2016-01-27 - ANGLER EK FROM 185.49.68[.]132 SENDS CRYPTOWALL RANSOMWARE

NOTICE:

ASSOCIATED FILES:

 

CHAIN OF EVENTS


Shown above:  A pcap of the traffic filtered in Wireshark showing the HTTP requests.

 


Shown above:  Injected script in a page from the compromised website.

 

ASSOCIATED DOMAINS:

 

PRELIMINARY MALWARE ANALYSIS

ANGLER EK FLASH EXPLOIT:

File name:  2016-01-27-Angler-EK-flash-exploit.swf
File size:  132,319 bytes
MD5 hash:  a874b781d3d0af0e5a652822944be983
SHA1 hash:  cec90fac505e780ab0836837e369fb63b53759e2
SHA256 hash:  33bba1b73c606e9d58bd70aa9612d66f106865a5477482b3a86faf60146dee67
Detection ratio:  1 / 53
First submission to VirusTotal:  2016-01-27 01:54:51 UTC

 

EK PAYLOAD (CRYPTOWALL RANSOMWARE):

File name:  2016-01-27-Angler-EK-payload-CryptoWall-ransomware.exe
File size:  418,304 bytes
MD5 hash:  dcce63ae6b7671f00e05a8090acfecb7
SHA1 hash:  102a735b291b53fd5cc0e7789b80eaceff31f194
SHA256 hash:  23e551a94dbf9583b352d5005b654ddf7255064d77bba38dbeb72c015a60ebdb
Detection ratio:  2 / 47
First submission to VirusTotal:  2016-01-27 01:33:02 UTC

 

Click here to return to the main page.