2014-04-14 - MAGNITUDE EK FROM 67.196.3.65 - MSIE EXPLOIT - 6 MALWARE PAYLOADS
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-04-14-Magnitude-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-14-Magnitude-EK-malware.zip
NOTES:
- Magnitude usually (if not always) sends more than one payload. This infection included 6 malware payloads and at least 2 post-infection malware downloads.
- Screen shots of the cryptolocker ransomware are near the end of this blog entry.
- I also saw click-fraud traffic and spam being sent from the infected host (not included in the PCAP).
- This infection is the second time I've seen an EmergingThreats signature for the Neverquest infostealer.
UPDATE
- Shout out to Kimberly @StopMalvertisin who identitified the ransomware as CryptoDefense... Thanks!
@malware_traffic Brad, the ransomware is CryptoDefense btw :)
— Kimberly (@StopMalvertisin) April 16, 2014
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 95.141.36.68 - www.uiltrasporticalabria.it - Comrpomised webstie
- 109.120.150.19 - strs130.wha.la - First redirect
- 144.76.161.34 - fa95.wha.la - Second redirect
- 67.196.3.65 - 9b5ef08.e9b.1c34d5.379b.0078.5638.0cd0.rpaitxocww.dumpequally.net - Magnitude EK
- various IP addresses - Post-infection callback traffic
COMPROMISED WEBSITE AND REDIRECTS:
- 01:37:21 UTC - www.uiltrasporticalabria.it - GET /
- 01:37:24 UTC - strs130.wha.la - GET /zismo/index.php
- 01:37:25 UTC - fa95.wha.la - GET /zxzzzzzdddff/?id=ts
MAGNITUDE EK:
- 01:37:28 UTC - 9b5ef08.e9b.1c34d5.379b.0078.5638.0cd0.rpaitxocww.dumpequally.net - GET /
- 01:37:30 UTC - 9b5ef08.e9b.1c34d5.379b.0078.5638.0cd0.rpaitxocww.dumpequally.net - GET /0e9c6b8d847dde5934bf356ff1639a70/3950bf742ced014ed533a69f38d1f362
- 01:37:32 UTC - 67.196.3.65 - GET /?bdef493dd79d22954b8eed25fd94d844
- 01:37:40 UTC - 67.196.3.65 - GET /?f374ddbff953c15fbc2664903037f3a8
- 01:38:11 UTC - 67.196.3.65 - GET /?a7f73a72e2efd4f527df7a369cb7acc2
- 01:38:13 UTC - 67.196.3.65 - GET /?a070080351aca5d7b45538ddfbdeb58f
- 01:38:14 UTC - 67.196.3.65 - GET /?f88d2c40f0981cfa25ca625b0aef45bb
- 01:38:16 UTC - 67.196.3.65 - GET /?ff8e988281414d46f1dd1a29cc5eb0db
SOME OF THE CALLBACK TRAFFIC:
- 01:37:46 UTC - 87.224.219.174 - GET /mod1/5minut1.exe [more malware]
- 01:37:48 UTC - 141.101.117.71 - niggaattack23.com - POST /2a628t577por5c
- 01:37:49 UTC - 31.170.178.179 - 120.statscreen.info - GET /index.html?p=257786
- 01:37:49 UTC - 54.84.0.18 - za.zeroredirect1.com - GET /zcvisitor/633b2fa4-c375-11e3-97b8-0e1d57b0b976
- 01:37:50 UTC - 89.215.196.42 - GET /mod2/5minut1.exe [more malware]
- 01:38:06 UTC - 141.101.117.71 - niggaattack23.com - POST /psfxwfddej1roh
- 01:38:13 UTC - 79.142.66.240 - report.c17u317aaa79eiq9ws.com - GET /?5oCEIQ520=%96%C9%A7[long string of characters]
- 01:38:40 UTC - 74.125.227.211 - www.google.com - GET /
- 01:38:45 UTC - 142.4.198.175 - kuawkswesmaaaqwm.org - POST /
- 01:38:46 UTC - 74.125.227.211 - www.google.com - GET /
- 01:38:48 UTC - 141.101.117.71 - niggaattack23.com - POST /68qmqzyt1326xx8
- 01:39:08 UTC - 141.101.117.71 - niggaattack23.com - POST /zfan5jzphfdsrlr
- 01:39:11 UTC - 91.220.131.58 - GET /mod1/5minut1.exe [same hash as the one sent at 01:37:46 UTC]
- 01:39:24 UTC - 79.142.66.240 - report.q5w5u55i5qgm5g5.com - GET /?G31a20=%96%C9%A7[long string of characters]
- 01:39:29 UTC - 141.101.117.71 - niggaattack23.com - POST /fjd7m0199e5
- 01:40:19 UTC - 115.165.252.67 - GET /main.htm
- 01:40:47 UTC - 141.101.117.71 - niggaattack23.com - POST /6ifemkkgknl9n
- 01:42:26 UTC - 202.122.19.2 - GET /home.htm
- 01:44:21 UTC - 141.101.117.71 - niggaattack23.com - POST /hs9qwveivl
- 01:53:03 UTC - 141.101.117.71 - niggaattack23.com - POST /1od6f4q72ppa
- 01:53:59 UTC - 185.13.32.67 - baggonally.com - POST /forumdisplay.php?fid=150697763
- 01:56:20 UTC - 186.18.247.186 - GET /file.htm
- 01:58:55 UTC - 91.230.60.60 - kuawkswesmaaaqwm.org - POST /
- 01:58:56 UTC - 173.194.115.113 - www.google.com - GET /
PRELIMINARY MALWARE ANALYSIS
MALWARE PAYLOAD 1 OF 6
File name: 2014-04-14-Magnitude-EK-malware-payload-01.exe
File size: 184.0 KB ( 188416 bytes )
MD5 hash: 0b2d40aadc212b4b0e7cb92fdebc4b7b
Detection ratio: 7 / 51
First submission: 2014-04-14 02:45:33 UTC
VirusTotal link: https://www.virustotal.com/en/file/64c6764f569a663407552b98b5458757145b97e0513805ff9acd65352f7596c1/analysis/
Malwr link: https://malwr.com/analysis/YjgwYmMwYTYzZWI5NGJlZTk1MmMwODNjYTM1MTVjODQ/
MALWARE PAYLOAD 2 OF 6
File name: 2014-04-14-Magnitude-EK-malware-payload-02.exe
File size: 18.5 KB ( 18961 bytes )
MD5 hash: fa1a4222772ca5ea96a6b778a0bf8dec
Detection ratio: 11 / 50
First submission: 2014-04-14 02:45:56 UTC
VirusTotal link: https://www.virustotal.com/en/file/45186539e70565c96ec0192bc1ebdd34eb0db3b02dbb73b81e561dc99ce9f79f/analysis/
Malwr link: https://malwr.com/analysis/NmE4NjMzYzAxYWZjNGZmZThmNWRlYzI1OTU4YjhhZTI/
MALWARE PAYLOAD 3 OF 6
File name: 2014-04-14-Magnitude-EK-malware-payload-03.exe
File size: 752.0 KB ( 770025 bytes )
MD5 hash: 82e4c565becaf62d03881fd605dcbab4
Detection ratio: 7 / 50
First submission: 2014-04-14 02:46:30 UTC
VirusTotal link: https://www.virustotal.com/en/file/ced2bc6ea437fe62e8e113d9212eeac02a8891c801977f26d13ddbf094ee914a/analysis/
Malwr link: https://malwr.com/analysis/MzIwMTQ3N2QyOTIzNDJjOWI1YzBjMjVkYzZhYmE4YTA/
MALWARE PAYLOAD 4 OF 6
File name: 2014-04-14-Magnitude-EK-malware-payload-04.exe
File size: 264.0 KB ( 270336 bytes )
MD5 hash: 67b9255666e55634e07cb01aa45d162d
Detection ratio: 4 / 51
First submission: 2014-04-14 02:46:55 UTC
VirusTotal link: https://www.virustotal.com/en/file/d5a8426cb19e04e4424ffb472e274469e259cafe7b5e1a24310bc6b0cc9cb19d/analysis/
Malwr link: https://malwr.com/analysis/MjQ1NzAxNWI2YmRkNDJlYzkwODc0Y2NlOTY2NDRkMjc/
MALWARE PAYLOAD 5 OF 6
File name: 2014-04-14-Magnitude-EK-malware-payload-05.exe
File size: 103.9 KB ( 106344 bytes )
MD5 hash: 1bbe05033f248d337acfe791a405dcc7
Detection ratio: 4 / 49
First submission: 2014-04-14 02:47:21 UTC
VirusTotal link: https://www.virustotal.com/en/file/9b8aa1c3f14518d83aa6ceb109518d1a31a98720dabd262928f06bca044230f3/analysis/
Malwr link: https://malwr.com/analysis/OGFjNzJjN2JhMDM1NDlmNDkxMGJlOWE0ZTMzMzU4ZTE/
MALWARE PAYLOAD 6 OF 6
File name: 2014-04-14-Magnitude-EK-malware-payload-06.exe
File size: 388.7 KB ( 398065 bytes )
MD5 hash: 9c6de625314482f9e73689bf375bf3cc
Detection ratio: 7 / 50
First submission: 2014-04-14 02:47:47 UTC
VirusTotal link: https://www.virustotal.com/en/file/2cd2fa449ec2c4e65daa309bcbdde67af4b255d9280e82a1b83cf23b3ae62dd9/analysis/
Malwr link: https://malwr.com/analysis/ZGRlYzU5MDFiZWJjNDljOGI2ZDVlMjU4YjliYmNlNzU/
POST-INFECTION MALWARE DOWNLOAD 1 OF 2
File name: 5minut1.exe
File size: 751.5 KB ( 769536 bytes )
MD5 hash: 63f9122bfed825396e2ecd3d28022aa6
Detection ratio: 15 / 50
First submission: 2014-04-14 03:12:50 UTC
VirusTotal link: https://www.virustotal.com/en/file/8e2f97907b66028d3c23382f8811d0842b6a556bc118f2ef520e13962d4281f2/analysis/1397445170/
Malwr link: https://malwr.com/analysis/MTg5OTZhYTZhOWRlNDI1NDg2ZGVmYWYxZjgwZWU3NWI/#network
POST-INFECTION MALWARE DOWNLOAD 2 OF 2
File name: 5minut1-second-time.exe
File size: 809.5 KB ( 828944 bytes )
MD5 hash: 45c7fe3c32b71045d02a64cd26464d5f
Detection ratio: 15 / 51
First submission: 2014-04-14 03:33:45 UTC
VirusTotal link: https://www.virustotal.com/en/file/b520e6a8520e0ff02e15176220e0953727bc50d00b42ef0bc39c4de66cf991f2/analysis/
Malwr link: https://malwr.com/analysis/OGQ4N2QxNmYwZTVjNDMwNWFlZGY0M2FhMDE1NjhjZDM/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
- 2014-04-14 01:37:28 UTC - 67.196.3.65:80 - 192.168.204.226:49192 - ET CURRENT_EVENTS Magnitude EK - Landing Page - Java ClassID and 32/32 archive Oct 16 2013
- 2014-04-14 01:37:30 UTC - 67.196.3.65:80 - 192.168.204.226:49193 - ET CURRENT_EVENTS Possible CVE-2013-2551 As seen in SPL2 EK
- 2014-04-14 01:37:32 UTC - 192.168.204.226:49194 - 67.196.3.65:80 - ET CURRENT_EVENTS Possible Magnitude IE EK Payload Nov 8 2013
- 2014-04-14 01:37:32 UTC - 192.168.204.226:49194 - 67.196.3.65:80 - ET CURRENT_EVENTS NeoSploit - TDS
- 2014-04-14 01:37:32 UTC - 67.196.3.65:80 - 192.168.204.226:49194 - ET POLICY PE EXE or DLL Windows file download
- 2014-04-14 01:37:32 UTC - 67.196.3.65:80 - 192.168.204.226:49194 - ET MALWARE Possible Windows executable sent when remote host claims to send html content
- 2014-04-14 01:37:33 UTC - 67.196.3.65:80 - 192.168.204.226:49194 - ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
- 2014-04-14 01:37:46 UTC - 192.168.204.226:49196 - 87.224.219.174:80 - ET INFO Exectuable Download from dotted-quad Host
- 2014-04-14 01:37:47 UTC - 87.224.219.174:80 - 192.168.204.226:49196 - ET TROJAN Suspicious double Server Header
- 2014-04-14 01:37:47 UTC - 87.224.219.174:80 - 192.168.204.226:49196 - ET POLICY PE EXE or DLL Windows file download
- 2014-04-14 01:37:47 UTC - 87.224.219.174:80 - 192.168.204.226:49196 - ET INFO EXE Download With Content Type Specified As Empty
- 2014-04-14 01:37:47 UTC - 87.224.219.174:80 - 192.168.204.226:49196 - ET TROJAN Possible Kelihos Infection Executable Download With Malformed Header
- 2014-04-14 01:37:47 UTC - 87.224.219.174:80 - 192.168.204.226:49196 - ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
- 2014-04-14 01:37:52 UTC - 89.215.196.42:80 - 192.168.204.226:49201 - ET TROJAN Suspicious double Server Header
- 2014-04-14 01:37:52 UTC - 89.215.196.42:80 - 192.168.204.226:49201 - ET POLICY PE EXE or DLL Windows file download
- 2014-04-14 01:37:52 UTC - 89.215.196.42:80 - 192.168.204.226:49201 - ET TROJAN Possible Kelihos Infection Executable Download With Malformed Header
- 2014-04-14 01:37:52 UTC - 89.215.196.42:80 - 192.168.204.226:49201 - ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
- 2014-04-14 01:38:13 UTC - 192.168.204.226:49217 - 79.142.66.240:80 - ET TROJAN Simda.C Checkin
- 2014-04-14 01:39:11 UTC - 91.220.131.58:80 - 192.168.204.226:49246 - ET POLICY PE EXE or DLL Windows file download
- 2014-04-14 01:39:11 UTC - 91.220.131.58:80 - 192.168.204.226:49246 - ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
- 2014-04-14 01:40:19 UTC - 192.168.204.226:49284 - 115.165.252.67:80 - ET TROJAN Win32/Kelihos.F Checkin
- 2014-04-14 01:53:59 UTC - 192.168.204.226:50471 - 185.13.32.67:80 - ET TROJAN W32/Neverquest.InfoStealer Configuration Request CnC Beacon
HIGHLIGHTS FROM THE TRAFFIC
Embedded iframe in the infected web page:
First redirect:
Second redirect:
Magnitude EK delivers CVE-2013-2551 MSIE exploit:
First of six EXE payloads (the rest are sent in a similar manner):
The malware included cryptolocker-style ransomware. It created the following icons on my desktop--I've opened the text file for this screen shot:
Follow the link:
And here's the ransom web page telling me how I can recover my files:
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-04-14-Magnitude-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-14-Magnitude-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.