2014-03-26 - FIESTA EK
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-03-26-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-03-26-Fiesta-EK-malware.zip
NOTES:
CHAIN OF EVENTS
ASSOCIATED DOMAINS
- 208.43.216.144 - www.christianforums.com - Compromised website
- 190.123.47.198 - hillkikins.com - Redirect
- 64.202.116.124 - bvtgbt.in.ua - Fiesta EK
- 142.4.198.175 - kuyuacgsiowawsqa.org - Post-infection callback
INFECTION CHAIN OF EVENTS
- 15:27:02 UTC - www.christianforums.com - GET /t7809794/
- 15:27:03 UTC - hillkikins.com - GET /kljhbat.js?ea39522c422199e4
- 15:27:04 UTC - bvtgbt.in.ua - GET /57rcvhf/?2
- 15:27:10 UTC - bvtgbt.in.ua - GET /57rcvhf/?15147e80e54dd1794259470f055e0905010702050c515a000a0002070503090452;5110411
- 15:27:30 UTC - bvtgbt.in.ua - GET /57rcvhf/?0ed55026e3dea5e653150f0e070b0303005757040e0450060b5057060756030253;6
- 15:27:31 UTC - bvtgbt.in.ua - GET /57rcvhf/?0ed55026e3dea5e653150f0e070b0303005757040e0450060b5057060756030253;6;1
- 15:27:32 UTC - bvtgbt.in.ua - GET /57rcvhf/?48820e4901bc2f225e565409025e050c040a0b030b5156090f0d0b010203050d57
- 15:27:36 UTC - bvtgbt.in.ua - GET /57rcvhf/?2066fd4d6dec56c35d5f540d545f0551020205075d505654090505055402055205
- 15:27:37 UTC - bvtgbt.in.ua - GET /57rcvhf/?2066fd4d6dec56c35d5f540d545f0551020205075d505654090505055402055205
- 15:27:37 UTC - bvtgbt.in.ua - GET /57rcvhf/?33b158b7dca0a804504b070a07035302030151000e0c000708065102075e530350;1;4
- 15:27:38 UTC - bvtgbt.in.ua - GET /57rcvhf/?33b158b7dca0a804504b070a07035302030151000e0c000708065102075e530350;1;4;1
POST-INFECTION CALLBACK TRAFFIC
- 15:27:49 UTC - kuyuacgsiowawsqa.org - POST /
- 15:27:49 UTC - kuyuacgsiowawsqa.org - POST /
PRELIMINARY MALWARE ANALYSIS
SILVERLIGHT EXPLOIT
File name: 2014-03-26-Fiesta-EK-silverlight-exploit.xap
File size: 5.1 KB ( 5265 bytes )
MD5 hash: eb74945c840dfd74a171639f379777aa
Detection ratio: 22 / 51
First submission: 2014-03-19 15:32:15 UTC
VirusTotal link: https://www.virustotal.com/en/file/bed60e3715e542881d5e80784bdcbb4945a6a8375a63cbde6436a2782593a87c/analysis/
JAVA EXPLOIT
File name: 2014-03-26-Fiesta-EK-java-exploit.jar
File size: 7.3 KB ( 7462 bytes )
MD5 hash: d529b2a500b94641fa89157f14d46608
Detection ratio: 11 / 51
First submission: 2014-03-22 03:59:50 UTC
VirusTotal link: https://www.virustotal.com/en/file/a4d56c4a8ddf5bed48b6fc8641f87ff356e272d52c2516d4dfb00575f64e3e0c/analysis/
MALWARE PAYLOAD
File name: 2014-03-26-Fiesta-EK-malware-payload.exe
File size: 224.0 KB ( 229376 bytes )
MD5 hash: 1d6c7eae75e425ae4f404385313ae77c
Detection ratio: 7 / 51
First submission: 2014-03-26 15:32:51 UTC
VirusTotal link: https://www.virustotal.com/en/file/98c02526e9b512a7100296e10832e90d1eed5064633dd0110adcb9bfc0574d92/analysis/
Malwr link: https://malwr.com/analysis/OGNiYjRjODgwYTg2NDdjYmE4ZTZmMjIyNjkzNjljYTU/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
- 2014-03-26 15:27:03 UTC - 192.168.204.148:49204 - 190.123.47.198:80 - ET CURRENT_EVENTS DRIVEBY Redirection - Forum Injection
- 2014-03-26 15:27:04 UTC - 192.168.204.148:49207 - 64.202.116.124:80 - ET CURRENT_EVENTS FiestaEK js-redirect
- 2014-03-26 15:27:04 UTC - 192.168.204.148:49207 - 64.202.116.124:80 - ET CURRENT_EVENTS DRIVEBY Unknown - Landing Page Requested - /?Digit
- 2014-03-26 15:27:04 UTC - 64.202.116.124:80 - 192.168.204.148:49207 - ET CURRENT_EVENTS Fiesta EK Landing Jan 24 2013
- 2014-03-26 15:27:10 UTC - 192.168.204.148:49218 - 64.202.116.124:80 - ET CURRENT_EVENTS Phoenix/Fiesta URI Requested Contains /? and hex
- 2014-03-26 15:27:10 UTC - 64.202.116.124:80 - 192.168.204.148:49218 - ET CURRENT_EVENTS Possible Neutrino/Fiesta SilverLight Exploit March 05 2014 DLL Naming Convention
- 2014-03-26 15:27:32 UTC - 192.168.204.148:49340 - 64.202.116.124:80 - ET POLICY Vulnerable Java Version 1.7.x Detected
- 2014-03-26 15:27:32 UTC - 192.168.204.148:49340 - 64.202.116.124:80 - ET CURRENT_EVENTS Unknown - Java Request - gt 60char hex-ascii
- 2014-03-26 15:27:32 UTC - 64.202.116.124:80 - 192.168.204.148:49340 - ET CURRENT_EVENTS Possible J7u21 click2play bypass
- 2014-03-26 15:27:37 UTC - 64.202.116.124:80 - 192.168.204.148:49388 - ET INFO Java File Sent With X-Powered By HTTP Header - Common In Exploit Kits
- 2014-03-26 15:27:37 UTC - 64.202.116.124:80 - 192.168.204.148:49388 - ET INFO JAVA - Java Archive Download By Vulnerable Client
- 2014-03-26 15:27:37 UTC - 64.202.116.124:80 - 192.168.204.148:49388 - ET CURRENT_EVENTS DRIVEBY Generic - 8Char.JAR Naming Algorithm
- 2014-03-26 15:27:37 UTC - 64.202.116.124:80 - 192.168.204.148:49388 - ET TROJAN Generic - 8Char.JAR Naming Algorithm
HIGHLIGHTS FROM THE TRAFFIC
Embedded javascript in web page from compromised server - www.christianforums.com /t7809794/
Redirect - hillkikins.com/kljhbat.js?ea39522c422199e4
Fiesta EK delivers Silverlight exploit -
bvtgbt.in.ua/57rcvhf/?15147e80e54dd1794259470f055e0905010702050c515a000a0002070503090452;5110411
Silverlight exploit delivers EXE payload -
bvtgbt.in.ua/57rcvhf/?0ed55026e3dea5e653150f0e070b0303005757040e0450060b5057060756030253;6
Fiesta EK delivers Java exploit -
bvtgbt.in.ua/57rcvhf/?2066fd4d6dec56c35d5f540d545f0551020205075d505654090505055402055205
Java exploit delivers the same EXE payload -
bvtgbt.in.ua/57rcvhf/?33b158b7dca0a804504b070a07035302030151000e0c000708065102075e530350;1;4
Post-infection callback traffic - kuyuacgsiowawsqa.org/
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-03-26-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-03-26-Fiesta-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.