2016-05-18 - PSEUDO-DARKLEECH ANGLER EK FROM 188.138.70.181 SENDS CRYPTXXX

ASSOCIATED FILES:

  • 2016-05-18-pseudo-Darkleech-Angler-EK-sends-CryptXXX.pcap   (1,266,617 bytes)
  • 2016-05-18-CryptXXX-decrypt-instructions.bmp   (3,686,454 bytes)
  • 2016-05-18-CryptXXX-decrypt-instructions.html   (14,190 bytes)
  • 2016-05-18-CryptXXX-decrypt-instructions.txt   (1,755 bytes)
  • 2016-05-18-CryptXXX-ransomware.dll   (303,104 bytes)
  • 2016-05-18-page-from-hooked-on-nails.com-with-injected-pseudo-Darkleech-script.txt   (30,069 bytes)
  • 2016-05-18-pseudo-Darkleech-Angler-EK-flash-exploit.swf   (66,879 bytes)
  • 2016-05-18-pseudo-Darkleech-Angler-EK-landing-page.txt   (171,358 bytes)

 

NOTES:

 


Shown above:  Tweet near the end of April 2016 about today's compromised website.

 


Shown above:  Chain of events for today's infection.

 

TRAFFIC


Shown aboe:  Pcap of the traffic on a normal host filtered in Wireshark.   http.request or (tcp.port eq 443 and tcp.flags eq 0x0002)

 

ASSOCIATED DOMAINS:

 

IMAGES


Shown above:  Start of injected pseudo-Darkleech script from the compromised website.

 


Shown above:  Infected host after rebooting it to get past the lock screen.

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.