Análisis realizado por Earl James Villaseñor

Ever since Microsoft disabled running macros from Office files downloaded from the internet or email attachments, threat actors have been compelled to find new ways to spread malware. Such as malware, ICEDID and QAKBOT, were both observed being delivered via malicious PDF attachments in spam emails.


ICEDID, also known as Bokbot, is a banking trojan first discovered in 2017 and is known to steal login credentials, victim's personal data, and other information. Similarly, QAKBOT is also a banking trojan known to steal sensitive information from its victims. Both malware strains are also notorious for delivering other malware as an additional payload that often leads to ransomware infections.


These banking trojans are typically distributed through malicious spam emails with an attachment or a malicious link. In the past few weeks, several waves of malspam emails with PDF attachments were seen delivering either ICEDID or QAKBOT. The spam emails leverage a technique called thread hijacking which basically uses stolen email threads from previously infected victims to make their spam emails appear legitimate. However, the spam messages are generic messages that have nothing to do with the email thread.


While the two malware strains use very similar delivery techniques, they nonetheless differ in their infection flow.


ICEDID



The PDF document in the ICEDID (detected as Trojan.PDF.ICEDID.A) spam instructs the user to open a password-protected document. Clicking the PDF usually redirects the user to a Firebase Storage link that will download a ZIP file. Then, the password-protected ZIP files can be opened using the password given in the PDF files. It will contain an executable file (detected as Trojan.Win64.ICEDID.AG) which will install the ICEDID malware in the user's computer system.


QAKBOT




The QAKBOT PDF attachment (detected as Trojan.PDF.QAKBOT.J) also lures the users to download an encrypted attachment. The PDF contains links which usually lead to compromised websites that threat actors use to host the malware. It will also download a password-protected zip file that contains a malicious WSF script that will download QAKBOT DLLs to infect the victim's computer.


These spam emails are already blocked by Trend Micro Email Security Solutions. However, we still advise users to avoid opening attachments from unsolicited emails.

 Fecha/hora de bloqueo del spam: 19 de abril de 2023 GMT-8
 TMASE
  • Motor TMASE: 9.0
  • Patrón TMASE: 2.7576.000