A recent IcedID malware attack allowed the threat actor to compromise an Active Directory domain in less than 24 hours, according to new reports. The threat actor was able to go from initial access on an end-user system to Domain Admin on a Windows server at an alarming rate.
The attack started out with a phishing email containing a ZIP file with a malicious ISO within. Once the contents of the ISO were executed, the main IcedID payload was launched, which established persistence on the host via a scheduled task and downloaded and executed a Cobalt Strike beacon. From there, lateral movement across the network was performed, executing the same Cobalt Strike beacon on each new system, alongside the Atera agent for redundancy. At one point, the tool Rubeus was downloaded to enable credential theft, which allowed the threat actor to move to a Windows server utilizing Domain Admin privileges. This elevated level of access allowed the threat actors to utilize a DCSync attack, allowing them to retrieve credential hashes for all users in the domain. From here, the threat actors have access to the entire domain, effectively compromising the entire network.
The threat actors were also seen using other legitimate tools, such as netscan.exe to scan for lateral movement targets and the rclone file syncing utility to exfiltrate interesting directories to the MEGA cloud storage platform.