2016-10-03 - PSEUDO-DARKLEECH RIG EK FROM 194.87.145.238 SENDS CERBER RANSOMWARE

ASSOCIATED FILES:

  • 2016-10-03-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware-first-run.pcap   (475,700 bytes)
  • 2016-10-03-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware-second-run.pcap   (488,897 bytes)
  • 2016-10-03-Cerber-Decryptor-bootstrap.min.css   (121,215 bytes)
  • 2016-10-03-Cerber-Decryptor-style.css   (2,807 bytes)
  • 2016-10-03-Cerber-Decryptor.html   (11,966 bytes)
  • 2016-10-03-Cerber-decrypt-instructions-README-first-run.hta   (63,059 bytes)
  • 2016-10-03-Cerber-decrypt-instructions-README-second-run.hta   (63,059 bytes)
  • 2016-10-03-Cerber-decryption-instructions-first-run.bmp   (1,920,054 bytes)
  • 2016-10-03-Cerber-decryption-instructions-second-run.bmp   (1,920,054 bytes)
  • 2016-10-03-page-from-joellipman.com-with-injected-script.txt   (68,286 bytes)
  • 2016-10-03-page-from-whatsongreece.com-with-injected-script.txt   (56,005 bytes)
  • 2016-10-03-pseudoDarkleech-Rig-EK-flash-exploit-both-runs.swf   (25,671 bytes)
  • 2016-10-03-pseudoDarkleech-Rig-EK-landing-page-first-run.txt   (30,056 bytes)
  • 2016-10-03-pseudoDarkleech-Rig-EK-landing-page-second-run.txt   (30,077 bytes)
  • 2016-10-03-pseudoDarkleech-Rig-EK-payload-Cerber-first-run.exe   (290,980 bytes)
  • 2016-10-03-pseudoDarkleech-Rig-EK-payload-Cerber-second-run.exe   (290,980 bytes)

 

BACKGROUND ON THE PSEUDO-DARKLEECH CAMPAIGN:

 


Shown above:  Flowchart for this infection traffic.

 

TRAFFIC


Shown above:  Injected script from the pseudoDarkleech campaign in page from the first compromised site.


Shown above:  Injected script from the pseudoDarkleech campaign in page from the second compromised site.


Shown above:  Traffic from the first pcap filtered in Wireshark.


Shown above:  Traffic from the second pcap filtered in Wireshark.

ASSOCIATED DOMAINS:

DOMAINS FROM THE DECRYPT INSTRUCTIONS:

 

FILE HASHES

FLASH EXPLOIT:

PAYLOADS:

 

IMAGES


Shown above:  Desktop of an infected host after rebooting.

 


Shown above:  Cerber Decryptor (image 1 of 4).

 


Shown above:  Cerber Decryptor (image 2 of 4).

 


Shown above:  Cerber Decryptor (image 3 of 4).

 


Shown above:  Cerber Decryptor (image 4 of 4).

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.