Threat Actor Characterization
IcedID
ID: b49db66ae902d18c7180ab952942e74c52874| BokBot | Forked IcedID | Ic********* | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
IcedID (BokBot) is a modular banking malware first observed around 2017 that evolved into a loader/backdoor used by criminal access-broker ecosystems. Initially focused on webinject-based credential theft, it now commonly arrives via phishing attachments (Office, ISO/LNK, OneNote + HTA/CMD) and establishes persistence to download additional modules and hand off access to ransomware operators. It supports browser session hijacking, discovery, process injection, and encrypted C2 over HTTPS. Ref: https://attack.mitre.org/software/S0483/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1204.002 | Malicious File | TA0002 |
|
| T1218.011 | Rundll32 | TA0005 |
|
| T1218.007 | Msiexec | TA0005 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1573.002 | Asymmetric Cryptography | TA0011 |
|
| T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | TA0010 |
|
| T1185 | Browser Session Hijacking | TA0009 |
|
| T1027.002 | Software Packing | TA0005 |
|
| T1027.003 | Steganography | TA0005 |
|
| T1027.009 | Embedded Payloads | TA0005 |
|
| T1027.013 | Encrypted/Encoded File | TA0005 |
|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 |
|
| T1053.005 | Scheduled Task | TA0002 TA0003 TA0004 |
|
| T1055.004 | Asynchronous Procedure Call | TA0004 TA0005 |
|
| T1055.012 | Process Hollowing | TA0004 TA0005 |
|
| T1087.002 | Domain Account | TA0007 |
|
| T1069 | Permission Groups Discovery | TA0007 |
|
| T1482 | Domain Trust Discovery | TA0007 |
|
| T1082 | System Information Discovery | TA0007 |
|
| T1016 | System Network Configuration Discovery | TA0007 |
|
| T1614.001 | System Language Discovery | TA0007 |
|
| T1135 | Network Share Discovery | TA0007 |
|
| T1518.001 | Security Software Discovery | TA0007 |
|
| T1047 | Windows Management Instrumentation | TA0002 |
|
| T1497 | Virtualization/Sandbox Evasion | TA0005 TA0007 |
|
1. What is IcedID and why you should care
IcedID is a loader operated by a financially motivated crime group (LUNAR SPIDER) and used by initial access brokers (IABs).
IOC Appendix (TLP:WHITE) — IcedID / BokBot
This appendix provides a structured overview of Indicators of Compromise (IOCs) associated with IcedID/BokBot, with a limited set of representative samples and pointers to live feeds rather than a static full corpus.