2015-04-09 - NUCLEAR EK SENDS TROLDESH RANSOMWARE

NOTICE:

ASSOCIATED FILES:

 

NOTES:

 


Shown above: One of the text files with instructions to decrypt your files.

 


Shown above: The desktop background image telling you to look at the README.txt files.

 

CHAIN OF EVENTS

NUCLEAR EK FROM 108.61.188[.]200 PORT 80:

 

POST-INFECTION TRAFFIC:

 

ALERTS

Signature hits from the Emerging Threats and ETPRO rulesets using Sguil on Security Onion (without ET POLICY, ET INFO, or ET TOR events):

Significant signature hits from the Talos (Sourcefire VRT) ruleset using Snort 2.9.7.2 on Debian 7:

 

PRELIMINARY MALWARE ANALYSIS

FLASH EXPLOIT:

File name:  2015-04-09-Nuclear-EK-Flash-exploit.swf
File size:  15,463 bytes
MD5 hash:  aac06dd10cfe2f04867e674cf8485686
Detection ratio:  0 / 57
First submission to VirusTotal:  2015-04-09 19:29:26 UTC

 

MALWARE PAYLOAD (TROLDESH RANSOMWARE):

File name:  2015-04-09-Nuclear-EK-malware-payload-Troldesh-ransomware.exe
File size:  929,792 bytes
MD5 hash:  5a4834df63b62f4ca8de004fbbd23ae6
Detection ratio:  8 / 57
First submission to VirusTotal:  2015-04-09 19:29:39 UTC

 

SCREENSHOTS FROM THE TRAFFIC

HTTP requests and TLS traffic noted in Wireshark:

 

Nuclear EK landing page:

 

Nuclear EK sending a Flash exploit:

 

Nuclear EK sending an obfuscated malware payload:

 

Post-infection traffic that generated the ETPRO TROJAN alert for Win32/Troldesh.A Ransomware External IP Check:

 

Click here to return to the main page.