2014-01-01 - BIZCN GATE ACTOR FIESTA EK USES CVE-2013-2551 EXPLOIT
PCAP AND MALWARE:
- ZIP of the PCAP: 2014-01-01-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-01-01-Fiesta-EK-malware.zip
UPDATE:
- In April 2015, I started calling the actor behind this campaign the "BizCN gate actor" for reasons described here.
- This blog post's title has been updated to reflect the newer info.
NOTES:
Here's some background on this particular infection: In reviewing snort-based events from work, I've seen a few hits on the following rule, and all were caused by domains hosted on 190.123.47.198:
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS DRIVEBY Redirection - Forum Injection"; flow:established,to_server; urilen:27<>33; content:".js?"; http_uri; fast_pattern:only; pcre:"/^\/[a-z]{7,11}\.js\?[a-f0-9]{16}$/U"; classtype:trojan-activity; sid:2017453; rev:3;)
Since early October 2013, I've noted several different domains on 190.123.47.198 that have caused these events. They were all referred from forum pages on various web sites. Here are the domains I've seen and their original referers:
- bestletskomp.com - Original referer domain: www.gminsidenews.com
- eddielikki.com - Original referer domain: www.longrangehunting.com
- fashnsremy.com - Original referer domain: forums.ilounge.com
- fialomamos.com - Original referer domain: www.toyotanation.com
- jamalerys.com - Original referer domain: www.rollitup.org
- katsnewsdog.com - Original referer domain: digital-photography-school.com
- kittysklubs.com - Original referer domain: www.harley-davidsonforums.com
- lokishards.com - Original referer domain: www.stevesnovasite.com
- mamsletterme.com - Original referer domain: www.wranglerforum.com
- marryanshelly.com - Original referer domain: www.gunforums.net
- mylittledayryd.com - Original referer domain: www.xdtalk.com
- newblogsherehally.com - Original referer domain: forum.freeadvice.com
- pictureshete.com - Original referer domain: www.thedieselstop.com
- rubbaskomp.com - Original referer domain: smith-wessonforum.com
- stulisthally.com - Original referer domain: www.digitalradiocentral.com
- syzzimineliks.com - Original referer domain: www.marlinowners.com
- valentinasl.com - Original referer domain: www.ironmagazineforums.com
- valeriesn.com - Original referer domain: www.excelforum.com
So far, the domains appear to be paired together. For example, www.excelforum.com always goes to valeriesn.com and not any of the other domains on 190.123.47.198.
If you're curious to the the latest activity from these domains, search for the IP on urlquery.net
Information on IP Address: 190.123.47.198
IP Location: Panama - Panamaserver.com
ASN: AS52284, Panamaserver.com (registered Oct 13, 2010)
As of 2014-01-01, at least 69 websites use this address. (examples: allincinfoforstyle.com, beautystyleshere.com, bestletskomp.com, and blackskyllshit.com)
This evening, I was testing one of the associated forum pages and saw CVE-2013-2551 used to infect a vulnerable host.
THE FIESTA EXPLOIT KIT AND CVE-2013-2551
The Fiesta EK checks the browser and plugins, determines which exploits apply, and serves all of them. 0x3a shows this in a blog post about the MSIE exploit CVE-2013-2551. Malware Don't Need Coffee has a post about various exploit kits delivering CVE-2013-2551:
- http://blog.0x3a.com/post/62375513265/fiesta-exploit-kit-analysis-serving-msie-exploit
- http://malware.dontneedcoffee.com/2013/11/cve-2013-2551-and-exploit-kits.html
Both blog posts are good sources to learn more about the Fiesta EK. For today's traffic, let's examine the Fiesta EK traffic to my infected host...
SNORT EVENTS
The only notable Sguil event seen on Security Onion for this traffic was the following EmergingThreats signature originally released in April 2013:alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET CURRENT_EVENTS Fiesta - Payload - flashplayer11"; flow:established,to_client; content:"flashplayer11_"; http_header; file_data; content:"MZ"; within:2; classtype:trojan-activity; sid:2016784; rev:2;)
INFECTION CHAIN OF EVENTS
Original referer - the compromised web site:
- 14:49:01 - 192.168.1.106 port 49733 - 173.193.190.151 port 80 - www.wranglerforum.com - GET /f6/new-2015-wrangler-246882.html
- 14:49:03 - 173.193.190.151 port 80 - 192.168.1.106 port 49733 - HTTP/1.1 200 OK (text/html)
The handover domain:
- 14:49:04 - 192.168.1.106 port 49741 - 190.123.47.198 port 80 - mamsletterme.com - GET /utncivl.js?9fe4794595a1ed49
- 14:49:04 - 190.123.47.198 port 80 - 192.168.1.106 port 49741 - HTTP/1.1 200 OK (text/javascript)
The Fiesta EK domain:
- 14:49:05 - 192.168.1.106 port 49751 - 64.202.116.125 port 80 - yeldogsli.in.ua - GET /r1tmip5/?1
- 14:49:05 - 64.202.116.125 port 80 - 192.168.1.106 port 49751 - HTTP/1.1 200 OK (text/html)
- 14:49:07 - yeldogsli.in.ua - GET /r1tmip5/?7effc4cfa637bd925e000a5d520f55500452575d5756535d0257055254525450
- 14:49:07 - HTTP/1.1 200 OK (text/html)
- 14:49:09 - yeldogsli.in.ua - GET /r1tmip5/?2d89b881ce0bfe99571c5d0253030e0701530902565a080a07565b0d555e0f09;1;5
- 14:49:09 - HTTP/1.1 200 OK (application/octet-stream)
- 14:49:09 - yeldogsli.in.ua - GET /r1tmip5/?2d89b881ce0bfe99571c5d0253030e0701530902565a080a07565b0d555e0f09;1;5;1
- 14:49:09 - HTTP/1.1 200 OK (no content returned)
- 14:49:24 - yeldogsli.in.ua - GET /r1tmip5/?6bdf67f1998e81ce551a015d070c50070555555d0255560a0350075201515107;1;2
- 14:49:25 - HTTP/1.1 200 OK (application/octet-stream)
- 14:49:25 - yeldogsli.in.ua - GET /r1tmip5/?6bdf67f1998e81ce551a015d070c50070555555d0255560a0350075201515107;1;2;1
- 14:49:25 - HTTP/1.1 200 OK (no content returned)
TRAFFIC DETAILS
The original referer (compromised web site):
The redirect domain:
First request to the Fiesta exploit domain:
Second request to the Fiesta exploit domain:
First payload request, this one based on the MSIE CVE-2013-2551 exploit:
Second payload request with Java as the user agent. In this one, the payload appears encrypted or obfuscated:
PRELIMINARY MALWARE ANALYSIS
EXE payload delivered by the MSIE CVE-2013-2551 exploit:
https://www.virustotal.com/en/file/398a46ba6ba238bdebb54151f8485c4fa3056e41678f522862da7d196eb5ba97/analysis/1388637839/
File name: 01388609364725.exe File size: 80.1 KB ( 82040 bytes )
MD5 hash: b7a2015904aa7562eb85847132d626da
Detection ratio: 13 / 48
First submitted: 2014-01-02 04:43:59 GMT
Malwr sandbox analysis: https://malwr.com/analysis/NmI4NjNiNmQ0ODk4NDdkOTg2NmE0YzRhYjBlYzJlMTY/
Malware icon and details:
FINAL NOTES
Once again, here are the associated files:
- ZIP of the PCAP: 2014-01-01-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-01-01-Fiesta-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.