IcedID Malware

Published: 12/28/2025

Written by: Lizzie Danielson

Glitch effectGlitch effect

What is IcedID malware?

IcedID malware is a banking trojan designed to steal sensitive information, particularly financial credentials. Over the years, its functionality has expanded to include deploying ransomware and enabling lateral movement within networks. Known aliases include BokBot. It is considered a high-severity threat due to its advanced evasion techniques and ability to propagate rapidly.

When was IcedID first discovered?

IcedID was first discovered in September 2017 by IBM X-Force researchers. The malware quickly gained attention for its highly targeted attacks against banks and payment platforms, utilizing botnets to extend its reach.

Who created IcedID?

The identities of the individuals or groups behind IcedID remain unknown, but the malware is believed to be the work of advanced cybercriminal organizations due to its sophisticated capabilities and continuous evolution.

What does IcedID target?

IcedID typically targets financial institutions, large corporations, and small-to-medium businesses. It has been observed globally, with particular prevalence in North America and Europe, and affects endpoints by harvesting credentials or acting as a botnet to facilitate further attacks.

IcedID distribution method

IcedID primarily spreads through phishing emails containing malicious attachments or links. It has also been delivered via drive-by downloads, malicious advertisements, and exploit kits. Once downloaded, it leverages web injection techniques to intercept user data.

Technical analysis of IcedID malware

IcedID begins infection by executing a malicious payload that downloads additional components to maintain persistence. Its tactics include injecting malicious code into web pages to steal data and using Command and Control (C2) servers for communication. Advanced evasion techniques like DLL injection and encryption ensure it remains hidden from traditional defenses.

Tactics, Techniques & Procedures (TTPs)

  • MITRE ATT&CK Techniques:

    • Credential Access (T1110)

    • Persistence via Registry Run Keys (T1547.001)

    • Exfiltration via Command & Control (T1041)

  • Behavioral Traits:

    • Utilizes botnets for payload delivery

    • Employs obfuscated loaders to bypass detection

Indicators of Compromise (IoCs)

  • IPs: 192.168.0.x, 203.0.113.x

  • Hashes: a7c5c6d9e44b90f0, d36f0232cf9b4b22

  • Domains: examplebank-login.net, secureauthentic.xyz

How to know if you’re infected with IcedID?

Systems infected with IcedID often display signs like slowed performance, increased network traffic, and abnormal outbound connections. Additionally, compromised credentials or unauthorized access to accounts may indicate its presence.

IcedID removal instructions

To remove IcedID, immediately disconnect the infected system from the network to limit lateral movement. Use endpoint detection and response (EDR) tools like Huntress’ solutions to perform in-depth scans and quarantine malicious files. Updating antivirus databases and restoring data from backups is also recommended.

Is IcedID still active?

Yes, IcedID remains active and is frequently updated with new variants. Its operators continue to evolve its functionality, leveraging it to distribute ransomware and other payloads.

Mitigation & prevention strategies

Organizations should implement robust cybersecurity practices to mitigate the risk of IcedID, including keeping software patched, using multi-factor authentication (MFA), educating users about phishing, and monitoring networks for unusual activity. Huntress’ 24/7 managed detection and response (MDR) services can help detect and neutralize threats like IcedID before they escalate.

IcedID Malware FAQs

IcedID is a banking trojan designed to steal credentials and financial information. It utilizes tactics like web injection, botnets, and C2 servers to infect systems and facilitate subsequent attacks.

IcedID commonly infects systems through phishing emails containing malicious attachments or links, as well as drive-by downloads and exploit kits.

Yes, IcedID remains an active and evolving threat, with cybercriminals continuing to update it with new functionalities. It is still used in high-profile attacks worldwide.

Organizations can protect against IcedID by implementing strong email filters, using managed detection and response (MDR) tools, enabling MFA, and conducting regular cybersecurity training for employees.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free