2013-08-05 - STYX EXPLOIT KIT FROM 185.13.32[.]40 - HOSTAVANQUEST[.]BIZ

NOTICE:

ASSOCIATED FILES:

 

NOTES:

In checking around for infected websites, I found an information on a website having an iframe that led to an exploit kit on www.coopcento[.]it as of 25 July 2013.  By the time I checked it out on 30 July 2013, the website was off-line being fixed.  Fortunately, Google cache still had the original index page, so I could replicate the infection chain of events.

 

CHAIN OF INFECTION

After the initial infection, we saw callback traffic to yearssuperb[.]biz that included more HTTP GET requests for additional malware.  We also saw callback traffic to 123.108.108[.]42 ( no domain name ) and eliteamend[.]biz

THE INITIAL INFECTION TRAFFIC

I set up a bare-metal instal of Windows 7 SP1 with IE 8 and Java Runtime Environment 6 update 25.  Monitoring this setup was an installation of Security Onion.  When I visited www.coopcento[.]it on the vulnerable host, the following events triggered in Sguil:

Step 1 - Compromised web site - www.coopcento[.]it at 81.88.48[.]113.  I had to get this from the Google cache, because the website was being repaired.

Note the iframe embedded after the closing HTML tag of the index page for the website.

Step 2 - The domain with javascript to redirect to the malware delivery domain

Step 3 - HTTP GET requests to hostavanquest[.]biz to setup the Java exploit and malware delivery

This returns a "302 Found" response that goes to the next HTTP GET request
This is a fake Yahoo page that has an iframe for the next HTTP GET reqeust
The HTML returned for this request has an applet that states the Java exploit ( archive="CboBJ.jar" ) and the path for the malicious binary.

Step 4 - HTTP GET request to hostavanquest[.]biz for the Java exploit

Step 5 - HTTP GET request to hostavanquest[.]biz using Java as a User-Agent to deliver the malicious binary

This malware shows 26 out of 46 in Virus Total:

https://www.virustotal.com/gui/file/97f91e6b68453b6306ee44bea51599a0113bf7e3dbfbc9d5f4024eb9ebda2085/

Microsoft calls it TrojanDownloader:Win32/Dofoil.R and describes this malware as "a trojan that silently downloads and installs other programs without consent."

https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=TrojanDownloader:Win32/Dofoil.R#tab=2

TRAFFIC AFTER THE INITIAL INFECTION

For a quick overview of the traffic after the initial infection, show the explort list for HTTP objects.  Use the File menu to export HTTP objects:

Using Wireshark's HTTP object list, you can see another suspicious domain in callback traffic, and files named soft4.exe, soft3.exe, and soft9.exe.  Callback traffic after the initial infection consisted of:

Here's a quick check of the malware sent over as soft4.exe, soft3.exe, and soft9.exe:

soft4.exe - 29 of 46 in Virus Total

https://www.virustotal.com/gui/file/809cfc5886806460a65acf74e8611daa26cc71a231d12e05ef5c13377d474947/
Microsoft calls it Rogue:Win32/Winwebsec and describes it as fake antivirus program that claims to scan for malware and displays fake warnings of malicious programs and viruses.
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Rogue%3AWin32%2FWinwebsec#tab=2

soft3.exe - 26 of 45 in Virus Total

https://www.virustotal.com/gui/file/d771a7644d2fe47518649885bfa27e38c70bcc7b066c3fb738e3254c71f6edb5/
Microsoft calls it Trojan:Win32/Sirefef.P which displays ZeroAccess behavior, because it "generates pay-per-click advertising revenue for its controllers."
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Trojan%3AWin32%2FSirefef.P#tab=2

soft9.exe - 21 of 45 in Virus Total

https://www.virustotal.com/gui/file/54e74368fdfdfb8b4fd8d70d1dad1be19b0f50f189793161e90bae83d698c443/
Microsoft calls it PWS:Win32/Fareit.gen!C which is a Zbot-style trojan "that steals sensitive information from your computer and sends it to a remote attacker."
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=PWS:Win32/Fareit.gen!C#tab=2

 

Finally, in response to an HTTP POST request to yearssuperb[.]biz, we see a file sent back as "71" consisting of 380,420 bytes:

 

Click here to return to the main page.