2014-04-11 - FIESTA EK FROM 64.202.123.50 - 11IMAW1.DIMATUR.PT - FLASH/SILVERLIGHT/JAVA EXPLOITS
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-04-11-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-11-Fiesta-EK-malware.zip
NOTES:
- I finally saw the CVE-2014-0497 Flash exploit deliver an EXE payload (after noticing the exploit in a previous blog entry).
- The three exploits (Flash, Silverlight, and Java) all delivered the same malware payload.
- The CVE numbers in this blog post are based on 1) the Virus Total results or 2) the Silverlight exploits I've seen with Fiesta have always been identified as CVE-2013-0074 (so far).
- Malware Don't Need Coffee's blog post on the CVE-2014-0497 Flash exploit: http://malware.dontneedcoffee.com/2014/02/cve-2014-0497-flash-up-to-120043.html
CHAIN OF EVENTS
ASSOCIATED DOMAINS
- 23.128.156.226 - www.kffl.com - Compromised website
- 69.89.31.134 - sordonics.com - Redirect
- 108.162.197.20 - hizpor.info - Flash-based redirect
- 64.202.123.50 - 11imaw1.dimatur.pt - Fiesta EK
- 195.2.253.38 - 195.2.253.38 - Post-infection callback
INFECTION CHAIN OF EVENTS
- 08:45:42 UTC - www.kffl.com - GET /
- 08:45:51 UTC - sordonics.com - GET /JobFiles/CMC/
- 08:45:51 UTC - sordonics.com - GET /JobFiles/CMC/login.php
- 08:45:52 UTC - hizpor.info - GET /swfeasy/swf-easy-bannner.swf
- 08:45:52 UTC - hizpor.info - GET /swfeasy/swf-easy-bannner.swf?cid=44tjq7e478rqcudv4pictko585
- 08:45:52 UTC - hizpor.info - GET /license.php?cid=44tjq7e478rqcudv4pictko585
- 08:45:53 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/counter.php?fid=2
- 08:45:53 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?2
- 08:45:57 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?5413b3b4de15998b464357085008530005020207590700040e0102075552000656;120000;38 Flash exploit
- 08:45:58 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?3e8869212a1ff56c40094e030402030503530b0c0d0d500108500b0c0158500350;5110411 Silverlight exploit
- 08:45:58 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?5f8bcd9d2c8c81f356165359515f085005500b5658505b540e530b5654055b5656;6
- 08:45:59 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?5f8bcd9d2c8c81f356165359515f085005500b5658505b540e530b5654055b5656;6;1
- 08:46:14 UTC - 195.2.253.38 - POST /
- 08:46:15 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?5c02ad522c8c81f356135b09535f0406055503065a5057020e5603065605570056;5
- 08:46:16 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?5c02ad522c8c81f356135b09535f0406055503065a5057020e5603065605570056;5;1
- 08:46:16 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?44ac0210ceee0b375e5a0d5802090004040252570b0653000f0152570753530257
- 08:46:25 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?71fb3c4fc1bf73cb585e04590158055207075556085756560c0455560402565204 Java exploit
- 08:46:25 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?71fb3c4fc1bf73cb585e04590158055207075556085756560c0455560402565204
- 08:46:26 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?54fc404e13f28c11564c0358060b0551050255570f0456550e0155570351565756;1;3
- 08:46:26 UTC - 11imaw1.dimatur.pt - GET /ohxjfz5/?54fc404e13f28c11564c0358060b0551050255570f0456550e0155570351565756;1;3;1
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT - CVE-2014-0497
File name: 2014-04-11-Fiesta-EK-flash-exploit.swf
File size: 7.7 KB ( 7853 bytes )
MD5 hash: eb343c450abd625d2119b98dcc0d62d7
Detection ratio: 9 / 51
First submission: 2014-04-08 05:34:23 UTC
VirusTotal link: https://www.virustotal.com/en/file/a3791ec300f8e082bd24e8c265bbf694b71d790ad90c5b3a68bcc6b762e99a68/analysis/
SILVERLIGHT EXPLOIT - CVE-2013-0074
File name: 2014-04-11-Fiesta-EK-silverlight-exploit.xap
File size: 5.2 KB ( 5318 bytes )
MD5 hash: 15fa75694f0125cae6519fa35dc2f60d
Detection ratio: 2 / 51
First submission: 2014-04-09 13:30:19 UTC
VirusTotal link: https://www.virustotal.com/en/file/1af4c7dd99ed12269ade140756c246b2508e79c44f27344447f9ab93f1904538/analysis/
JAVA EXPLOIT - CVE-2013-2465
File name: 2014-04-11-Fiesta-EK-java-exploit.jar
File size: 7.3 KB ( 7440 bytes )
MD5 hash: 807e6834256ebdfcd6d5113878e2d337
Detection ratio: 2 / 50
First submission: 2014-04-11 10:29:11 UTC
VirusTotal link: https://www.virustotal.com/en/file/7e9cb2a9c2f420667b2b3cacc9cfe03800b1cb417bb32f6eddcd94eb8c8256e0/analysis/
MALWARE PAYLOAD
File name: 2014-04-11-Fiesta-EK-malware-payload.exe
File size: 122.3 KB ( 125243 bytes )
MD5 hash: 4726f0152707a46a7c76e037e5a2b329
Detection ratio: 6 / 50
First submission: 2014-04-11 10:29:26 UTC
VirusTotal link: https://www.virustotal.com/en/file/bcd59c8d547e86a407b15efe23d358a6ca35efeb6e4cbd18c4995cd4148047a1/analysis/
Malwr link: https://malwr.com/analysis/YmIwNmEwZjFjN2FhNGVjODhiYzNhMWQ1M2Q2OTFlZDc/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
- 2014-04-11 08:45:53 UTC - 192.168.204.224:55076 - 64.202.123.50:80 - ET CURRENT_EVENTS DRIVEBY Unknown - Landing Page Requested - /?Digit
- 2014-04-11 08:45:54 UTC - 64.202.123.50:80 - 192.168.204.224:55076 - ET CURRENT_EVENTS Fiesta EK Landing Jan 24 2013
- 2014-04-11 08:45:57 UTC - 192.168.204.224:55118 - 64.202.123.50:80 - ET CURRENT_EVENTS Phoenix/Fiesta URI Requested Contains /? and hex
- 2014-04-11 08:45:58 UTC - 64.202.123.50:80 - 192.168.204.224:55119 - ET CURRENT_EVENTS Possible Neutrino/Fiesta SilverLight Exploit March 05 2014 DLL Naming Convention
- 2014-04-11 08:46:14 UTC - 192.168.204.224:55139 - 64.202.123.50:80 - ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
- 2014-04-11 08:46:16 UTC - 192.168.204.224:55139 - 64.202.123.50:80 - ET POLICY Vulnerable Java Version 1.7.x Detected
- 2014-04-11 08:46:16 UTC - 192.168.204.224:55139 - 64.202.123.50:80 - ET CURRENT_EVENTS Unknown - Java Request - gt 60char hex-ascii
- 2014-04-11 08:46:16 UTC - 64.202.123.50:80 - 192.168.204.224:55139 - ET CURRENT_EVENTS Possible J7u21 click2play bypass
- 2014-04-11 08:46:25 UTC - 64.202.123.50:80 - 192.168.204.224:55140 - ET INFO Java File Sent With X-Powered By HTTP Header - Common In Exploit Kits
- 2014-04-11 08:46:25 UTC - 64.202.123.50:80 - 192.168.204.224:55140 - ET INFO JAVA - Java Archive Download By Vulnerable Client
- 2014-04-11 08:46:25 UTC - 64.202.123.50:80 - 192.168.204.224:55140 - ET CURRENT_EVENTS DRIVEBY Generic - 8Char.JAR Naming Algorithm
- 2014-04-11 08:46:25 UTC - 64.202.123.50:80 - 192.168.204.224:55140 - ET TROJAN Generic - 8Char.JAR Naming Algorithm
HIGHLIGHTS FROM THE TRAFFIC
From www.kffl.com to sordonics.com:
From sordonics.com to hizpor.info:
From hizpor.info to 11imaw1.dimatur.pt:
Fiesta EK delivers CVE-2014-0497 Flash exploit:
Flash exploit delivers EXE payload:
Fiesta EK delivers CVE-2013-0074 Silverlight exploit:
Silverlight exploit delivers the same EXE payload:
Fiesta EK delivers CVE-2013-2465 Java exploit:
Java exploit delivers the same EXE payload:
Post-infection callback traffic after the EXE payload was first delivered by the Flash exploit:
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-04-11-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-11-Fiesta-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.