2016-08-22 - EITEST RIG EK FROM 178.32.173[.]180 SENDS GOOTKIT

NOTICE:

ASSOCIATED FILES:

  • 2016-08-18-EITest-Rig-EK-sends-Gootkit.pcap   (344,119 bytes)
  • 2016-08-22-EITest-Rig-EK-flash-exploit-after-best-remit.com.swf   (45,962 bytes)
  • 2016-08-22-EITest-Rig-EK-landing-page-after-best-remit.com.txt   (5,077 bytes)
  • 2016-08-22-EITest-Rig-EK-payload-Gootkit-after-best-remit.com.exe   (105,472 bytes)
  • 2016-08-22-EITest-flash-redirect-from-hybypi.xyz.swf   (5,294 bytes)
  • 2016-08-22-page-from-best-remit.com-with-injected-EITest-script.txt   (72,187 bytes)
  • vrtchpva.dll   (97,792 bytes)

 

BACKGROUND ON THE EITEST CAMPAIGN:

 


Shown above:  Flowchart for this infection traffic.

 

TRAFFIC


Shown above:  Injected script in page from the compromised website.

 


Shown above:  Traffic from the pcap filtered in Wireshark.

 


Shown above:  Post-infection SSL traffic over port 80 using a "MyCompany Ltd" certificate.

 

ASSOCIATED DOMAINS:

 

FILE HASHES

FLASH FILES:

PAYLOAD:

DROPPED DLL FILE:

 

IMAGES


Shown above:  Dropped DLL malware stays persistent through a scheduled task.

 

FINAL NOTES

Once again, here are the associated files:

NOTICE:

Click here to return to the main page.