
d982c6de627441765c89da5cfeb04d6f
82d6e69df2277073d4aaacd6994ee033

Quick Heal successfully detects IcedID as Trojan.IcedID.

The malware’s spreading behavior makes it more aggressive than the previously seen banking Trojans.

Prevention tips

  1. Install an antivirus and keep it updated.
  2. Keep your Operating System and software up-to-date.
  3. Do not click on links or download attachments from unknown, unexpected or unwanted sources.

 

Subject Matter Expert
Piyush Bansal | Ghanshyam More, Quick Heal Security Labs

 Previous PostCybersecurity News Rundown November 2017
Next Post  The Cyber Threat Landscape 2017
Bajrang Mane

About Bajrang Mane

Bajrang Mane is leading the Threat Analysis, Incident response, and Automation teams in Quick Heal Security Labs. Having spent 13 years in the IT security industry,...

Articles by Bajrang Mane »

Related Posts

  • SnakeKeylogger: A Multistage Info Stealer Malware Campaign

    March 25, 2025
  • SVC New Stealer on the Horizon

    March 21, 2025
  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies