2014-04-29 - ANGLER EK FROM 66.96.246.151 - UGWPC.BIMOWAMOKYKPPS.NET
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-04-29-Angler-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-29-Angler-EK-malware.zip
NOTES:
Earlier this month on 2014-04-10, this same compromised website generated Nuclear EK traffic. Today, it's Angler EK. Here's the Angler EK traffic I've seen so far:
- 2014-02-26 - Angler EK from 23.239.12.68 - northerningredients.com
- 2014-02-27 - Angler EK from 31.222.178.84:8080 - phisoomythyxiboow.ru
- 2014-03-23 - Angler EK from 78.63.247.153 - e1xguj.makeuhndall.info
- 2014-04-22 - Angler EK from 69.39.239.233 - p1315noprat-wezenlijk.tri-citydrywall.com [!]
- 2014-04-22 - Angler EK from 23.110.194.99 - lampadaryoptimistiselta.particlehero.com
- 2014-04-28 - Angler EK from 85.10.220.153 - xenexo9fj6.fuminexyveqccs.com [!]
- 2014-04-28 - Angler EK from 85.10.220.153 - k615o5ij7f.skwosh.eu
- 2014-04-29 - Angler EK from 66.96.246.151 - ugwpc.bimowamokykpps.net
NOTE: Items marked [!] include other prefixes for the domain name.
CHAIN OF EVENTS
ASSOCIATED DOMAINS
- 192.254.190.230 - troysbilliards.ca - Compromised website
- 146.185.213.69 - ads.hoa.lu - Redirect
- 66.96.246.151 - ugwpc.bimowamokykpps.net - Angler EK
COMPROMISED WEBSITE
- 01:36:42 UTC - 172.16.223.135:50148 - 192.254.190.230:80 - troysbilliards.ca - GET /
REDIRECT CHAIN
- 01:36:44 UTC - 172.16.223.135:50152 - 146.185.213.69:80 - ads.hoa.lu - GET /affiliate.php?pid=8088bf3eb01b2b40a0006cfd4a0b3657
- 01:36:44 UTC - 172.16.223.135:50152 - 146.185.213.69:80 - ads.hoa.lu - GET /
ANGLER EK
- 01:36:45 UTC - 172.16.223.135:50153 - 66.96.246.151:80 - ugwpc.bimowamokykpps.net - GET /1c1k96e6yu
- 01:36:45 UTC - 172.16.223.135:50153 - 66.96.246.151:80 - ugwpc.bimowamokykpps.net - GET /61KjSQH5jGymnuWOKETBFJVOPWJwGYAoaFphGAgjy-1BkAkW
- 01:36:46 UTC - 172.16.223.135:50154 - 66.96.246.151:80 - ugwpc.bimowamokykpps.net - GET /1Q8MmBaKp7fhpiFQ7dXykYosspRAw75_LuzRiAxmGZlDyJ_9
- 01:36:48 UTC - 172.16.223.135:50154 - 66.96.246.151:80 - ugwpc.bimowamokykpps.net - GET /8JCuizE1mccCPzX5pBzjfOUsi091MyTzrUrp2eaa12cprX24
PRELIMINARY MALWARE ANALYSIS
SILVERLIGHT EXPLOIT
File name: 2014-04-29-Angler-EK-silverlight-exploit.xap
File size: 51.8 KB ( 52994 bytes )
MD5 hash: 8c1b2cda4994e251be81ce8f50369e8a
Detection ratio: 0 / 51
First submission: 2014-04-29 02:22:58 UTC
VirusTotal link: https://www.virustotal.com/en/file/2927c0dd524e69c5aa332096d4cb597ad872d3c2b84c5389564997469715c1c2/analysis/
FLASH EXPLOIT
File name: 2014-04-29-Angler-EK-Flash-exploit.swf
File size: 40.4 KB ( 41335 bytes )
MD5 hash: 37401c46cf15d1747aa66c10f8f046e9
Detection ratio: 1 / 50
First submission: 2014-04-29 02:24:15 UTC
VirusTotal link: https://www.virustotal.com/en/file/a7dfd5ae6ae8efec45cf4b0459396994145226ba3828a93f43a13c76257c8147/analysis/
FLASH EXPLOIT UNCOMPRESSED
File name: 2014-04-29-Angler-EK-Flash-exploit-uncompressed.swf
File size: 71.5 KB ( 73264 bytes )
MD5 hash: 535a30968484ee63d8c890f20b237a27
Detection ratio: 1 / 50
First submission: 2014-04-29 02:24:38 UTC
VirusTotal link: https://www.virustotal.com/en/file/c8d254bde552246ae30a90c5075253ca26e0b1fd6ea41cf47891d380bfcfb256/analysis/
MALWARE PAYLOAD
File name: 2014-04-28-Angler-EK-malware-payload.dll
File size: 71.5 KB ( 73216 bytes )
MD5 hash: 58b9821f8667741e816416500dd60e79
Detection ratio: 2 / 51
First submission: 2014-04-29 02:25:29 UTC
VirusTotal link: https://www.virustotal.com/en/file/97df15ec81b84b03b1cf8b3bd4ecae4d84ebffd1f538772e2cb47ffe364b0bd3/analysis/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
- 2014-04-29 01:36:47 UTC - 66.96.246.151:80 - 172.16.223.135:50153 - ET CURRENT_EVENTS Angler EK Landing Apr 14 2014
- 2014-04-29 01:36:47 UTC - 66.96.246.151:80 - 172.16.223.135:50153 - ET CURRENT_EVENTS Possible JavaFX Click To Run Bypass 2
- 2014-04-29 01:36:50 UTC - 66.96.246.151:80 - 172.16.223.135:50154 - ET CURRENT_EVENTS Angler EK encrypted binary (1) Jan 17 2013
HIGHLIGHTS FROM THE TRAFFIC
Javascript from index page of infected website:
Redirect:
Angler EK delivers Flash exploit:
Angler EK delivers Silverlight exploit:
Silverlight exploit delivers malware payload:
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-04-29-Angler-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-04-29-Angler-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.