2022-10-06 (THURSDAY) - HTML SMUGGLING --> ICEDID (BOKBOT) --> COBALT STRIKE

NOTES:

 

ASSOCIATED FILES:

 

IMAGES


Shown above:  Traffic from the infection filtered in Wireshark.

 

2022-10-06 (THURSDAY) - ICEDID (BOKBOT) WITH COBALT STRIKE

INFECTION CHAIN:

- email --> HTML file --> password-protected zip --> ISO --> Windows shortcut runs installer DLL --> IcedID C2 --> Cobalt Strike

NOTES:

- Same type of HTML smuggling reported on 2022-10-04 (https://twitter.com/Unit42_Intel/status/1577773890012594177)

- Unlike that previous infection, today contained no traffic over TCP port 8080 (see above reference).

HTML ATTACHMENT, PASSWORD-PROTECTED ZIP ARCHIVE, AND EXTRACTED ISO IMAGE:

- SHA256 hash: 6568d1938debb7b49ce8278358b86a1b47c238da690feb058496f187fe6c8bd0
- File size: 1,743,877 bytes
- File name: [redacted]-file-10.06.2022.html
- File description: HTML file seen as Email attachment 
- Sample: https://bazaar.abuse.ch/sample/6568d1938debb7b49ce8278358b86a1b47c238da690feb058496f187fe6c8bd0/
- Note: Thanks to @k3dg3 for making this publicly avaiable!

- SHA256 hash: 240c9be328a474eafe94889428949dae6c2f5ca068c33fb6ed63ebde144f7574
- File size: 1,222,677 bytes
- File name: d755ab64-50f8-4faa-bd40-559682f92698.zip
- File description: password-protected zip archive presented by the above HTML file
- Password: yBGpjJ5W

- SHA256 hash: b22dd6ed2c9dc341d8133f9ca28d9d8c4b7682b9a3d3963385f70a230e425de4
- File size: 2,052,096 bytes
- File name: file-3b2d0fe4-496b-40dd-a420-ac2202ed92fc.iso
- File description: ISO image extracted from the above zip archive

CONTENTS OF ISO IMAGE:

- SHA256 hash: d639d883cc0aebc48f5f5427a90fec25d61d6071603f6ee25efe6354ba495ff2
- File size: 2,002 bytes
- File name: file-3b2d0fe4-496b-40dd-a420-ac2202ed92fc.lnk
- File description: Windows shortcut used to run IcedID installer DLL

- SHA256 hash: e493a191a3cf0f90a85b02e46f8cb325828bbd570f5e7359e3542bbd93a91918
- File size: 695,808 bytes
- File name: 0d027b85-d430-4c43-82b9-631ba9008fa9.U1o
- File description: IcedID installer DLL (64-bit)
- Run method: rundll32.exe [filename],#1

- SHA256 hash: 573a25373c30ac1101ac4e6688a764be96b9ceb64b1a1d76016f67980005901b
- File size: 982,831 bytes
- File name: 76571cfa-1f0b-468e-80e6-bf023b27189d.png
- File description: Decoy image shown when running the above Windows shortcut, not inherently malicious

FILES FOR ICEDID SEEN DURING THE INFECTION:

- SHA256 hash: d6b53df3dc6a4b4729733e1ca9524ad3e47222c7a41fb55bf49ae8fbc2206de1
- File size: 1,050,683 bytes
- File description: gzip binary from didociskal.com used to create license.dat and persistent IcedID DLL

- SHA256 hash: 8bae218c7d1759c65c92a5a06d23749734ae67be12707a5dad8cb4f23e35e635
- File size: 686,592 bytes
- File location: C:\Users\[username]\AppData\Local\Temp\step_64.dat
- File description: 64-bit DLL for IcedID created by the initial IcedID installer DLL 

- SHA256 hash: 55be890947d021fcc8c29af3c7aaf70d8132f222e944719c43a6e819e84a8f8b
- File size: 363,338 bytes
- File location: C:\Users\[username]\AppData\Roaming\LemonBullet\license.dat
- File description: data binary used to run persistent IcedID DLL
- Note: First submitted to VirusTotal on 2022-09-23

- SHA256 hash: ceb6a9a00bf123250c0393e67a6f75e93f2c2ef1b39e4978a95c59f0916bb804
- File size: 686,592 bytes
- File location: C:\Users\[username]\AppData\Roaming\{3804B787-D8DB-D07A-4865-17ED5EDE20A8}\uhbuoxmp1.dll
- File description: 64-bit DLL for IcedID persistent on the infected host 
- Run method: rundll32.exe [filename],#1 --zoow="[path to license.dat]"

COBALT STRIKE STAGER

- SHA256 hash: ebece5533902a021c27c67a3342e551499dae65b033410d468e9f3a1145f4c57
- File size: 1,243,648 bytes
- File location: hxxp://199.127.60.47/download/4.dll
- File location: C:\Users\[username]\AppData\Local\Temp\Gukaoy2.dll
- File description: 64-bit DLL stager for Cobalt Strike 
- Run method: regsvr32.exe /s [filename]

TRAFFIC FROM THE INFECTION:

INSTALLER RETRIEVES GZIP BINARY:

- 157.230.39.194 port 80 - didociskal.com - GET /

ICEDID C2 TRAFFIC:

- 5.2.77.232 port 443 - dietappli.shop - HTTPS traffic

TRAFFIC TO RETRIEVE COBALT STRIKE STAGER DLL:

- 199.127.60.47 port 80 - 199.127.60.47 - GET /download/4.dll

COBALT STRIKE C2 TRAFFIC:

- 64.44.101.15 port 443 - yebicidake.com - HTTPS traffic
- Note: within the TLSv1.2 tunnel using 64.44.101.15, the initial URL for Cobalt Strike was 
  hxxps://google.co.uk/image-directory/panel.gif

 

Click here to return to the main page.