2014-02-02 - NEUTRINO EK USES CVE-2013-0074 (SILVERLIGHT EXPLOIT)
ASSOCIATED FILES:
- ZIP of the initial PCAPS: 2014-02-02-Neutrino-EK-traffic-both-pcaps.zip
- ZIP file of the malware: 2014-02-02-Neutrino-EK-malware.zip
- ZIP of PCAP with post-infection traffic: 2014-02-03-malware-callback-from-physical-host.pcap.zip
NOTES:
I found Neutrino EK using a Silveright exploit today. Included are PCAPs for two different infections--one for infection by the Silverlight exploit, and another by the same domain using a Java exploit.
DETAILS
SNORT EVENTS FOR SILVERLIGHT EXPLOIT ON 2014-02-02 (FROM SECURITY ONION)
- 18:28:15 UTC - 192.168.204.161:49510 -> 195.154.14.111:8000 - ET CURRENT_EVENTS Possible Neutrino EK Landing URI Format Nov 1 2013 (2017652)
- 18:28:24 UTC - 195.154.14.111:8000 -> 192.168.204.161:49510 - ET CURRENT_EVENTS Possible Neutrino/Fiesta SilverLight Exploit Jan 13 2014 DLL Naming Convention (2017963)
- 18:28:24 UTC - 195.154.14.111:8000 -> 192.168.204.161:49510 - ET CURRENT_EVENTS Possible Neutrino EK SilverLight Exploit Jan 11 2014 (2017958)
- 18:28:27 UTC - 192.168.204.161:49515 -> 195.154.14.111:8000 - ET CURRENT_EVENTS Possible Neutrino IE/Silverlight Payload Download (2017971)
ASSOCIATED DOMAINS
- 162.144.12.195 - www.bloggingwithdogs.com - Compromised website
- 188.40.79.151 - 38hartrobertsroad.com - Redirect from the compromised website
- 77.55.4.14 - pracowniahistoryczna.pl - Another redirect from the compromised website
- 62.76.177.211 - no domain name - Redirect from 38hartrobertsroad.com
- 92.53.105.34 - no domain name - Redirect from pracowniahistoryczna.pl
- 31.22.4.108 - 30oct2007.com - Final redirect from both redirect chains
- 195.154.14.111 - oojahphi.brittmany.com - Neutrino exploit domain on TCP port 8000
INFECTION CHAIN OF EVENTS FOR SILVERLIGHT EXPLOIT
- 18:28:09 UTC - 162.144.12.195 - www.bloggingwithdogs.com - GET /
- 18:28:10 UTC - 188.40.79.151 - 38hartrobertsroad.com - GET /wp-content/plugins/rotr
- 18:28:11 UTC - 188.40.79.151 - 38hartrobertsroad.com - GET /wp-content/plugins/rotr/
- 18:28:11 UTC - 77.55.4.14 - pracowniahistoryczna.pl - GET /wp-content/themes/zenith/rotr
- 18:28:11 UTC - 77.55.4.14 - pracowniahistoryczna.pl - GET /wp-content/themes/zenith/rotr/
- 18:28:11 UTC - 188.40.79.151 - 38hartrobertsroad.com - HEAD /wp-content/plugins/rotr/load.swf?sid=98590
- 18:28:12 UTC - 188.40.79.151 - 38hartrobertsroad.com - GET /wp-content/plugins/rotr/
- 18:28:12 UTC - 77.55.4.14 - pracowniahistoryczna.pl - GET /wp-content/themes/zenith/rotr/
- 18:28:12 UTC - 188.40.79.151 - 38hartrobertsroad.com - GET /wp-content/plugins/rotr/load.swf?sid=98590
- 18:28:12 UTC - 77.55.4.14 - pracowniahistoryczna.pl- HEAD /wp-content/themes/zenith/rotr/load.swf?sid=58925
- 18:28:12 UTC - 188.40.79.151 - 38hartrobertsroad.com - GET /wp-content/plugins/rotr/load.swf?sid=98590&ref=http://www.bloggingwithdogs.com/
- 18:28:12 UTC - 77.55.4.14 - pracowniahistoryczna.pl - GET /wp-content/themes/zenith/rotr/load.swf?sid=58925
- 18:28:13 UTC - 188.40.79.151 - 38hartrobertsroad.com - HEAD /wp-content/plugins/rotr/load.swf?sid=52489
- 18:28:13 UTC - 77.55.4.14 - pracowniahistoryczna.pl - HEAD /wp-content/themes/zenith/rotr/load.swf?sid=91371
- 18:28:13 UTC - 77.55.4.14 - pracowniahistoryczna.pl - GET /wp-content/themes/zenith/rotr/load.swf?sid=91371
- 18:28:13 UTC - 188.40.79.151 - 38hartrobertsroad.com - GET /wp-content/plugins/rotr/load.swf?sid=52489
- 18:28:13 UTC - 62.76.177.211 - no domain name - GET /sleev/?10
- 18:28:13 UTC - 92.53.105.34 - no domain name - GET /speedup/?id=3
- 18:28:13 UTC - 188.40.79.151 - 38hartrobertsroad.com - GET /wp-content/plugins/rotr/load.swf?sid=52489&ref=http://www.bloggingwithdogs.com/
- 18:28:14 UTC - 62.76.177.211 - no domain name - GET /sleev/?10
- 18:28:14 UTC - 92.53.105.34 - no domain name - GET /speedup/?id=3
- 18:28:14 UTC - 31.22.4.108 - 30oct2007.com - GET /wp-content/rotr/
- 18:28:14 UTC - 31.22.4.108 - 30oct2007.com - GET /wp-content/rotr/
- 18:28:15 UTC - 195.154.14.111 - oojahphi.brittmany.com:8000 - GET /djgdkxwov?ehyvgiqpkwqy=2404448
- 18:28:15 UTC - 195.154.14.111 - oojahphi.brittmany.com:8000 - GET /djgdkxwov?ehyvgiqpkwqy=2404448
- 18:28:16 UTC - 195.154.14.111 - oojahphi.brittmany.com:8000 - GET /dobqfqrwli.js
- 18:28:18 UTC - 195.154.14.111 - oojahphi.brittmany.com:8000 - GET /rqngyeai
- 18:28:24 UTC - 195.154.14.111 - oojahphi.brittmany.com:8000 - POST /bhrkyufjx
- 18:28:24 UTC - 195.154.14.111 - oojahphi.brittmany.com:8000 - GET /somdlbrm?nlzjovudzehl=qvimchxspm (Silverlight exploit)
- 18:28:27 UTC - 195.154.14.111 - oojahphi.brittmany.com:8000 - GET /hyfwodhmsdx?nskee=qvimchxspm (EXE payload)
CHAIN OF EVENTS FOR SAME MALWARE PAYLOAD USING A JAVA EXPLOIT
NOTE: The chain of events from the compromised web site to the Neutrino EK domain is the same as shown above. The EXE payload is also the same.
- 17:54:23 UTC - 195.154.14.111 - weilaeni.brittmany.com:8000 - GET /dfhvswiprgpspq?abwbkv=2404448
- 17:54:23 UTC - 195.154.14.111 - weilaeni.brittmany.com:8000 - GET /owlikhdeduc.js
- 17:54:24 UTC - 195.154.14.111 - weilaeni.brittmany.com:8000 - GET /hsmhjkpzjuegnwl
- 17:54:25 UTC - 195.154.14.111 - weilaeni.brittmany.com:8000 - GET /dfhvswiprgpspq?abwbkv=2404448
- 17:54:29 UTC - 195.154.14.111 - weilaeni.brittmany.com:8000 - POST /yorfewhulnrx
- 17:54:45 UTC - 195.154.14.111 - weilaeni.brittmany.com:8000 - GET /erelwascrltb?bkhotdy=zoetkpsjmv (Java exploit)
- 17:54:46 UTC - 195.154.14.111 - weilaeni.brittmany.com:8000 - GET /META-INF/services/javax.xml.datatype.DatatypeFactory
- 17:54:46 UTC - 195.154.14.111 - weilaeni.brittmany.com:8000 - GET /fvalvitqspp?bjguudvnf=zoetkpsjmv (EXE payload)
PRELIMINARY MALWARE ANALYSIS
File name: 2014-02-02-Neutrino-EK-silverlight-exploit.xap
File size: 5.1 KB ( 5210 bytes )
MD5 hash: ce056895e07d2a9d04c5e8db844013ea
Virus Total link: https://www.virustotal.com/en/file/8bd2cd6a40ad378a974b20e6b0ae49ba4715cd81b96c667c2627f14eab08bc50/analysis/
Detection ratio: 4 / 50
First submitted: 2014-02-02 18:44:37 UTC
- http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0074
- http://malware.dontneedcoffee.com/2013/11/cve-2013-0074-silverlight-integrates.html
File name: 2014-02-02-Neutrino-EK-java-exploit.jar
File size: 556b926e4fb68e255993696691f8e48b
MD5 hash: 18.8 KB ( 19265 bytes )
Virus Total link: https://www.virustotal.com/en/file/dca6b3d8e2ae52d5994bc052b2d2b566c711b53fc8acbab5856115e022bf4411/analysis/
Detection ratio: 0 / 50
First submitted: 2014-02-01 00:30:13 UTC
File name: 2014-02-02-Neutrino-EK-malware-payload.exe
File size: 266.2 KB ( 272551 bytes )
MD5 hash: bec79bed374f4853fbd70209ddeab8d6
Virus Total link: https://www.virustotal.com/en/file/267630f17f204141cf9e1fd4768414e8f738c0e84122692c5b677d9d7cffe68c/analysis/
Detection ratio: 8 / 49
First submitted: 2014-02-02 18:45:02 UTC
POST INFECTION CALLBACK TRAFFIC
The malware gave an error while running from the VM, so I set up a physical host to see what the callback traffic looks like. On the physical host, the malware copied itself to C:\Users\User-1\AppData\Roaming\Deylro\aqum.exe and updated the following registry key:
Registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Value name: Uxwaol
Value data: C:\Users\User-1\AppData\Roaming\Deylro\aqum.exe
Here are the snort events generated from the infected physical host:
- 2014-02-03 01:03:44 UTC - 192.168.1.109:49275 -> 89.191.150.230:80 - ET CNC Zeus Tracker Reported CnC Server TCP group 19
- 2014-02-03 01:03:44 UTC - 192.168.1.109:49275 -> 89.191.150.230:80 - ET TROJAN Generic -POST To file.php w/Extended ASCII Characters
- 2014-02-03 01:03:44 UTC - 192.168.1.109:49275 -> 89.191.150.230:80 - ET TROJAN Generic - POST To .php w/Extended ASCII Characters
- 2014-02-03 01:04:13 UTC - 192.168.1.109:49278 -> 74.125.227.243:80 - ET TROJAN Zeus Bot GET to Google checking Internet connectivity
- 2014-02-03 01:04:14 UTC - 192.168.1.109:49280 -> 118.69.206.95:80 - ET CNC Zeus Tracker Reported CnC Server TCP group 3
- 2014-02-03 01:04:14 UTC - 192.168.1.109:49280 -> 118.69.206.95:80 - ET CNC Zeus Tracker Reported CnC Server TCP group 2
Some of the callback traffic seen from the infected physical host:
- 89.191.150.230 - www.gminalubiewo.pl - POST /images/files/file.php
- 74.125.227.243 - www.google.com - GET /webhp
- 69.16.143.110 - www.h8adioigud.su - POST /files/file.php
- 118.69.206.95 - www.kimsa.vn - POST /images/redir/redir.php
- 69.16.143.110 - www.gaieiuu4877g.su - POST /files/file.php
FINAL NOTES
Once again, here are the associated files:
- ZIP of the initial PCAPS: 2014-02-02-Neutrino-EK-traffic-both-pcaps.zip
- ZIP file of the malware: 2014-02-02-Neutrino-EK-malware.zip
- ZIP of PCAP with post-infection traffic: 2014-02-03-malware-callback-from-physical-host.pcap.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.