2016-01-17 - ANGLER EK FROM 31.148.99[.]125 SENDS CRYPTOWALL RANSOMWARE

NOTICE:

ASSOCIATED FILES:

 


Shown above:  Windows desktop after this CryptoWall ransomware infection.

 

CHAIN OF EVENTS

ASSOCIATED DOMAINS:

ADDITIONAL CRYPTOWALL RANSOMWARE DOMAINS FROM MALWR ANALYSIS:

DOMAINS FROM THIS CRYPTOWALL RANSOMWARE SAMPLE'S DECRYPT INSTRUCTIONS:

 

COMPROMISED WEBSITE:


Shown above:  Injected script in page from compromised website.

 

 

ANGLER EK TRAFFIC:

 

POST-INFECTION TRAFFIC:

 

ALERTS

Signature hits from the Emerging Threats and ETPRO rulesets using Sguil on Security Onion (without ET POLICY or ET INFO events):

 

Significant signature hits from the Talos (Sourcefire VRT) ruleset using Snort 2.9.8.0 on Debian 7:

 

PRELIMINARY MALWARE ANALYSIS

FLASH EXPLOIT:

File name:  2016-01-17-Angler-EK-flash-exploit.swf
File size:  130,068 bytes
MD5 hash:  946d794afc8cb0e8d597180bcf3ae720
SHA1 hash:  2cf84c3ddd400d4acb54214269addb0c8ac58b2c
SHA256 hash:  35a24b00f94125a25279791159059a9bc768e9b4bdea8b71960f82dc117e4aea
Detection ratio:  2 / 54
First submission to VirusTotal:  2016-01-18 16:23:19 UTC

 

MALWARE PAYLOAD:

File name:  2016-01-17-Angler-EK-payload-CryptoWall-ransomware.exe
File size:  471,552 bytes
MD5 hash:  58006b9382d532f82535454e78c8ad7c
SHA1 hash:  c399026473b23a211208a13224029f710458255e
SHA256 hash:  99990573b7c92062663438575d431c5823252a1c523ba9977c2a236ad2484a1e
Detection ratio:  10 / 53
First submission to VirusTotal:  2016-01-18 03:19:24 UTC

 

Click here to return to the main page.