2014-02-21 - FIESTA EK USES MSIE, SILVERLIGHT, AND JAVA EXPLOITS
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-02-21-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-02-21-Fiesta-EK-malware.zip
CHAIN OF EVENTS
ASSOCIATED DOMAINS
- 216.107.153.123 - forum.ppcgeeks.com - Comrpomised website
- 190.123.47.198 - arosept.org - Redirect domain
- 64.202.116.124 - aloduq.in.ua - Fiesta EK domain
INFECTION CHAIN OF EVENTS
- 03:10:38 UTC - 192.168.204.171:49206 - 216.107.153.123:80 - forum.ppcgeeks.com - GET /htc-touch-pro/86085-screen-broken-mymobiler-not-working.html
- 03:10:39 UTC - 192.168.204.171:49215 - 190.123.47.198:80 - arosept.org - GET /ixakjqpu.js?39a32a0cc8ae36fb
- 03:10:39 UTC - 192.168.204.171:49220 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?2
- 03:10:41 UTC - 192.168.204.171:49255 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?4b3368c2530438ee5d075f080403520307550008025a530901510305550b5b56
- 03:10:41 UTC - 192.168.204.171:49263 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?4fbc38488277bb51470a14580103050907515158075a040301555255500b0c5c;5110411
- 03:10:43 UTC - 192.168.204.171:49268 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?4dfea51ad0b10b8257140d5e530e00500753555e5557015a0157565302060904;5
- 03:10:44 UTC - 192.168.204.171:49269 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?4dfea51ad0b10b8257140d5e530e00500753555e5557015a0157565302060904;5;1
- 03:10:54 UTC - 192.168.204.171:49286 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?41397aeda7b63b1457415802055a5455070600020303555f0102030f54525d00;6
- 03:10:55 UTC - 192.168.204.171:49291 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?41397aeda7b63b1457415802055a5455070600020303555f0102030f54525d00;6;1
- 03:10:56 UTC - 192.168.204.171:49300 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?0aa4c3cf7d46ebdd5a0f0d0f510852570356520f5751535d0552510200005b02
- 03:12:08 UTC - 192.168.204.171:49353 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?142cb171abb887265e5b5058500a0600020301585653070a0407025501020e54
- 03:12:09 UTC - 192.168.204.171:49357 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?6cb0b7526cbd04b2551b070b500c04030554510b565505090350520601040d56;1;4
- 03:12:10 UTC - 192.168.204.171:49358 - 64.202.116.124:80 - aloduq.in.ua - GET /xhywom1/?6cb0b7526cbd04b2551b070b500c04030554510b565505090350520601040d56;1;4;1
PRELIMINARY MALWARE ANALYSIS
SILVERLIGHT EXPLOIT - CVE-2013-0074
File name: TPM9nrb5.xap
File size: 5.3 KB ( 5388 bytes )
MD5: 14cf73eadfc685bb0bcbcfd0e090ca13
Detection ratio: 1 / 50
First submission: 2014-02-21 03:40:08 UTC
VirusTotal link: https://www.virustotal.com/en/file/7850e2d87d2eb49ed05a88390b7b34fd71da0877c34a3fb2f9deec8afd9466b4/analysis/
JAVA EXPLOIT
File name: H5GVAp_o.jar
File size: 7.2 KB ( 7331 bytes )
MD5: 4938c4be79a9494839923e1e93875bed
Detection ratio: 1 / 50
First submission: 2014-02-21 03:40:24 UTC
VirusTotal link: https://www.virustotal.com/en/file/952a54d1afb11a1b430140178a9b9ce4c956c7e720a2f44144cfd4509a636b09/analysis/
MALWARE PAYLOAD (from the VM's AppData\Local\Temp directory)
File name: 01392952330850.exe
File size: 284.0 KB ( 290816 bytes )
MD5: 9dc7f843cb75940171a2a0676b9b7eed
Detection ratio: 10 / 49
First submission: 2014-02-21 03:41:00 UTC
VirusTotal link: https://www.virustotal.com/en/file/b051c81857825d9abbfe8ece7881342073a57dd11aaf27a2c3044554e040a619/analysis/
Malwr link: https://malwr.com/analysis/YzUyMjU5YWM0NzgzNDUzY2EwN2YxYWVlMzcyMzgxNTI/
SNORT EVENTS
SNORT EVENTS FOR FIESTA EK TRAFFIC (FROM SECURITY ONION)
- 03:10:39 UTC - 192.168.204.171:49215 -> 190.123.47.198:80 - ET CURRENT_EVENTS DRIVEBY Redirection - Forum Injection
- 03:10:39 UTC - 192.168.204.171:49220 -> 64.202.116.124:80 - ET CURRENT_EVENTS DRIVEBY Unknown - Landing Page Requested - /?Digit
- 03:10:40 UTC - 64.202.116.124:80 -> 192.168.204.171:49220 - ET CURRENT_EVENTS Fiesta EK Landing Jan 24 2013
- 03:10:41 UTC - 192.168.204.171:49255 -> 64.202.116.124:80 - ET CURRENT_EVENTS Phoenix/Fiesta URI Requested Contains /? and hex
- 03:10:56 UTC - 192.168.204.171:49300 -> 64.202.116.124:80 - ET POLICY Vulnerable Java Version 1.7.x Detected
- 03:10:56 UTC - 192.168.204.171:49300 -> 64.202.116.124:80 - ET CURRENT_EVENTS Unknown - Java Request - gt 60char hex-ascii
- 03:12:08 UTC - 64.202.116.124:80 -> 192.168.204.171:49353 - ET INFO Java File Sent With X-Powered By HTTP Header - Common In Exploit Kits
- 03:12:08 UTC - 64.202.116.124:80 -> 192.168.204.171:49353 - ET INFO JAVA - Java Archive Download By Vulnerable Client
- 03:12:08 UTC - 64.202.116.124:80 -> 192.168.204.171:49353 - ET CURRENT_EVENTS DRIVEBY Generic - 8Char.JAR Naming Algorithm
- 03:12:08 UTC - 64.202.116.124:80 -> 192.168.204.171:49353 - ET TROJAN Generic - 8Char.JAR Naming Algorithm
HIGHLIGHTS FROM THE TRAFFIC
Embedded javascript in the infected web page - forum.ppcgeeks.com/htc-touch-pro/86085-screen-broken-mymobiler-not-working.html
Redirect - arosept.org/ixakjqpu.js?39a32a0cc8ae36fb
Fiesta EK delivers MSIE exploit CVE-2013-2551 - aloduq.in.ua/xhywom1/?4b3368c2530438ee5d075f080403520307550008025a530901510305550b5b56
MSIE exploit delivers EXE payload - aloduq.in.ua/xhywom1/?4dfea51ad0b10b8257140d5e530e00500753555e5557015a0157565302060904;5
Fiesta EK delivers Silverlight exploit - aloduq.in.ua/xhywom1/?4fbc38488277bb51470a14580103050907515158075a040301555255500b0c5c;5110411
Silverlight exploit delivers EXE payload - aloduq.in.ua/xhywom1/?41397aeda7b63b1457415802055a5455070600020303555f0102030f54525d00;6
Fiesta EK delivers Java exploit - aloduq.in.ua/xhywom1/?142cb171abb887265e5b5058500a0600020301585653070a0407025501020e54
Java exploit delivers EXE payload - aloduq.in.ua/xhywom1/?6cb0b7526cbd04b2551b070b500c04030554510b565505090350520601040d56;1;4
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-02-21-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-02-21-Fiesta-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.