2014-04-26 - MAGNITUDE EK FROM 193.169.245.5 - FEELCHIPS.IN
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-04-26-Magnitude-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-26-Magnitude-EK-malware.zip
NOTES:
- The last few days, I've found several fake Flash player updates as noted in my previous entry on 2014-04-24.
- Those fake Flash updates are part of a campaign that was noted as early as January 2014 in this article.
- Here's a partial list of what I found:
- Date - original referer --> fake flash updater notice --> domain that hosted the malware
- 2014-04-25 - comersid.ro --> baysidebb.com.au --> 6crjjq.bl3301.livefilestore.com
- 2014-04-25 - www.prochiavari.it --> www.federicomodica.com --> 6crjjq.bl3302.livefilestore.com
- 2014-04-25 - www.ed-fotografie.de --> www.anlccosenza.it --> 6crjjq.bl3301.livefilestore.com
- 2014-04-26 - www.studentenpand.be --> gradebookportal.com --> xmdrlq.dm1.livefilestore.com
- 2014-04-26 - clubdelneon.com.ar --> alabdallab.com --> xmdrlq.dm2301.livefilestore.com
- 2014-04-26 - www.landestrachtenverband.at --> www.loseucaliptuschiloe.com --> xmdrlq.dm2301.livefilestore.com
- 2014-04-26 - citymath.fr --> amplicraft.com --> xmdrlq.dm2303.livefilestore.com
- 2014-04-26 - www.colorspectrum.cz --> wap.garrypoker.cz --> xmdrlq.dm1.livefilestore.com
- After all that fake Flash update traffic, I finally found an actual exploit kit today.
CHAIN OF EVENTS
ASSOCIATED DOMAINS
- 178.21.169.82 - www.digital-media.gr - Compromised website
- 89.184.72.70 - galleya.com.ua - Redirect
- 193.169.245.5 - 2decc.1a9d.d3.f93b0bf.a9c.efe7f.64f6d5.yfbxhpbig.feelchips.in - Magnitude EK
- 109.86.83.167 - older-hiuwm.com - Post-infection callback
- 79.142.66.240 - report.17931g93a79eiqgm.com - Post-infection callback
- 5.164.40.2 - quarante-ml.com - Post-infection callback
COMPROMISED WEBSITE AND REDIRECTS
- 07:12:38 UTC - www.digital-media.gr - GET /
- 07:12:41 UTC - www.digital-media.gr - GET /swfobject.js
- 07:12:43 UTC - galleya.com.ua - GET /yrgthxfy.php?id=304626
- 07:12:43 UTC - galleya.com.ua - GET /yrgthxfy.php?id=304622
MAGNITUDE EK
- 07:12:43 UTC - 2decc.1a9d.d3.f93b0bf.a9c.efe7f.64f6d5.yfbxhpbig.feelchips.in GET /
- 07:12:45 UTC - 2decc.1a9d.d3.f93b0bf.a9c.efe7f.64f6d5.yfbxhpbig.feelchips.in GET /9666ec95e9d939aba1367181dd1c93c3/5e2b5821aaa1e224f55f4160ce16fa78
- 07:12:47 UTC - 193.169.245.5 - GET /?e3ca2f78c6cf89bcaa0d04dc85c7efb4
- 07:12:50 UTC - 193.169.245.5 - GET /?864bb4527ac991e207f476eb7f2c6d44
- 07:12:50 UTC - 193.169.245.5 - GET /?7d4c70e7a48d43bd003173c503b036d1
- 07:12:51 UTC - 193.169.245.5 - GET /?8d0913063b9f4e6ef29680ed76d3e9cd
- 07:12:52 UTC - 193.169.245.5 - GET /?b2da7f57547f78af1a84380a22de31a4
- 07:12:53 UTC - 193.169.245.5 - GET /?27d6715c764ba44ae31bde35089356b2
POST-INFECTION CALLBACK TRAFFIC
- 07:12:52 UTC - older-hiuwm.com - GET /b/shoe/749634
- 07:12:50 UTC - report.17931g93a79eiqgm.com - GET /?SKUO20=%96%C7%D5%9F%D7[long string of characters]
- 07:12:53 UTC - quarante-ml.com - GET /nivoslider98.45/jquery/
- 07:12:54 UTC - quarante-ml.com - GET /nivoslider98.45/jquery/
- 07:13:00 UTC - quarante-ml.com - GET /nivoslider98.45/jquery/
- 07:13:00 UTC - quarante-ml.com - GET /nivoslider98.45/jquery/
- 07:13:01 UTC - quarante-ml.com - GET /nivoslider98.45/jquery/
- 07:13:01 UTC - quarante-ml.com - GET /nivoslider98.45/jquery/
- 07:13:07 UTC - quarante-ml.com - GET /nivoslider98.45/jquery/
- 07:13:09 UTC - quarante-ml.com - GET /nivoslider98.45/jquery/
- 07:13:24 UTC - quarante-ml.com - GET /nivoslider98.45/jquery/ [constantly repeats]
PRELIMINARY MALWARE ANALYSIS
MALWARE PAYLOAD 1 OF 4
File name: 2014-04-26-Magnitude-EK-malware-payload-01.exe
File size: 1.0 MB ( 1061376 bytes )
MD5 hash: 985f91d442f1f42dea39e4dde3eb15c9
Detection ratio: 11 / 51
First submission: 2014-04-26 08:20:52 UTC
VirusTotal link: https://www.virustotal.com/en/file/c465d198ddfddffb1285150b6ebeaf776ec17e7eb07a70a8e48e59d6f86b1c0a/analysis/
Malwr link: https://malwr.com/submission/status/NWU0NTQxZGUwNTA1NDBmMjkzNzc5NDBkYjk3NDM1Yjc/
NOTE: Malwr's analysis was still pending several hours later, the last time I checked
MALWARE PAYLOAD 2 OF 4
File name: 2014-04-26-Magnitude-EK-malware-payload-02.exe
File size: 128.0 KB ( 131076 bytes )
MD5 hash: 048220fb83e77d675b99ad29f9d21d52
Detection ratio: 2 / 51
First submission: 2014-04-26 07:59:09 UTC
VirusTotal link: https://www.virustotal.com/en/file/6ca9dad5b86940f33c51b67d9f39889eec914f318b700b44d877e77be15c787f/analysis/
Malwr link: https://malwr.com/submission/status/MDljNWQ5OTA1N2IxNDZiNmExMWY4YWM3MWY4YWUzZGM/
NOTE: Malwr's analysis was still pending several hours later, the last time I checked
MALWARE PAYLOAD 3 OF 4
File name: 2014-04-26-Magnitude-EK-malware-payload-03.exe
File size: 144.0 KB ( 147456 bytes )
MD5 hash: 5c6654c44a6a4463448861a37c9a39f1
Detection ratio: 2 / 51
First submission: 2014-04-26 08:02:38 UTC
VirusTotal link: https://www.virustotal.com/en/file/19efeae3a2ce5ce89c588996a6964f66388bf0cc3b6080506ba29c435b1b9354/analysis/
Malwr link: https://malwr.com/submission/status/MzUxZjdiNmEyOTU5NDc4ZTg5ZjQ4NGRlYWMyZDhiMDI/
NOTE: Malwr's analysis was still pending several hours later, the last time I checked
MALWARE PAYLOAD 4 OF 4
File name: 2014-04-26-Magnitude-EK-malware-payload-04.exe
File size: 389.2 KB ( 398529 bytes )
MD5 hash: ae4cc42547a9961bf235c0e5f7e3c6f5
Detection ratio: 8 / 51
First submission: 2014-04-26 06:33:09 UTC
VirusTotal link: https://www.virustotal.com/en/file/2140c49421afcf8c5016f0887e47820ba877be305ab5bfec922b5fb6ef460542/analysis/
Malwr link: https://malwr.com/submission/status/NTkzZmE2ZWExMjQ5NDZkNzk1YmQxZjM5ZDAyOGY1NTU/
NOTE: Malwr's analysis was still pending several hours later, the last time I checked
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
- 2014-04-26 07:12:44 UTC - 193.169.245.5:80 - 192.168.204.230:51507 - ET CURRENT_EVENTS Magnitude EK - Landing Page - Java ClassID and 32/32 archive Oct 16 2013
- 2014-04-26 07:12:45 UTC - 193.169.245.5:80 - 192.168.204.230:51508 - ET CURRENT_EVENTS Possible CVE-2013-2551 As seen in SPL2 EK
- 2014-04-26 07:12:47 UTC - 192.168.204.230:51509 - 193.169.245.5:80 - ET CURRENT_EVENTS Possible Magnitude IE EK Payload Nov 8 2013
- 2014-04-26 07:12:47 UTC - 192.168.204.230:51509 - 193.169.245.5:80 - ET CURRENT_EVENTS NeoSploit - TDS
- 2014-04-26 07:12:47 UTC - 193.169.245.5:80 - 192.168.204.230:51509 - ET POLICY PE EXE or DLL Windows file download
- 2014-04-26 07:12:47 UTC - 193.169.245.5:80 - 192.168.204.230:51509 - ET MALWARE Possible Windows executable sent when remote host claims to send html content
- 2014-04-26 07:12:49 UTC - 193.169.245.5:80 - 192.168.204.230:51509 - ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
- 2014-04-26 07:12:50 UTC - 192.168.204.230:51510 - 79.142.66.240:80 - ET TROJAN Simda.C Checkin
- 2014-04-26 07:12:53 UTC - 193.169.245.5:80 - 192.168.204.230:51516 - ET INFO Packed Executable Download
HIGHLIGHTS FROM THE TRAFFIC
Malicious javascript appended to the compromised website's index page:
And similar javascript appended to the one of the site's javascript files:
The first redirect pointing to Magnitude EK:
Magnitude EK landing page:
Magnitude EK sending MSIE exploit CVE-2013-2551:
First HTTP GET request for malware after a successful CVE-2013-2551 exploit:
NOTE: Of the six HTTP GET requests for a payload, only four returned malware.
Post-infection malware callback to report.17931g93a79eiqgm.com:
Post-infection malware callback to older-hiuwm.com:
Post-infection malware callback to quarante-ml.com:
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-04-26-Magnitude-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-26-Magnitude-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.