2016-10-19 - EITEST RIG EK FROM 185.45.193.52

ASSOCIATED FILES:

  • 2016-10-19-EITest-Rig-EK-first-run.pcap   (509,006 bytes)
  • 2016-10-19-EITest-Rig-EK-second-run.pcap   (2,693,599 bytes)
  • 2016-10-19-EITest-Rig-EK-first-run-follow-up-malware.exe   (200,704 bytes)
  • 2016-10-19-EITest-Rig-EK-flash-exploit-1st-run.swf   (77,137 bytes)
  • 2016-10-19-EITest-Rig-EK-flash-exploit-2nd-run.swf   (77,137 bytes)
  • 2016-10-19-EITest-Rig-EK-landing-page-1st-run.txt   (3,456 bytes)
  • 2016-10-19-EITest-Rig-EK-landing-page-2nd-run.txt   (3,455 bytes)
  • 2016-10-19-EITest-Rig-EK-payload-first-run.exe   (350,720 bytes)
  • 2016-10-19-EITest-Rig-EK-payload-second-run.exe   (202,240 bytes)
  • 2016-10-19-page-with-injected-script-first-run-hiltongardeninnoakville.com.txt   (37,511 bytes)
  • 2016-10-19-page-with-injected-script-second-run-ophthalmic-surgeon.co.za.txt   (57,112 bytes)

 

NOTES:

 

BACKGROUND ON THE EITEST CAMPAIGN:

 


Shown above:  Flowchart for this infection traffic.

 

TRAFFIC


Shown above:  Injected script from the EITest campaign in a page from the first compromised site.


Shown above:  Traffic from the first infection filtered in Wireshark.


Shown above:  Injected script from the EITest campaign in a page from the second compromised site.


Shown above:  Traffic from the second infection filtered in Wireshark.

 

ASSOCIATED DOMAINS:

 

FILE HASHES

FLASH EXPLOITS:

PAYLOADS AND FOLLOW-UP MALWARE:

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.