2016-04-07 - EITEST ANGLER EK FROM 185.117.75.227

PCAP AND MALWARE:

  • 2016-04-07-EITest-Angler-EK-first-run-initial-infection.pcap   (619,724 bytes)
  • 2016-04-07-EITest-Angler-EK-first-run-post-infection-traffic-gootkit.pcap   (5,456,059 bytes)
  • 2016-04-07-EITest-Angler-EK-second-run-with-ursnif-post-infection.pcap   (852,729 bytes)
  • 2016-04-07-EITest-Angler-EK-extracted-DLL-from-silverlight-exploit-krmmL1LNhwx.dll   (209,408 bytes)
  • 2016-04-07-EITest-Angler-EK-first-and-second-runs-silverlight-exploit.xap   (168,662 bytes)
  • 2016-04-07-EITest-Angler-EK-first-run-flash-exploit.swf   (90,318 bytes)
  • 2016-04-07-EITest-Angler-EK-first-run-landing-page.txt   (149,347 bytes)
  • 2016-04-07-EITest-Angler-EK-payload-first-run-gootkit.exe   (148,480 bytes)
  • 2016-04-07-EITest-Angler-EK-payload-second-run-ursnif.exe   (407,552 bytes)
  • 2016-04-07-EITest-Angler-EK-second-run-flash-exploit.swf   (37,193 bytes)
  • 2016-04-07-EITest-Angler-EK-second-run-landing-page.txt   (149,355 bytes)
  • 2016-04-07-EITest-gate-flash-file-from-kllog.tk-first-and-second-runs.swf   (2,305 bytes)
  • 2016-04-07-EITest-script-in-page-from-compromised-site-first-run.txt   (1,094 bytes)
  • 2016-04-07-EITest-script-in-page-from-compromised-site-second-run.txt   (1,068 bytes)

NOTES:

 

ASSOCIATED DOMAINS:

 

IMAGES


Shown above:  Injected EItest script in page from the compromised website.

 


Shown above:  Pcap of the first Angler EK traffic filtered in Wireshark.

 


Shown above:  Had to run the malware in a different host to get post-infection traffic.

 


Shown above:  Saw alerts for Gootkit on the post-infection traffic.

 


Shown above:  Pcap of the second Angler EK traffic filtered in Wireshark.  Post-infection traffic in the same pcap.

 


Shown above:  Saw alerts for an Ursnif variant from the second infection.

 

FINAL NOTES

Once again, here are the associated files:

The ZIP files are password-protected with the standard password.  If you don't know it, email me at admin@malware-traffic-analysis.net and ask.

Click here to return to the main page.