2014-02-12 - COMRPOMISED SITE LED TO WHITEHOLE EK IN DEC 2013--NOW GOES TO FIESTA EK
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-02-12-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-02-12-Fiesta-EK-malware.zip
NOTES:
- NOTES: The compromised website from this blog entry pointed to a Whitehole EK when I first reviewed it on 2013-12-09
CHAIN OF EVENTS
ASSOCIATED DOMAINS
- 107.14.36.81 - www.kffl.com - Comrpomised website
- 69.89.31.134 - sordonics.com - First redirect
- 108.162.197.112 - retonad.info - Second redirect
- 205.234.139.119 - a.pimpmycar.ro - Fiesta EK domain
INFECTION CHAIN OF EVENTS
- 02:23:50 UTC - 192.168.204.162:53397 107.14.36.81:80 - www.kffl.com - GET /
- 02:24:02 UTC - 192.168.204.162:53480 69.89.31.134:80 - sordonics.com - GET /JobFiles/CMC/
- 02:24:02 UTC - 192.168.204.162:53485 108.162.197.112:80 - retonad.info - GET /ads/id_24853.swf
- 02:24:02 UTC - 192.168.204.162:53485 108.162.197.112:80 - retonad.info - GET /ads/id_24853.swf?U2KHRcqC7zbdWCvAez4Y7Pbt64F66jU4BU2Q93TcFLOWJHHor
ZEII9mi8bNxsVb1z3ynGGpXhBho552thdOKRYb5FkVCcHBsjv5NNS5/daqDzYmuNrGgpt42js1/HnhCqYYGnL89/e/-0WmdL4q747InQJbLVmjmMao8-XdtadO6v5st9FYx - 02:24:03 UTC - 192.168.204.162:53485 108.162.197.112:80 - retonad.info - GET /login.php?U2KHRcqC7zbdWCvAez4Y7Pbt64F66jU4BU2Q93TcFLOWJHHorZEIIi9mi
8bNxsVb1z3ynGGpXhBho552thdOKRYb5FkVCcHBsjv5NNS5/daqDzYmuNrGgpt42js1/HnhCqYYGnL89/e/-0WmdL4q747InQJbLVmjmMao8-XdtadO6v5st9FYx - 02:24:03 UTC - 192.168.204.162:53490 205.234.139.119:80 - a.pimpmycar.ro - GET /fvchd56/counter.php?fid=2
- 02:24:03 UTC - 192.168.204.162:53491 205.234.139.119:80 - a.pimpmycar.ro - GET /fvchd56/?2
- 02:24:07 UTC - 192.168.204.162:53492 205.234.139.119:80 - a.pimpmycar.ro - GET /fvchd56/?127822c29ff38aee58575b0300095100010a0503065053090400515956
505053 - 02:24:07 UTC - 192.168.204.162:53493 205.234.139.119:80 - a.pimpmycar.ro - GET /fvchd56/?4739944a4e800951475b45020b0f0653040f01020d56045a010555585d
560700;5110411 - 02:24:17 UTC - 192.168.204.162:53506 205.234.139.119:80 - a.pimpmycar.ro - GET /fvchd56/?180ec0511077e4e25440555e510b07030100025e5752050a040a56040
7520650;1;6 - 02:24:18 UTC - 192.168.204.162:53507 205.234.139.119:80 - a.pimpmycar.ro - GET /fvchd56/?180ec0511077e4e25440555e510b07030100025e5752050a040a56040
7520650;1;6;1 - 02:24:18 UTC - 192.168.204.162:53505 205.234.139.119:80 - a.pimpmycar.ro - GET /fvchd56/?399aa6f7b1b159dd5957555a530d540503010b5a5554560c060b5f0005
545556 - 02:24:23 UTC - 192.168.204.162:53508 205.234.139.119:80 - a.pimpmycar.ro - GET /fvchd56/?706ed2f154a54b66585f545e560954030708045e5050560a0202500400
505209 - 02:24:23 UTC - 192.168.204.162:53509 205.234.139.119:80 - a.pimpmycar.ro - GET /fvchd56/?6ac08c4da04ab6b25519060b0a5806560659510b0c01045f035305515c
010705;1;4 - 02:24:24 UTC - 192.168.204.162:53510 205.234.139.119:80 - a.pimpmycar.ro - GET /fvchd56/?6ac08c4da04ab6b25519060b0a5806560659510b0c01045f035305515c
010705;1;4;1
PRELIMINARY MALWARE ANALYSIS
SILVERLIGHT EXPLOIT
File name: Zp04aDKr.xap
File size: 5.2 KB ( 5337 bytes )
MD5 hash: fd51f8ffbe8c9dbb323b2dc2ae63827e
Detection ratio: 1 / 50
First submission: 2014-02-11 03:52:15 UTC
VirusTotal link: https://www.virustotal.com/en/file/b31485f99bea716f2f48a4f5d55b93d7941227eed668a8649c0e34b0b5419e56/analysis/
NOTE: This is the same Silverlight exploit seen in my previous Fiesta EK blog entry on 2014-02-11
JAVA EXPLOIT
File name: M0tZPQin.jar
File size: 7.1 KB ( 7243 bytes )
MD5 hash: 10040755960a9a57cf4f0a1659acaed9
Detection ratio: 7 / 50
First submission: 2014-02-11 03:55:51 UTC
VirusTotal link: https://www.virustotal.com/en/file/78c695acb7df1c727a7bc719040612230b05bed3826611c3961e113c78e7e0c6/analysis/
NOTE: This is the same Java exploit seen in my previous Fiesta EK blog entry on 2014-02-11
MALWARE PAYLOAD
File name: flashplayer11_7r22082_216_win.exe
File size: 112.1 KB ( 114771 bytes )
MD5 hash: 5069e86c294cc34b32e7d3ea7fca8b2e
Detection ratio: 24 / 50
First submission: 2014-02-11 13:41:25 UTC
VirusTotal link: https://www.virustotal.com/en/file/21578db90c165942f1b0be8b2306b807e1347aa32595008a3259e37d35c4453e/analysis/
SNORT EVENTS
SNORT EVENTS FOR FIESTA EK TRAFFIC (FROM SECURITY ONION)
- 2014-02-12 02:24:03 UTC - 192.168.204.162:53491 -> 205.234.139.119:80 - ET CURRENT_EVENTS FiestaEK js-redirect
- 2014-02-12 02:24:03 UTC - 192.168.204.162:53491 -> 205.234.139.119:80 - ET CURRENT_EVENTS DRIVEBY Unknown - Landing Page Requested - /?Digit
- 2014-02-12 02:24:04 UTC - 205.234.139.119:80 -> 192.168.204.162:53491 - ET CURRENT_EVENTS Fiesta EK Landing Jan 24 2013
- 2014-02-12 02:24:07 UTC - 192.168.204.162:53492 -> 205.234.139.119:80 - ET CURRENT_EVENTS Phoenix/Fiesta URI Requested Contains /? and hex
- 2014-02-12 02:24:17 UTC - 205.234.139.119:80 -> 192.168.204.162:53506 - ET POLICY PE EXE or DLL Windows file download
- 2014-02-12 02:24:17 UTC - 205.234.139.119:80 -> 192.168.204.162:53506 - ET INFO EXE - Served Inline HTTP
- 2014-02-12 02:24:17 UTC - 205.234.139.119:80 -> 192.168.204.162:53506 - ET CURRENT_EVENTS Fiesta - Payload - flashplayer11
- 2014-02-12 02:24:18 UTC - 192.168.204.162:53505 -> 205.234.139.119:80 - ET POLICY Vulnerable Java Version 1.7.x Detected
- 2014-02-12 02:24:18 UTC - 192.168.204.162:53505 -> 205.234.139.119:80 - ET CURRENT_EVENTS Unknown - Java Request - gt 60char hex-ascii
- 2014-02-12 02:24:18 UTC - 205.234.139.119:80 -> 192.168.204.162:53505 - ET CURRENT_EVENTS Cool/BHEK Applet with Alpha-Numeric Encoded HTML entity
- 2014-02-12 02:24:23 UTC - 205.234.139.119:80 -> 192.168.204.162:53508 - ET INFO Java File Sent With X-Powered By HTTP Header - Common In Exploit Kits
- 2014-02-12 02:24:23 UTC - 205.234.139.119:80 -> 192.168.204.162:53508 - ET INFO JAVA - Java Archive Download By Vulnerable Client
- 2014-02-12 02:24:23 UTC - 205.234.139.119:80 -> 192.168.204.162:53508 - ET CURRENT_EVENTS DRIVEBY Generic - 8Char.JAR Naming Algorithm
- 2014-02-12 02:24:23 UTC - 205.234.139.119:80 -> 192.168.204.162:53508 - ET TROJAN Generic - 8Char.JAR Naming Algorithm
HIGHLIGHTS FROM THE TRAFFIC
Javascript redirect in the infected web page - www.kffl.com/
First redirect - sordonics.com/JobFiles/CMC/
Second redirect - retonad.info/ads/id_24853.swf and a Flash-based ad redirect
Fiesta EK domain delivers Silverlight exploit:
a.pimpmycar.ro/fvchd56/?4739944a4e800951475b45020b0f0653040f01020d56045a010555585d560700;5110411
Silverlight exploit delivers EXE payload:
a.pimpmycar.ro/fvchd56/?180ec0511077e4e25440555e510b07030100025e5752050a040a560407520650;1;6
Fiesta EK domain delivers Java exploit:
a.pimpmycar.ro/fvchd56/?706ed2f154a54b66585f545e560954030708045e5050560a0202500400505209
Java exploit delivers EXE payload:
a.pimpmycar.ro/fvchd56/?6ac08c4da04ab6b25519060b0a5806560659510b0c01045f035305515c010705;1;4
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-02-12-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-02-12-Fiesta-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.