2016-03-23 - TWO EXAMPLES OF ANGLER EK

ASSOCIATED FILES:

 

PCAPS AND MALWARE:

 

ASSOCIATED DOMAINS

FIRST PCAP:

SECOND PCAP:

 

MALWARE AND ARTIFACTS

Contents of today's archive with the malware and artifacts:

 

IMAGES


Shown above:  Pcaps for this blog entry's traffic filtered in Wireshark.

 


Shown above:  Start of pseudo-Darkleech injected script in page from first compromised website.

 


Shown above:  Other injected script in page from first compromised website (did not go to an EK).

 


Shown above:  Injected script in page from second compromised website.

 


Shown above:  Decrypt instructions from today's TeslaCrypt samples.

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.