IcedID Macro Used To Deliver Nokoyawa Ransomware


  • ransom-4


Unknown threat actors had targeted Italian organizations using a malicious excel document for deploying IcedID and delivered it as part of a email campaign in October 2022.

The IcedID payload was delivered through a malicious document containing VBA macros that linked two images embedded within a document.

After gaining access Threat actors had pivoted within victim system using Cobalt strike and remote desktop protocol (RDP) for deploying Nokoyawa ransomware.

The ransomware was executed after six days from initial infection and utilized windows batch scripts for executing ransomware payload via PsExec and WMI.

After the data is encrypted threat actors utilize their support site for disseminating a decryption key after victims pays $200000 USD in bitcoin.

SkyWatchSM Alert Legend

  • small-bell


  • active-threat0-lt-green

    Active Threat

  • malware-lt-green


  • ransome-lt-green


  • warning-green


  • file-green


Glesec Information Sharing Protocol

GLESEC CYBER SECURITY INCIDENT REPORTS are in compliance with the U.S. Department of Homeland Security (DHS) Traffic-Light Protocol (TLP).

  • TLP-White

    Disclosure is Not Limited.

  • TLP-Green

    Limited Disclosure, Restricted Only to the Community.

  • TLP-Amber

    Limited Disclosure, restricted to the Participant's Organization.

  • TLP-Red

    Not for Disclosure, Restricted/ Classified - Only Shared with US DHS.

Discover Glesec.

Authority. Consistency.

Sign-up today for SkywatchSM Alerts.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.