2016-09-15 - TWO EXAMPLES OF EITEST RIG EK

ASSOCIATED FILES:

  • 2016-09-15-EITest-Rig-EK-first-example.pcap   (460,433 bytes)
  • 2016-09-15-EITest-Rig-EK-second-example.pcap   (4,662,219 bytes)
  • 2016-09-15-EITest-Rig-EK-flash-exploit-first-run.swf   (49,000 bytes)
  • 2016-09-15-EITest-Rig-EK-flash-exploit-second-run.swf   (49,000 bytes)
  • 2016-09-15-EITest-Rig-EK-landing-page-first-run.txt   (3,422 bytes)
  • 2016-09-15-EITest-Rig-EK-landing-page-second-run.txt   (3,421 bytes)
  • 2016-09-15-EITest-Rig-EK-payload-first-run.exe   (61,952 bytes)
  • 2016-09-15-EITest-Rig-EK-payload-second-run.exe   (219,648 bytes)
  • 2016-09-15-EITest-flash-redirect-from-allaboutbelgaum.top.swf   (4,101 bytes)
  • 2016-09-15-EITest-flash-redirect-from-kikuxxx.top.swf   (4,101 bytes)
  • 2016-09-15-additional-malware-dropped-1-of-2-first-run.dll   (179,200 bytes)
  • 2016-09-15-additional-malware-dropped-1-of-2-second-run.dll   (1,313,280 bytes)
  • 2016-09-15-additional-malware-dropped-2-of-2-first-run.dll   (179,200 bytes)
  • 2016-09-15-additional-malware-dropped-2-of-2-second-run.dll   (1,316,864 bytes)
  • 2016-09-15-page-from-hydrogengroup.com-with-injected-EITest-script-first-run.txt   (52,406 bytes)
  • 2016-09-15-page-from-hydrogengroup.com-with-injected-EITest-script-second-run.txt   (51,856 bytes)

 

BACKGROUND ON THE EITEST CAMPAIGN:

 


Shown above:  Flowchart for this infection traffic.

 

TRAFFIC


Shown above:  An example of injected script in a page from the compromised site pointing to an EITest gate.

 


Shown above:  Traffic from the first example filtered in Wireshark.

 


Shown above:  Traffic from the first example filtered in Wireshark.

 

FIRST EXAMPLE:

 

SECOND EXAMPLE:

 

FILE HASHES

FLASH FILES:

PAYLOADS:

ARTIFACTS:

 

IMAGES FROM THE FIRST EXAMPLE


Shown above:  Registry key(s) that made the malware from the first example persistent.

 


Shown above:  Alerts on the first example traffic in Security Onion using Suricata and the ET Pro ruleset.

 


Shown above:  Some alerts on the first example using Snort 2.9.7.3 with the Snort/Talos subscriber set.

 

IMAGES FROM THE SECOND EXAMPLE


Shown above:  Registry key(s) that made the malware from the second example persistent.

 


Shown above:  Alerts on the second example traffic in Security Onion using Suricata and the ET Pro ruleset.

 


Shown above:  Some alerts on the second example using Snort 2.9.7.3 with the Snort/Talos subscriber set.

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.