Two October 2023 TA571 campaigns delivered a Forked IcedID loader via thread-hijacking emails that downloaded a password-protected ZIP. The operation used 404 TDS redirects and intermediary gates to filter targets and bypass analysis, ultimately loading IcedID onto victimsβ machines. #TA571 #ForkedIcedID #Proofpoint #IcedID
Keypoints
- TA571 conducted two large-scale campaigns in October 2023 (11 and 18) delivering Forked IcedID to thousands of users across industries.
- Emails appeared as replies to existing threads (thread hijacking) and used 404 TDS URLs to serve a password-protected ZIP archive.
- The ZIP included a VBScript file; double-click execution runs an embedded Forked IcedID loader via regsvr32, which then downloads the IcedID bot.
- The Forked variant lacks banking functionality and is used to pivot toward payload delivery, with ransomware delivery as a likely objective.
- TA571 commonly employs 404 TDS across campaigns to route traffic to malware families like AsyncRAT, NetSupport, and DarkGate, aided by gate-based filtering.
- The technique includes intermediary gates to target specific victims and to bypass automated sandboxing or researcher activity.
MITRE Techniques
- [T1566.002] Spearphishing Link β Emails contained 404 TDS URLs linking to the download of a password-protected zip archive. βEmails in the campaigns purported to be replies to existing threads. This is known as thread hijacking.β
- [T1059.005] VBScript β The ZIP file contained a VBS script and a benign text file. The VBS script, if double clicked by the user, ran an embedded IcedID Forked loader with regsvr32. β
- [T1117] Regsvr32 β The loader used regsvr32 to execute the embedded loader. β
- [T1105] Ingress Tool Transfer β The loader in turn downloaded the IcedID bot. β
- [T1497] Virtualization/Sandbox Evasion β Gate-based traffic filtering to bypass automated sandboxing or researcher activity. β
- [T1090] Proxy β 404 TDS acts as traffic distribution to route traffic and filter by IP/geography to determine payload delivery. β
Indicators of Compromise
- [SHA256] context β example1, example2, and other 3 items (payload hashes)
- [File] HLSV1249_5361051.zip β Payload Example
- [File] OFFER[2023.10.11_08-07].vbs β Payload Example
- [File] ReadMe[2023.10.11_08-07].txt β Payload Example
- [File] IcedID Forked Loader 0050-1.dll β Payload Example
- [File] IcedID Useqacaw.dll β Payload Example
- [URL] hxxps://gestionhqse[.]com/qd β 404 TDS Redirected to Gate #1
- [URL] hxxps://gilaniultrasound[.]com/wfhfxtktx β Gate #1 redirected to Gates #2 (which then leads to download of a Zip)
- [Domain] modalefastnow[.]com β IcedID Forked Loader C2
- [Domain] roatancruiseship[.]com β 404 TDS URL Domain
- [Domain] brandworks[.]com[.]au β 404 TDS URL Domain
Read more: https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta571-delivers-icedid-forked-loader