IcedID virus removal guide
What is IcedID?
IcedID (also known as Bokbot) is high-risk trojan that poses a significant threat to your privacy, and financial and computer safety. It is typically proliferated using another trojan called Emotet, which is often distributed using spam email campaigns. After successful system infiltration, IcedID performs various malicious actions to monitor browsing activity, steal personal information, and manipulate the system.
This trojan firstly entered the scene in September 2017 and, initially, was designed to steal banking credentials. It sets up a local proxy and monitors browsing activity. When users visits a website of a certain bank, IcedID redirects them to a fake website with identical appearance. Unlike other similar trojans, however, IcedID does not simply redirect to an identical website with a different URL, it maintains the connection with the original website to display the original URL and SSL certificate. This often tricks users into believing that they are safe. Thus, they enter login credentials that are immediately saved to a Command & Control (C&C) server. In addition, IcedID controls the entire session and typically uses social engineering techniques to trick users into revealing transaction confirmation (authorization) details. Ultimately cyber criminals gain full access to victims' bank accounts. Therefore, since these criminals aim to generate as much revenue as possible, victims are highly likely to have funds stolen. Over the years, additional IcedID features have been implemented. It continually communicates with the C&C server and waits for commands to execute. This malware is capable of performing various tasks, such as sharing the computer screen, downloading and running apps, writing/reading/deleting registry keys, deleting files, gathering credentials of various email service applications, and executing commands (you can find the list of commands IcedID is capable of executing below). Therefore, IcedID might be used to inject additional viruses into the system. These trojans are often used to proliferate ransomware-type viruses which encrypt data. Furthermore, since IcedID is also capable of deleting files, the presence of this malware may lead to significant data loss. After gaining access to victims' email accounts, cyber criminals can cause privacy issues and steal identities. Regular users who lack knowledge of cyber security are likely to use an identical password for multiple accounts (most have just one email address, which they use when registering on various websites). Therefore, criminals can gain access to a number of personal accounts by using the identical passwords or misusing hijacked email accounts via the "Restore Password" function. Therefore, the presence of IcedID can lead to serious privacy issues, significant financial/data loss, and high-risk computer infections.
|Threat Type||Trojan, Password stealing virus, Banking malware, Spyware|
|Detection Names (Mittie resume.doc - malicious email attachment)||Avast (Other:Malware-gen [Trj]), BitDefender (Trojan.GenericKD.31904759), ESET-NOD32 (VBA/TrojanDownloader.Agent.NPX), Kaspersky (HEUR:Trojan-Downloader.MSOffice.SLoad.gen), Full List (VirusTotal)|
|Symptoms||Trojans are designed to stealthily infiltrate victim's computer and remain silent thus no particular symptoms are clearly visible on an infected machine.|
|Distribution methods||Infected email attachments, malicious online advertisements, social engineering, software cracks, Emotet trojan.|
|Damage||Stolen banking information, passwords, identity theft, victim's computer added to a botnet.|
To eliminate IcedID malware our malware researchers recommend scanning your computer with Spyhunter.
There are dozens of ransomware-type infections similar to IcedID. The list of examples includes (but is not limited to) Beta Bot, Rietspoof, ExileRat, Nymeria, and Qakbot. These infections are developed by different cyber criminals and their behavior might also differ slightly (some gather information, whilst others distribute malware, and so on), however, all are a significant threat to users' finances, computers, and privacy. Therefore, eliminate IcedID and other similar infections immediately.
How did IcedID infiltrate my computer?
As mentioned above, IcedID is mostly distributed using another trojan called Emotet. Criminals distribute Emotet by using spam campaigns (e.g., "O2 Bill Email Virus", "Christmas Greetings Email Virus", "Order Confirmation Email Virus", etc.). They send hundreds of thousands of deceptive email messages that encourage users to open attached files (most of which are Microsoft Office documents). These are usually presented as invoices, bills, etc. Once opened, the attachments inject the Emotet trojan into the system. The IcedID infiltration method contains few steps. Firstly, it injects itself into a legitimate Windows process. One of the analyzed samples injecting itself into "svchost.exe". This malware also checks whether it has enough privileges to perform various actions. If not, it reruns itself to trigger the User Account Control (UAC) prompt and asks the user to grant administrator privileges. Once fully infiltrated, IcedID performs several actions, such as creating a registry entry so that it cam run on each system startup, setting up a local proxy, establishing connection with the C&C server, and gathering system-related data. Ultimately, IcedID ends up waiting for a response from the C&C server for which commands to execute.
How to avoid installation of malware?
To prevent this situation, be very cautious when browsing the internet. Carefully analyze each email attachment received. If you receive an attachment (link/file) that is irrelevant or the sender seems suspicious, do not open anything. Bear in mind that criminals try to abuse users' curiosity by sending various deceptive messages, such as "you have won a lottery", "you have received a package", "money has been transferred to your bank account", and so on. Never fall for these tricks. Criminals often claim to be employees of legitimate companies, banks and governmental agencies to give the impression of legitimacy. Therefore, if you receive an email from a company that you have no business with, delete the email immediately. Having a reputable anti-virus/anti-spyware suite installed and running is also paramount, since these tools can detect and eliminate malware before the system is damaged. The key to computer safety is caution. If you believe that your computer is already infected, we recommend running a scan with Spyhunter for Windows to automatically eliminate infiltrated malware.
List of actions that IcedID can perform once a command from the C&C server is received:
- Delete a registry key
- Delete local file
- Download and execute a file
- Execute an external .DAT module
- Execute local (already installed) application
- Gather credentials stored in the following apps: Windows Mail, RimArts, IncrediMail, Outlook, Windows Live Mail
- Read a registry key
- Return info about the process IceID was injected to
- Return the environmental variables
- Run the network spreading module
- Send back client's logs
- Shutdown the system
- Terminate an external .DAT module
- Update C&C server address
- Update itself
- Update the communication delay time
- Update the external VNC (Virtual Network Computing) module
- Update the list of forged websites
- Update the list of tracked websites
- Upload desktop files
- Write a registry key
Instant automatic removal of IcedID malware:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of IcedID malware. Download it by clicking the button below:
How to remove malware manually?
Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically. To remove this malware we recommend using Spyhunter for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:
If you checked the list of programs running on your computer, for example, using task manager, and identified a program that looks suspicious, you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Extract the downloaded archive and run the Autoruns.exe file.
In the Autoruns application, click "Options" at the top and uncheck the "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.
Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.
You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".
After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.
Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs. These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.
To be sure your computer is free of malware infections, we recommend scanning it with Spyhunter for Windows.