2013-07-08 - DOTKACHEF EXPLOIT KIT FROM 64.64.17[.]46 - WWW.BRAINSYNC[.]COM

NOTICE:

ASSOCIATED FILES:

 

NOTES:

 

CHAIN OF EVENTS

ASSOCIATED DOMAINS:

 

PRELIMINARY MALWARE ANALYSIS

JAVA EXPLOIT:

SHA256 hash: 4d56a3ac7602f6a0e4f84ed75d2c26afbdaabab1be79e1a617306f60eeebee26
File name:  2013-07-08-DotkaChef-EK-java-exploit.jar
File size:  28.8 KB (29,491 bytes)

 

MALWARE PAYLOAD:

SHA256 hash: d66e45dc52cb2fd6babc1f04d3dd5345d1d6facda6b482f16e16fcaec3523aff
File name:  2013-07-08-DotkaChef-malware-payload.exe
File size:  250.5 KB (256,512 bytes)

 

SNORT EVENTS

Screenshot of Emerging Threats rule hits from Sguil on Security Onion (without ET POLICY or ET INFO events):

 

SCREENSHOTS FROM THE TRAFFIC

Script in first page delivered from the compromised website:

 

Redirect ponting to alnera[.]eu:

 

alnera.eu redirecting to DotkaChef EK landing page:

 

DotkaChef EK landing page with JJEncoded script ( Click here for a write-up from Kahu Security to learn more about JJEncoded script. ):

 

DotkaChef EK delivering the java exploit:

 

DotkaChef EK delivering the malware payload

 

Click here to return to the main page.