2014-03-15 - STYX EK DROPS SIMDA, BITCOIN MINER, AND MORE
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-03-15-Styx-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-03-15-Styx-EK-malware.zip
NOTES:
- I ran across a link for Styx EK and used it to infect a physical host running Windows 7.
- The image below shows most (but not all) of the post-infection additional malware:
CHAIN OF EVENTS
ASSOCIATED DOMAINS
- 204.27.57.194 - transit.thundernova.ca - Styx EK delivering exploit
- 204.27.57.194 - 436sfdh.safebrowsing-cant-stop-me.info - Styx EK delivering malware payload
- Various IP addresses - various domains - Post-infection traffic (see below)
INITIAL INFECTION BY STYX EK
- 04:05:11 UTC - 192.168.1.104:49507 - 204.27.57.194:80 - transit.thundernova.ca - GET /WcLyBChoVsGiB/i.html
- 04:05:12 UTC - 192.168.1.104:49508 - 204.27.57.194:80 - transit.thundernova.ca - GET /WcLyBChoVsGiB/ToeBzl.html
- 04:05:14 UTC - 192.168.1.104:49509 - 204.27.57.194:80 - transit.thundernova.ca - GET /favicon.ico
- 04:05:19 UTC - 192.168.1.104:49510 - 204.27.57.194:80 - transit.thundernova.ca - GET /WcLyBChoVsGiB/gmkCPZN.jar
- 04:05:19 UTC - 192.168.1.104:49511 - 204.27.57.194:80 - transit.thundernova.ca - GET /WcLyBChoVsGiB/gmkCPZN.jar
- 04:05:20 UTC - 192.168.1.104:49512 - 204.27.57.194:80 - 436sfdh.safebrowsing-cant-stop-me.info - GET /WcLyBChoVsGiB/soft_1.exe&h=14
POST-INFECTION SIMDA.C CHECKIN
- 04:05:25 UTC - 192.168.1.104:49513 - 79.142.66.240:80 - report.7myws9ei79qg7i31q.com - GET /?KUO331=%96%C9%D2%9F%[long string]
- 04:05:25 UTC - 192.168.1.104:49516 - 79.142.66.240:80 - report.7myws9ei79qg7i31q.com - GET /?79a179s43=%96%C9%D2%9F%[long string]
- 04:05:25 UTC - 192.168.1.104:49517 - 79.142.66.240:80 - report.7myws9ei79qg7i31q.com - GET /?317i31q20=%96%C9%D2%9F%[long string]
- 04:05:26 UTC - 192.168.1.104:49518 - 79.142.66.240:80 - report.7myws9ei79qg7i31q.com - GET /?555555i12=%96%C9%D2%9F%[long string]
- 04:05:38 UTC - 192.168.1.104:49519 - 79.142.66.240:80 - report.7myws9ei79qg7i31q.com - GET /?CEIQ13=%96%C9%D2%9F%[long string]
- 04:05:42 UTC - 192.168.1.104:49520 - 79.142.66.240:80 - report.e17k3y7ce1aaaaaa31.com - GET /?17931q931=%96%C9%D2%9F%[long string]
- 04:05:42 UTC - 192.168.1.104:49523 - 79.142.66.240:80 - report.e17k3y7ce1aaaaaa31.com - GET /?QG5543=%96%C9%D2%9F%[long string]
- 04:05:42 UTC - 192.168.1.104:49524 - 79.142.66.240:80 - report.e17k3y7ce1aaaaaa31.com - GET /?C1sK30=%96%C9%D2%9F%[long string]
- 04:05:43 UTC - 192.168.1.104:49525 - 79.142.66.240:80 - report.e17k3y7ce1aaaaaa31.com - GET /?G1i917=%96%C9%D2%9F%[long string]
- 04:05:43 UTC - 192.168.1.104:49526 - 79.142.66.240:80 - report.e17k3y7ce1aaaaaa31.com - GET /?555qG5558=%96%C9%D2%9F%[long string]
- 04:06:19 UTC - 192.168.1.104:49530 - 79.142.66.240:80 - report.e17k3y7ce1aaaaaa31.com - GET /?MY1c55=%96%C9%D2%9F%[long string]
- 04:06:20 UTC - 192.168.1.104:49531 - 79.142.66.240:80 - report.e17k3y7ce1aaaaaa31.com - GET /?MY3157=%96%C9%D2%9F%[long string]
- 04:06:20 UTC - 192.168.1.104:49532 - 79.142.66.240:80 - report.e17k3y7ce1aaaaaa31.com - GET /?O7oC63=%96%C9%D2%9F%[long string]
- 04:06:20 UTC - 192.168.1.104:49533 - 79.142.66.240:80 - report.e17k3y7ce1aaaaaa31.com - GET /?g93aAA18=%96%C9%D2%9F%[long string]
POST-INFECTION CALLBACK FOR ADDITIONAL MALWARE
- 04:05:25 UTC - 192.168.1.104:49514 - 5.149.248.85:80 - report.7myws9ei79qg7i31q.com - POST /
- 04:05:25 UTC - 192.168.1.104:49515 - 5.149.248.85:80 - update2.53ddc59xb5.com - GET /?cd=kdnSlMaplmKTZWqal8Zqb6qaa[long string]
- 04:05:42 UTC - 192.168.1.104:49521 - 5.149.248.85:80 - report.e17k3y7ce1aaaaaa31.com - POST /
- 04:05:42 UTC - 192.168.1.104:49522 - 5.149.248.85:80 - update.obtlyoohsvjjj.com - GET /?ob=kdnSlMapll7UkquirNKknqWuo[long string]
- 04:05:44 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /flashupdate64.exe
- 04:05:55 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /first.vbs
- 04:05:55 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /update.vbs
- 04:05:55 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /flashsec64.exe
- 04:05:56 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /startsec.vbs
- 04:05:56 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /updatesec.vbs
- 04:05:56 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /flashcl.exe
- 04:05:57 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /startcl.vbs
- 04:05:57 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /updatecl.vbs
- 04:05:57 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /info.txt
- 04:05:57 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - 5.149.248.85 - GET /Product2324_Distribution2399_Partner6407.exe
- 04:06:19 UTC - 192.168.1.104:49528 - 5.149.248.85:80 - sdfe3454hhdf.com - GET /report.log
INSTALLER FOR UNWANTED PROGRAM
- 04:06:19 UTC - 192.168.1.104:49529 - 23.21.53.17:80 - installer.ppdownload.com - GET /Installer/Flow?pubid=6407&[long string]
- 04:06:20 UTC - 192.168.1.104:49534 - 54.243.247.108:80 - installer.ppdownload.com - GET /offers/DynamicOfferScreen?[long string]
- 04:06:20 UTC - 192.168.1.104:49535 - 74.125.30.156:80 - stats.g.doubleclick.net - GET /dc.js
- 04:06:20 UTC - 192.168.1.104:49536 - 198.232.124.224:80 - static.revenyou.com - GET /offers/images/Theme7/topLine.jpg
- 04:06:20 UTC - 192.168.1.104:49537 - 198.232.124.224:80 - static.revenyou.com - GET /offers/images/Theme7/topComp.png
- 04:06:20 UTC - 192.168.1.104:49535 - 74.125.30.156:80 - stats.g.doubleclick.net - GET /__utm.gif?utmwv=5.4.8dc&[long string]
- 04:06:21 UTC - 192.168.1.104:49536 - 198.232.124.224:80 - static.revenyou.com - GET /offers/images/Theme7/bgImg.jpg
- 04:06:21 UTC - 192.168.1.104:49537 - 198.232.124.224:80 - static.revenyou.com - GET /offers/images/Theme7/bodyImg.png
- 04:06:21 UTC - 192.168.1.104:49537 - 198.232.124.224:80 - static.revenyou.com - GET /offers/images/Theme7/bottomLine.jpg
- 04:06:21 UTC - 192.168.1.104:49536 - 198.232.124.224:80 - static.revenyou.com - GET /offers/images/Theme7/nextCase.jpg
- 04:06:21 UTC - 192.168.1.104:49537 - 198.232.124.224:80 - static.revenyou.com - GET /offers/images/Theme7/button_over.png
- 04:06:21 UTC - 192.168.1.104:49536 - 198.232.124.224:80 - static.revenyou.com - GET /offers/images/Theme7/button.png
The unwanted program says it's a VLC player:
PRELIMINARY MALWARE ANALYSIS
JAVA EXPLOIT
File name: 2014-03-15-Styx-EK-java-exploit.jpg
File size: 31.9 KB ( 32626 bytes )
MD5 hash: 1edc4279c44c874bcb3e749db7e0e885
Detection ratio: 15 / 49
First submission: 2014-02-05 12:50:57 UTC
VirusTotal link: https://www.virustotal.com/en/file/cd467699247c15883a1e8f5ea38b27ee3f8eb03f422107b808ed89d31bd998c4/analysis/
This Java exploit has been out for about a month and a half now...
MALWARE PAYLOAD - SIMDA BACKDOOR
File name: 2014-03-15-Styx-EK-malware-payload.exe
File size: 892.5 KB ( 913920 bytes )
MD5 hash: f388668fa7461565707ca2a36677fd3c
Detection ratio: 38 / 49
First submission: 2014-03-10 22:39:57 UTC
VirusTotal link: https://www.virustotal.com/en/file/6f23f03fcaebd7eb12618d160826841c03a7efed154bce1d8645ffe43ba1c5b3/analysis/
Malwr link: https://malwr.com/analysis/NDhlNGUzMTA2MGU2NDc2N2E1MzBjODMzZDE3MzYxNDg/
FOLLOW-UP MALWARE (1 OF 4) - ADCLICKER / QHOST
File name: flashcl.exe
File size: 513.5 KB ( 525840 bytes )
MD5 hash: 30ad1e0db5af8e6f81da10e738d4b7b0
Detection ratio: 20 / 49
First submission: 2014-03-09 12:05:02 UTC
VirusTotal link: https://www.virustotal.com/en/file/996b88ebf3f91a665d75474db3a16169d9ebc4e8bbc096bdb452d7b3e51309e0/analysis/
Malwr link: https://malwr.com/analysis/N2NjMGQ1NmZjZWJjNDNhYzhmNmQwZmJjMzYxM2NiMTk/
FOLLOW-UP MALWARE (2 OF 4) - SIMDA
File name: flashsec64.exe
File size: 256.0 KB ( 262144 bytes )
MD5 hash: 982e0df10b9f06e3baabf77fbd4524be
Detection ratio: 27 / 49
First submission: 2014-03-05 12:59:13 UTC
VirusTotal link: https://www.virustotal.com/en/file/49eaba8ade344ea08d5b989729781a8406c8687d69f09505c2646257ba286939/analysis/
Malwr link: https://malwr.com/analysis/OWU4YTE1NzNjMWQzNDkyZjkzNGNiNzIxMDFlZTc3NGE/
FOLLOW-UP MALWARE (3 OF 4) - BITCOIN MINER
File name: flashupdate64.exe
File size: 6.7 MB ( 7058432 bytes )
MD5 hash: 66f0ba29674e859221d6c142a7b99ed7
Detection ratio: 14 / 49
First submission: 2014-01-26 05:27:11 UTC
VirusTotal link: https://www.virustotal.com/en/file/41cff4db42730a6d9b2a8c69ebc94df571c35b5983824747512f23352c9d0aae/analysis/
Malwr link: https://malwr.com/analysis/MzVjODMxYTdmMjk3NDkwMGI0ZGUzZDY0OGJkNmQyY2Q/
FOLLOW-UP MALWARE (4 OF 4) - UNWANTED PROGRAM - OUTBROWSE
File name: Product2324_Distribution2399_Partner6407.exe
File size: 7ba7c951830f5b0f21c98c2a5b6d13bd
MD5 hash: 616.0 KB ( 630761 bytes )
Detection ratio: 23 / 49
First submission: 2014-02-24 14:48:29 UTC
VirusTotal link: https://www.virustotal.com/en/file/ead2ac697f81a7ced7e13b3512f609db4cd3ec37952c1da568c80ef70ebedbfc/analysis/
Malwr link: https://malwr.com/analysis/ZjBkNzZiYWQxYzgyNDRlNWFmMTc0YzhhYTk1MDQyZmY/
SNORT EVENTS
SNORT EVENTS FOR INFECTION TRAFFIC (from Sguil on Security Onion)
- 04:05:19 UTC - 192.168.1.104:49510 - 204.27.57.194:80 - ET POLICY Vulnerable Java Version 1.6.x Detected
- 04:05:20 UTC - 192.168.1.104:49512 - 204.27.57.194:80 - ET CURRENT_EVENTS Styx Exploit Kit Payload Download
- 04:05:20 UTC - 204.27.57.194:80 - 192.168.1.104:49512 - ET POLICY Java EXE Download
- 04:05:20 UTC - 204.27.57.194:80 - 192.168.1.104:49512 - ET POLICY PE EXE or DLL Windows file download
- 04:05:20 UTC - 204.27.57.194:80 - 192.168.1.104:49512 - ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby
- 04:05:25 UTC - 192.168.1.104:49513 - 79.142.66.240:80 - ET TROJAN Simda.C Checkin
- 04:05:44 UTC - 192.168.1.104:49527 - 5.149.248.85:80 - ET INFO Exectuable Download from dotted-quad Host
- 04:05:44 UTC - 5.149.248.85:80 - 192.168.1.104:49527 - ET POLICY PE EXE or DLL Windows file download
- 04:05:47 UTC - 5.149.248.85:80 - 192.168.1.104:49527 - GPL SHELLCODE x86 NOOP
ADDITIONAL NOTES
Also saw TCP traffic to 54.200.248.75 port 1337 from the infected host:
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-03-15-Styx-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-03-15-Styx-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.