Site icon TheCyberThrone

IceID Malware Malvertised Zoom Installer

Advertisements

Researchers discovered a phishing campaign targeting Zoom users to deliver the IcedID malware.

IcedID is a banking trojan that has capabilities like other financial threats like Gozi, Zeus, and Dridex. The capabilities, include launching man-in-the-browser attacks, and intercepting and stealing financial information from victims.

As per the researchers, threat actors used a phishing website, mimicking the legitimate Zoom website, to deliver the IcedID malware. The landing page on the website contained a download button. Upon clicking on the button, the site delivered a Zoom installer file from the URL: hxxps[:]//explorezoom[.]com/products/app/ZoomInstallerFull[.]exe.

Advertisements

The file was a version of the IcedID malware. Upon executing the ZoomInstallerFull.exe executable, the malware drops the binaries ikm.msi and maker.dll binaries in the %temp% folder. The maker.dll is a malicious library used to perform various malicious activities and load the IcedID malware, while ikm.msi is a legitimate installer of the Zoom application.

Once installed, the IcedID malware attempts to connect the C2. If the malware can successfully connect to the C2 server, it can drop an additional malicious payload in the %programdata% directory.

Here, the threat actor utilized a phishing site in this specific campaign to deliver the IcedID payload. Threat actors are constantly adapting their techniques to evade detection by cybersecurity measures.

This research was documented by researchers from cyble

Researchers’ recommendations

Advertisements

Indicators of Compromise

Exit mobile version