2014-02-26 - ANGLER EK DELIVERS GRAFTOR/ZBOT VARIANT

NOTICE:

ASSOCIATED FILES:

NOTES:

This is a good summary of Angler EK using a Silverlight exploit as early as Nov 2013:

 

CHAIN OF EVENTS

ASSOCIATED DOMAINS

INFECTION CHAIN OF EVENTS

POST-INFECTION CALLBACK TRAFFIC

 

PRELIMINARY MALWARE ANALYSIS

SILVERLIGHT EXPLOIT

File name:  2014-02-26-Angler-EK-silverlight-exploit.xap
File size:  54,292 bytes
MD5 hash:  54437862cb93c253e97f7b653917384e
Detection ratio:  0 / 50
First submission:  2014-02-25 01:01:06 UTC
VirusTotal link: https://www.virustotal.com/en/file/9cd9503a50bc010aa247e2e6409e413d90a9a50fdd6ecd1f795f15e5b5951cce/analysis/

 

MALWARE PAYLOAD

File name:  fegyko.exe
File size:  338,944 bytes
MD5 hash:  0e1baf2546a3cd0544e333715d95ab3d
Detection ratio:  14 / 50
First submission:  2014-02-26 03:50:33 UTC
VirusTotal link: https://www.virustotal.com/en/file/72fc35a8f1b3f5a279e5d2843da304bd670f2885adbac5444110a935c01b62e6/analysis/


This is the malware payload after it copied itself to a folder
named Xeoram in the AppData\Roaming\ directory.

 

ALERTS

ALERTS FOR THE ANGLER EK TRAFFIC (FROM SECURITY ONION)

 

HIGHLIGHTS FROM THE TRAFFIC

The infected web page - kaplanbenefits[.]com/balanced/index.html

 

Successful redirect - www.deacomunicazione[.]it/distincter/retorted.js

 

Angler EK delivers Silverlight exploit - northerningredients[.]com/cv54YKgz9At-cCTNZ0EYXC_pZdLDophzYvfVm5rJrBjd-0Tt

 

Angler EK delivers EXE payload, XOR-ed the the ASCII string: adb234nh
    northerningredients[.]com/KAJtQvM2lHDmWTYj3eVuD6tbMy08Tz9aCh5NOndiktjP6vj6

 

Angler EK delivers the same EXE payload again, XOR-ed the the ASCII string: aldonjfg
    northerningredients[.]com/EC6L7mwntxp1t-NHd_173-LrahqYJFGXAwhWObRWb_PyUAFe

 

Click here to return to the main page.