2014-04-16 - FIESTA EK FROM 64.202.116.158 - CRYRIV.IN.UA - FLASH/SILVERLIGHT/JAVA EXPLOITS
ASSOCIATED FILES:
- ZIP of the PCAPS: 2014-04-16-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-16-Fiesta-EK-malware.zip
NOTES:
- On 2014-04-12 and 2014-04-13, redirects from 190.123.47.198 were pointing to FlashPack (CritX) EK on 176.102.37.55 (Ukraine) with non-Ukrainian domain names.
- Today, the redirect from 190.123.47.198 is back to Fiesta EK on 64.202.0.0/16 (US) with a domain name ending in: .in.ua (Ukraine).
CHAIN OF EVENTS
ASSOCIATED DOMAINS
- 69.167.155.134 - www.excelforum.com - Compromised website
- 190.123.47.198 - valeriesn.com - Redirect
- 64.202.116.158 - cryriv.in.ua - Fiesta EK
- 195.2.253.38 - 195.2.253.38 - Post-infection callback seen
COMPROMISED WEBSITE AND REDIRECT
- 00:46:01 UTC - www.excelforum.com - GET /excel-general/811402-embedding-picture-files-as-pop-ups-inside-excel-files.html
- 00:46:04 UTC - valeriesn.com - GET /wxlsygoq.js?a266b6a0aaf0b76e
FIESTA EK
- 00:46:05 UTC - cryriv.in.ua - GET /s5lrgdj/?2
- 00:46:13 UTC - cryriv.in.ua - GET /s5lrgdj/?3f67561286a18abc4011500c070d0005065f060c015401090655025351040356;119900;170
- 00:46:13 UTC - cryriv.in.ua - GET /s5lrgdj/?04a8d44d58783caa43581703560f0553050d51035056045f0507555c00060600;4050524
- 00:46:14 UTC - cryriv.in.ua - GET /s5lrgdj/?3bfec9f87db9bcef50120d5e5102570f065b565e575b560306515201070b545c;6
- 00:46:15 UTC - cryriv.in.ua - GET /s5lrgdj/?3bfec9f87db9bcef50120d5e5102570f065b565e575b560306515201070b545c;6;1
- 00:46:24 UTC - cryriv.in.ua - GET /s5lrgdj/?799d54157db9bcef5449525f070f00020200095f0156010e020a0d0051060351;5
- 00:46:24 UTC - cryriv.in.ua - GET /s5lrgdj/?799d54157db9bcef5449525f070f00020200095f0156010e020a0d0051060351;5;1
- 00:46:25 UTC - cryriv.in.ua - GET /s5lrgdj/?78113ba6a7496c265d565d0a015950010201010a0700510d020b055557505352
- 00:46:41 UTC - cryriv.in.ua - GET /s5lrgdj/?2b7d398d52f003f75d0d555f01020953075b075f075b085f07510300570b0c55
- 00:46:41 UTC - cryriv.in.ua - GET /s5lrgdj/?2b7d398d52f003f75d0d555f01020953075b075f075b085f07510300570b0c55
- 00:46:41 UTC - cryriv.in.ua - GET /s5lrgdj/?59376732b6b283495641560c040c02050000030c02550309000a075352050156;1;3
- 00:46:43 UTC - cryriv.in.ua - GET /s5lrgdj/?59376732b6b283495641560c040c02050000030c02550309000a075352050156;1;3;1
POST-INFECTION CALLBACK
- 00:47:40 UTC - 195.2.253.38 - POST /
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT - probably CVE-2014-0497
File name: 2014-04-16-Fiesta-EK-flash-exploit.swf
File size: 7.7 KB ( 7864 bytes )
MD5 hash: ff67cea6c9b6a23f34b7f928d7414aae
Detection ratio: 1 / 51
First submission: 2014-04-16 01:42:17 UTC
VirusTotal link: https://www.virustotal.com/en/file/1508ad57405f803fcad9de0bf5c7cd5415597bdea110fa8914002658cb150a36/analysis/
SILVERLIGHT EXPLOIT - probably CVE-2013-0074
File name: 2014-04-11-Fiesta-EK-silverlight-exploit.xap
File size: 5.2 KB ( 5278 bytes )
MD5 hash: 6439eacac11540beea99cc4d8a392c1e
Detection ratio: 0 / 51
First submission: 2014-04-16 01:42:51 UTC
VirusTotal link: https://www.virustotal.com/en/file/a0560d48b65f91bdbff199e97cf6510e56202c11199f537d564ad21bfe068a24/analysis/
JAVA EXPLOIT
File name: 2014-04-11-Fiesta-EK-java-exploit.jar
File size: 7.2 KB ( 7405 bytes )
MD5 hash: 620401f8cf6b042fb7741dd5cb000630
Detection ratio: 1 / 51
First submission: 2014-04-16 01:43:09 UTC
VirusTotal link: https://www.virustotal.com/en/file/2a82e30848dc21557b8ea79b8bd8f35ef4f2294af60b6e8487b7147c94c2c2cb/analysis/
MALWARE PAYLOAD
File name: 2014-04-16-Fiesta-EK-malware-payload.exe
File size: 133.6 KB ( 136852 bytes )
MD5 hash: 58924cfc85ae8f3677311b8b9b2a63d9
Detection ratio: 4 / 51
First submission: 2014-04-16 01:43:37 UTC
VirusTotal link: https://www.virustotal.com/en/file/66a248361750d9723a924bdd8f96dbc3d052c9f6917cc0ed08c4aa6fe78a326a/analysis/
Malwr link: https://malwr.com/analysis/YzYzZjg1YzgwMTNjNDBjMzhhZmFlYjFlZThhNWMzYzA/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
- 2014-04-16 00:46:15 UTC - 172.16.117.133:49578 - 190.123.47.198:80 - ET CURRENT_EVENTS DRIVEBY Redirection - Forum Injection
- 2014-04-16 00:46:15 UTC - 172.16.117.133:49580 - 64.202.116.158:80 - ET CURRENT_EVENTS FiestaEK js-redirect
- 2014-04-16 00:46:15 UTC - 172.16.117.133:49580 - 64.202.116.158:80 - ET CURRENT_EVENTS DRIVEBY Unknown - Landing Page Requested - /?Digit
- 2014-04-16 00:46:23 UTC - 172.16.117.133:49584 - 64.202.116.158:80 - ET CURRENT_EVENTS Potential Fiesta Flash Exploit
- 2014-04-16 00:46:23 UTC - 172.16.117.133:49584 - 64.202.116.158:80 - ET CURRENT_EVENTS Phoenix/Fiesta URI Requested Contains /? and hex
- 2014-04-16 00:46:23 UTC - 64.202.116.158:80 - 172.16.117.133:49584 - ET CURRENT_EVENTS Exploit Kit Delivering Compressed Flash Content to Client
- 2014-04-16 00:46:24 UTC - 64.202.116.158:80 - 172.16.117.133:49585 - ET CURRENT_EVENTS Possible Neutrino/Fiesta SilverLight Exploit March 05 2014 DLL Naming Convention
- 2014-04-16 00:46:36 UTC - 172.16.117.133:49605 - 64.202.116.158:80 - ET POLICY Vulnerable Java Version 1.7.x Detected
- 2014-04-16 00:46:36 UTC - 172.16.117.133:49605 - 64.202.116.158:80 - ET CURRENT_EVENTS Unknown - Java Request - gt 60char hex-ascii
- 2014-04-16 00:46:36 UTC - 64.202.116.158:80 - 172.16.117.133:49605 - ET CURRENT_EVENTS Possible J7u21 click2play bypass
- 2014-04-16 00:46:51 UTC - 64.202.116.158:80 - 172.16.117.133:49618 - ET INFO Java File Sent With X-Powered By HTTP Header - Common In Exploit Kits
- 2014-04-16 00:46:51 UTC - 64.202.116.158:80 - 172.16.117.133:49618 - ET INFO JAVA - Java Archive Download By Vulnerable Client
- 2014-04-16 00:46:51 UTC - 64.202.116.158:80 - 172.16.117.133:49618 - ET CURRENT_EVENTS DRIVEBY Generic - 8Char.JAR Naming Algorithm
- 2014-04-16 00:46:51 UTC - 64.202.116.158:80 - 172.16.117.133:49618 - ET TROJAN Generic - 8Char.JAR Naming Algorithm
- 2014-04-16 00:47:50 UTC - 172.16.117.133:49625 - 195.2.253.38:80 - ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
HIGHLIGHTS FROM THE TRAFFIC
www.excelforum.com (compromised website) to valeriesn.com (redirect):
valeriesn.com (redirect) to cryriv.in.ua (Fiesta EK):
HTTP GET requests for the three exploits seen (Flash, Silverlight, and Java):
HTTP GET requests caused by the three exploits that all delivered the same malware payload:
Post-infection callback traffic seen:
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAPS: 2014-04-16-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-16-Fiesta-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.