Google ads lead to fake software pages pushing IcedID (Bokbot)

Two reports show Google Ads leading to fake software pages that push IcedID (Bokbot) via SEO poisoning and multiple redirects, including a fake AnyDesk site that downloads a malicious ZIP. The infection chain delivers an MSI that drops a DLL to install IcedID, followed by Cobalt Strike, Sliver/DonutLoader activity, and various exfiltration and C2 communications. #IcedID #Bokbot #AnyDesk #SEOpoisoning #GoogleAds

Keypoints

  • Criminals use Google ads and SEO poisoning to route searches for legitimate software to fake download pages hosting IcedID (Bokbot).
  • A fake AnyDesk page is reached via a Google Ad Services URL and a malicious traffic distribution system (TDS) domain.
  • The fake AnyDesk page prompts users to download a ZIP archive hosted on Google Firebase Storage containing an MSI installer.
  • Running the MSI drops and runs a DLL to install IcedID on the victim host, with rundll32.exe used to execute the DLL.
  • Post-infection activity includes Cobalt Strike activity (PowerShell-based first instance, additional payloads), Sliver/DonutLoader infrastructure, and VNC backchannel communications.
  • Indicator coverage includes multiple IPs, domains, file hashes, and a ZIP/MSI pair with persistent IcedID artifacts.

MITRE Techniques

  • [T1189] Drive-by Compromise – Attacker delivers malware through fake software sites accessed via search ads and redirects. Quote: ‘SEO poisoning… This is an effective way for criminals to distribute their malware.’
  • [T1204.002] User Execution: Malicious File – User double-clicks an MSI that drops and runs a DLL to install IcedID. Quote: ‘Double-clicking the .msi file on a vulnerable Windows host caused it to drop and run a DLL to install IcedID on the victim’s system.’
  • [T1059.001] PowerShell – PowerShell script used for first instance of Cobalt Strike activity. Quote: ‘PowerShell script for first instance of Cobalt Strike activity.’
  • [T1021.005] Remote Services: VNC – Backchannel traffic via VNC for remote control. Quote: ‘IcedID backchannel traffic with VNC.’
  • [T1071.001] Web Protocols – C2 and updates over HTTPS/Web protocols. Quote: ‘HTTPS traffic’ and ‘C2 traffic over HTTPS.’
  • [T1105] Ingress Tool Transfer – Initial payloads downloaded (e.g., h.exe) during second-stage Cobalt Strike activity. Quote: ‘GET /download/h.exe’ and ‘Ingress Tool Transfer’.
  • [T1218] Signed Binary Proxy Execution: Rundll32 – Execution via rundll32.exe to run the dropped DLL. Quote: ‘Run method: rundll32.exe [filename],init’

Indicators of Compromise

  • [IP] 143.198.92.88 – klepdrafooip.com – GET / HTTP/1.1 (traffic generated by the IcedID installer DLL)
  • [IP] 94.140.114.40 – primsenetwolk.com – HTTPS traffic
  • [IP] 94.140.114.40 – onyxinnov.lol – HTTPS traffic
  • [IP] 158.255.211.126 – trashast.wiki – HTTPS traffic
  • [IP] 51.195.169.87 – port 8080 – VNC backchannel
  • [IP] 176.105.202.212 – GET /adcs4 (First Cobalt Strike activity)
  • [IP] 172.67.130.194 – kingoflake.com – HTTPS traffic
  • [IP] 199.127.62.132 – GET /download/h.exe (Second Cobalt Strike activity)
  • [IP] 108.177.235.187 – bukifide.com – HTTPS traffic
  • [IP] 190.61.121.35 – static/ZillaSlab-Bold.subset…woff – GET/traffic
  • [Domain] klepdrafooip.com – gzip binary delivery site
  • [Domain] primsenetwolk.com, onyxinnov.lol, trashast.wiki, kingoflake.com, bukifide.com – domains involved in C2/delivery chains
  • [URL] https://firebasestorage.googleapis.com/v0/b/our-audio-370812.appspot.com/o/wnitFn4RCG%2FSetup_Win_14-12-2022_18-36-29.zip?alt=media&token=3ef517f1-eb72-46bc-ac4b-3fb41f92d373 – ZIP payload delivery
  • [File hash] 19265aac471f7d72fcddb133e652e04c03a547727b6f98a80760dcbf43f95627 – Setup_Win_14-12-2022_18-36-29.zip
  • [File hash] 63a7d98369925d6e98994cdb5937bd896506665be9f80dc55de7eb6df00f7607 – Setup_Win_14-12-2022_18-36-29.msi
  • [File hash] 7e5da5fcda0da494da85cdc76384b3b08f135f09f20e582e049486e8ae2f168e – IcedID dropped DLL
  • [File hash] 53639070024366d23c3de5ba1d074cbd1d8b9e78d46f75c32ef02fc20c279fc3 – IcedID loader/license.dat artifact
  • [File hash] 205fbc52fafd456388d3ef80ff00498c90295791a91811725fea94052dc4fe7a – IcedID persistent data
  • [File hash] bfa3eb36beeaa65334abe81cdd870e66b37da3e478d1615697160244fd087b48 – Donut/Sliver loader artifact
  • [File hash] 7486c3585d6aa7c2febd8b4f049a86c72772fda6bd1dc9756e2fb8c5da67bafa – Sliver/DonutLoader payload

Read more: https://isc.sans.edu/diary/Google+ads+lead+to+fake+software+pages+pushing+IcedID+Bokbot/29344/