CYBERDEFENDERS, — ICEID LAB

CYBERDEFENDERS, — ICEID LAB
This article details a challenge based on the IceID banking Trojan, focusing on skills required for blue team analysts, including network traffic analysis, memory forensics, and reverse engineering. By utilizing tools such as VirusTotal and the MITRE ATT&CK framework, the challenge addresses sophisticated cyber threats and fosters expertise in identifying indicators of compromise. Affected: IceID banking Trojan, Cybersecurity Sector

Keypoints :

  • The challenge is inspired by the IceID banking Trojan targeting blue team analysts.
  • Tools like VirusTotal and MITRE ATT&CK are crucial for analyzing malware and understanding threats.
  • Investigators must identify malicious payloads, domains, and threat actors involved in the IceID sample.
  • 5 distinct domains were identified that the malware contacts for additional payloads.
  • The registrar commonly used by threat actors for hosting malicious content was NameCheap.
  • TA551 (Gold Cabin) is the threat actor associated with IceID malware.
  • The malware uses URLDownloadToFile to fetch additional payloads.
  • The challenge highlights the need for continuous learning in cybersecurity.
  • Acknowledgments to CyberDefenders for the educational challenge.

Full Story: https://medium.com/@AtlasCyberSec/cyberdefenders-iceid-lab-7ea2c40d24d2?source=rss——infosec-5

Views: 12