Team Cymru tracks infrastructure linked to the IcedID threat, revealing a Chilean IP involved in accessing IcedID BackConnect/C2 activity and related DNS services. The findings show a network of domains, VPN usage, and tools frequently associated with IcedID operations and possible Conti/LockBit activity. #IcedID #BackConnect
Keypoints
- Identification of a Chilean geolocated IP used to access various elements of the IcedID infrastructure.
- The Chilean IP resides in 216.73.159.0/24 and is used to host IcedID Bot C2 infrastructure on separate IPs.
- Threat telemetry shows consistent connections from the Chilean IP to a Netherlands-hosted set used by two IcedID-connected domains.
- Web browsing activity from the Chilean IP indicates interest in DNS-related services and links to Conti/LockBit ransomware ecosystems.
- The Chilean IP is tied to Zappie Host (NZ VPS) with 216.73.159.0/24, geolocated to Chile, regularly hosting IcedID Bot C2 infrastructure.
- There were periodic activity drops around holidays; WireGuard VPN was used through Dec 2022, shifting to OpenVPN in Jan 2023, hinting at a shared infrastructure playbook.
- Evidence of Loader/C2 activity via 168.100.8.93:443 and related domains, with domain names exhibiting typical IcedID nomenclature and potential development/testing use.
MITRE Techniques
- [T1090] Proxy β Use of SOCKS proxy module to reach infrastructure β βthe same remote port, associated with the SOCKS proxy module.β
- [T1133] External Remote Services β VPN-based access to Chilean IP (WireGuard then OpenVPN) β βuse of WireGuard VPN to access the Chilean IP; up to 12 December 2022. When activity returned in January 2023 this changed to OpenVPN.β
- [T1071.004] DNS β Engagement with DNS-related services and domains linked to threat activity β βWith an apparent interest in DNS and visits to services noted for association with Conti and LockBit ransomware.β
- [T1105] Ingress Tool Transfer β IcedID downloads and deploys additional malware such as Cobalt Strike β βdownload and deploy additional malware such as Cobalt Strike.β
- [T1071.001] Web Protocols β Extensive HTTPS/TCP connections to numerous destinations as part of C2 activity β βthe Chilean IP has communicated with dozens of other IP addresses over TCP/443 (HTTPS).β
Indicators of Compromise
- [IP Address] IcedID Bot C2 infrastructure in 216.73.159.0/24 β 216.73.159.132, 216.73.159.134, and 2 more IPs in the block
- [IP Address] Other BackConnect/C2 activity hosts β 5.196.196.252, 168.100.8.93
- [Domain] IcedID-related domains β neonmilkustaers[.]com, svoykbragudern[.]com, and 4 more domains
Read more: https://www.team-cymru.com/post/from-chile-with-malware