Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
69
Global rank
72 infographic chevron month
Month rank
61 infographic chevron week
Week rank
0
IOCs

IcedID is a banking trojan-type malware which allows attackers to utilize it to steal banking credentials of the victims. IcedID aka BokBot mainly targets businesses and steals payment information, it also acts as a loader and can deliver another viruses or download additional modules.

Trojan
Type
Unknown
Origin
1 September, 2017
First seen
6 October, 2025
Last seen
Also known as
BokBot

How to analyze IcedID with ANY.RUN

Type
Unknown
Origin
1 September, 2017
First seen
6 October, 2025
Last seen

IOCs

IP addresses
64.225.70.62
45.155.250.236
80.78.24.3
168.100.8.93
162.33.177.91
45.61.138.105
116.90.53.23
91.228.10.231
84.32.34.68
213.227.154.24
149.154.152.218
94.140.112.46
137.184.44.69
179.43.155.152
5.255.104.120
103.208.86.124
5.252.177.65
94.140.114.35
91.238.50.112
37.221.115.12
Hashes
bab32f942f49f174fedb3bfbb439bb2ec8abc558d303e7e12b4dd49622813551
06956229eabbb9c29367d8876ddc67a1766e6d05bb0f7ff043f96fac30d793c9
9ab23add898fd65cd6271ec929fecc56a156fbbda475d43741aab7ae60d20fb4
4b40ee78a5f3c649b2e60fe91d1d016dc4e658b7737b17d3a2557996422b73fd
4519186b8fb2eaa847255087b44f918928c20e97c2fbeaeafe70c5ea4678f980
aa8138d2fd97003e534e36c9961e1a105b13ea24ccf7db1059ea4026b28b5247
3a585be7037b0dd24dbc719e8a05d1a1502108bb6e0fea62d6b90980be75a7d9
1e3d10c3c84d7617692174a1f9ae8a658eabb22c7122ef1c8f37f35641ccf7aa
511ed9e6db0655b481ed4ddb71bd24e99e7372e9db19816688871c7c97987539
395615f7064993715dae6e0aba8dc87e307d2bc342b58de53af3881174032ebc
dcc00dd93f924291678fdaa6202df29559d747d46f6679e6fa37bbf98559b705
e70c965ae03c89538c94cc65ada5194c0b129a67e4c5f0eca728965ff4f831ae
3278d5d944d0773e22cda20c978ee86c6185a28f5a93facd0f3732a5ddc755d8
d1866595a7b8c6290174c7c27f414bb8ce44250dbb632bd25554e7f7b46ead8b
43ba07032ca007ed25935ef123c2d408b2f4fd1f0e428b5d03b58b476da336da
009381653fade0d3b94ad0fa0a109c294ac55936a5d1ced44e18fb08188aa7df
753a41ddc820066bea09e4eed3daf18d42710dda0f2f3fc06d3ec494e4056caa
bd67e49c2ca15156c54956655928723063eca5b4d90ae22dd6ce1029ba596b35
8d5d36c8ffb0a9c81b145aa40c1ff3475702fb0b5f9e08e0577bdc405087e635
fb1484a7ccc41e954702a9bb1deb647125403a6096afb767dd8d7fbad9d13703
Domains
filtaferamoza.com
albanallahacrab.club
uragusexgre.club
masskwearing.cyou
padishahmurrka.best
podshinhisif.top
gsterangsic.club
kawnosilicon.top
goodstritvil.top
adobecom.top
graffsteffies.download
spinoschirkovni.top
pilossi.top
theradinfiles.top
petertiohk.com
wv-adobe.top
discordcom.top
orrinnerg.com
gordonfunds.com
perincikies.top
URLs
http://ehonlionetodo.com/
http://restorahlith.com/
http://sajimadurop.com/
http://druidfenixis.com/
http://qsertopinajil.com/
http://ahilacarstrupert.com/
http://gromsdaxert.com/
http://trolspeaksunt.com/
http://anisamnatyrel.com/
http://salimjizita.com/
http://hoftpaeers.com/
http://alconauytor.com/
http://tracksupernova.com/
http://kicknocisd.com/
http://eliskapalu.com/
http://ranmilokd.com/
http://ertimadifa.com/
http://ilekvoyn.com/
http://pilatylu.com/
http://kregxuls.com/
Last Seen at

Recent blog posts

post image
Release Notes: Palo Alto Networks, Microsoft,...
watchers 1399
comments 0
post image
FunkSec’s FunkLocker: How AI Is Powering the...
watchers 3022
comments 0
post image
ANY.RUN & MS Defender: Enrich Alerts Faster,...
watchers 3045
comments 0

What is IcedID?

IcedID is a banking trojan-type malware that allows attackers to utilize it to steal the banking credentials of the victims. IcedID aka BokBot mainly targets businesses and steals payment information, it also acts as a loader and can deliver other viruses or download additional modules.

Researchers identified IcedID for the first time in Autumn 2017 when the first victims suffered from attacks by this malware. Upon further investigation, researchers revealed that IcedID is a modular virus that carries very advanced functions. In addition, it was initially reported that IcedID does not seem to feature any borrowed or stolen code from other trojans which is atypical for more developed malware samples like the one we are dealing with today.

General description of IcedID malware

It is thought that IcedID is being operated by a group of threat actors with connections to Eastern European cyber-bands. In addition, criminals behind IcedID are known to collaborate with creators or distributors of Emotet and TrickBot.

IcedID attacks are targeted mostly at banks in North America and a few select banking organizations in the United Kingdom. This malware targets mostly corporate bank accounts, payment card providers, mobile services providers, payroll, webmail, and e-commerce sites. We were not able to find any information about attacks directed at private users at this point.

However, this very well might change at some point in the future as evidence suggests that the criminals behind IcedID are preparing new and, possibly, bigger campaigns. There have appeared several removal tools, so it's no wonder hackers try to level the game up. As a matter of fact, network propagation functionality was added to this malware, giving it the ability to move across various endpoints.

Speaking of additions, IcedID is being actively maintained and upgraded by its authors despite several removal tools. For example, the second version of the virus significantly reworked the code and made the IcedID modular, giving it the ability to fetch plugins on-demand after the execution of the base file. This made the virus much harder to detect and defend against. While it is generally believed that this virus relies 100% on code created from scratch, some researchers suggest that the malware does, in fact, reuse code from version 2.0 of Pony malware. Apparently, the borrowed function is in charge of stealing data from email accounts although Pony code may have been used for other applications within the virus.

Unfortunately, constant upgrades are most likely one of the leading factors that contributed to the rising popularity of this trojan. This is bad news especially considering that this trojan is already using extremely advanced techniques as complex web injects.

Once the execution process is complete, IcedID creates a local proxy to intercept and control all web traffic of the infected user.

When the malware detects that a victim is navigating to the bank's website, IcedID can redirect the user to a replica of the webpage located on the server that is controlled by the attackers. Threat actors carefully reconstruct the webpage and make the experience as seamless as possible for the victim by maintaining an active connection with the real website all the time. This allows IcedID to use the correct URL in the address bar and even display a legit SSL certificate.

Of course, from this point on every action of the user is being recorded and social engineering is used to retrieve as many credentials and administrative information as possible.

IcedID malware analysis

A video recorded in the ANY.RUN interactive malware hunting service shows the execution process of IcedID. Users can utilize this information to take a deep dive into how this malware functions under the hood.

icedid execution process graph Figure 1: Shows the graph of processes generated by the ANY.RUN malware hunting service.

text report of the IcedID analysis Figure 2: ANY.RUN allows creating customizable text reports that contain detailed and nicely structured information. This function is perfect for making presentations.

IcedID execution process

IcedID authors constantly make changes to the malware, so its execution process can dramatically vary from one version to another.

Our example was distributed in the form of a malicious Microsoft Office document with macro. Maldocs macro dropped an obfuscated command-line file and started its execution. Wscript.exe was started through the command-line execution process to download the payload which was, in turn, executed by cmd.exe. After the payload started its execution, it injected into the svchost.exe process which, then, activated malicious activities such as stealing personal data, establishing a connection with the C2 server, creating scheduled tasks, and more.

Distribution of IcedID malware

IcedID uses a typical delivery method for banking trojans — attackers distribute it in malicious Microsoft Office documents that prompt the users to enable macros and, once it is done, activate the download of the executable to the victim's machine.

The unique aspect of IcedID distribution campaigns lies in the meticulous approach to email crafting that threat actors employ. While most malware types that use email campaigns as the mains distribution channel tend to target the broadest audience they can, IcedID authors choose to work with much narrower focus groups and craft every email with greater detail than the usual standard in the industry.

While any email with a malicious attachment is designed to lower your guard and make you download and open the file, usually attackers pick very general topics with little to no personalization.

IcedID authors use spear-phishing techniques, meaning that they learn details about their victims and use them to increase the effectiveness of their emails. If a latter carrying IcedID is directed at a car dealer from Arizona, it is likely to contain information about a car dealership in Arizona, references to local companies or even colleagues of the victim.

The creation of such targeted campaigns requires hackers to devote time to investigative work in preparation for each bunch of emails, but it is guaranteed to make messages look less like a scam and more like legit business communication.

It should be noted that in some cases IcedID may infect the system in tandem with other malware samples. It can download and can be downloaded by malware such as Emotet or TrickBot trojans.

How to detect IcedID?

This malware creates files that allow analysts to detect it with a high degree of certainty. To detect IcedID, Open the "Files" tab in the lower part of the task's window and take a look at the created files. If you see folders with names such as "lchej" and "ydmfipkzqfsb" within C:\Users\admin\AppData\Local\ directory and files with names "pczapabclgpba", "mtkdonmlmxelaa", "ozwzefgpkzmzba", and "zcnejolyretaa", as shown on the figure below, be sure that it is IcedID in front of you.

how to detect icedid Figure 3: File created by IcedID malware

Summary

IcedID trojan is one of the examples of the new generation of malware. Although it was built from the ground up by its creators, it uses a lot of unique code and has functions not much inferior to those found in the most advanced older viruses such as Trickbot.

However, what makes IcedID potentially even more dangerous is the evolved mentality of its authors, who use spear-phishing to increase the effectiveness of their distribution campaigns.

Before, we could secure ourselves from a lot of threats by removal tools and raising awareness about the dangers of suspicious emails and infected documents. With IcedID we need to rely more on technological lines of defense since some email templates that authors have used and will use again are indistinguishable from real professional communication.

Here, at ANY.RUN it is our job to provide cybersecurity researchers with all the necessary tools to study and neutralize threats like IcedID and we hope that you will find these tools extremely useful in your line of work!

HAVE A LOOK AT

Lumma screenshot
Lumma
lumma
Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.
Read More
Mamba 2FA screenshot
Mamba 2FA
mamba
Mamba 2FA is an advanced phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA) and target Microsoft 365 accounts. It focuses on intercepting authentication flows in real-time and enables threat actors to hijack user sessions and access sensitive systems even when additional security measures are in place.
Read More
Bumblebee Loader screenshot
Bumblebee Loader
bumblebee
Bumblebee is a highly adaptable malware loader, often used by threat actors linked to the Conti and TrickBot cybercrime groups. Since its discovery in 2021, Bumblebee has been leveraged in phishing campaigns and email thread hijacking, primarily to distribute payloads like Cobalt Strike and ransomware. The malware employs obfuscation techniques, such as DLL injection and virtual environment detection, to avoid detection and sandbox analysis. Its command-and-control infrastructure and anti-analysis features allow it to persist on infected devices, where it enables further payload downloads and system compromise.
Read More
Chaos Ransomware screenshot
Chaos ransomware is a malware family known for its destructive capabilities and diverse variants. It first appeared in 2021 as a ransomware builder and later acted as a wiper. Unlike most ransomware strains that encrypt data to extort payment, early Chaos variants permanently corrupted files, while later versions adopted more conventional encryption techniques.
Read More
Cerber screenshot
Cerber
cerber
Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss.
Read More
Wshrat screenshot
Wshrat
wshrat rat trojan
WSHRAT is a Remote Access Trojan — a malware that allows the attackers to take over the infected machines. The RAT has been in circulation since 2013 and it is arguably most notable for the numerous versions released into the wild.
Read More