Check the status of CVEs. Learn More.
Keeping your systems up 100% of the time requires live patching. Our solutions will align strongly with your risk, compliance, and operational uptime requirements.
TuxCare is trusted by the most innovative companies across the globe.
Learn about TuxCare's modern approach to reducing cybersecurity risk with Blogs, White Papers, and more.
Continually increasing Cybersecurity, stability, and availability of Linux servers and open source software since 2009.
TuxCare provides live security patching for numerous industries. Learn how TuxCare is minimizing risk for companies around the world.
Follow Us on Social
IceXLoader, an updated version of a malware loader, is suspected of infecting thousands of personal and enterprise Windows machines around the world.
IceXLoader is a commercially available malware that costs $118 for a lifetime license in underground forums. It is mainly used to download and run additional malware on compromised computers. The malware strain was written in Nim, a relatively new programming language.
It was distributed via e-mails containing ZIP files that install the malware on the infected computer. Infected people downloaded a ZIP file that contained an executable.exe that automatically downloads an image that allows infection with ICeXLoader.
The extractor creates a new hidden folder (.tmp) under “C \Users\\AppData\Local\Temp” and drops the next-stage executable, ‘STOREM~2.exe.’
The infected system is then restarted, and a new registry key is added to delete the temp folder when the computer reboots, depending on the extract settings chosen by the operator.
The dropped executable is a downloader that retrieves a PNG file from a hardcoded URL and converts it into the IceXLoader payload, an obfuscated DLL file.
To avoid sandboxes, the dropper checks to make sure it is not running in an emulator and waits 35 seconds before executing the malware loader.
Finally, IceXLoader is injected into the STOREM2.exe process via process hollowing.
In addition, the malware generates a .bat file that disables Windows Defender in real time and adds exclusions to avoid detection.
The commands include the ability to restart, uninstall, and halt the malware loader’s execution. However, its primary function is to download and execute next-stage malware on disk or memory.
It is important that organizations remian careful of IceXLoader and take security measures to safeguard their organizations from being compromised. One of the several steps to take include keeping their systems up to date.
The sources for this piece include an article in BleepingComputer.
TALK TO A CYBERSECURITY EXPERT
Stay updated with the latest news and announcements from TuxCare.com
ESET researchers discovered an ongoing campaign by the Bahamut APT...
A memory leak bug on Local Security Authority Subsystem Service...
After discovering malicious behaviors in 1,652 of 250,000 unverified Linux...
Despite fixes released by the chipmaker, a set of five...
The APT group DefrayX has launched a new version of...
DuckDuckGo, a privacy-focused search engine, has added an App Tracking...