2014-05-06 - FLASHPACK EK FROM 89.121.252.70 - LCHHMBA.COM
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-05-06-FlashPack-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-06-FlashPack-EK-malware.zip
PREVIOUS FLASHPACK EK TRAFFIC ON THIS BLOG:
- 2014-03-29 FlashPack EK from 31.31.196.12 - fm.gen.tr
- 2014-04-03 FlashPack EK from 78.157.209.194 - forexforum.gen.tr
- 2014-04-12 FlashPack EK from 176.102.37.55 - kliftpres.com
- 2014-04-13 FlashPack EK from 176.102.37.55 - weoikcus.org
- 2014-04-17 FlashPack EK from 178.33.85.108 - gecekiyafetleri.gen.tr
- 2014-05-06 FlashPack EK from 89.121.252.70 - lchhmba.com
CHAIN OF EVENTS
FLASHPACK EK:
- 05:34:59 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /index.php?c=cHVobXVsa2Y9bnYmdGltZT0xNDA1MDYwNDQ2MTE1Nzg2MDc0NyZzcm
M9MTc2JnN1cmw9d3d3LnRvbGx5d29vZC5uZXQmc3BvcnQ9ODAma2V5PTU1QTRENzQ2JnN1cmk9Lw== - 05:35:00 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /favicon.ico
- 05:35:00 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw517653bf85b673be642451e29219fd2fd.lchhmba.com - GET /index2.php
- 05:35:01 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw517653bf85b673be642451e29219fd2fd.lchhmba.com - GET /favicon.ico
- 05:35:02 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/allow.php
- 05:35:02 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/js/pd.php?id=357463713179797a6579386b61666471316e6d76717477
3531373635336266383562363733626536343234353165323932313966643266642e6c6368686d62612e636f6d - 05:35:04 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - POST /tresting/avalonr/json.php (application/x-www-form-urlencoded)
- 05:35:05 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/msie.php
- 05:35:05 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/silver.php
- 05:35:05 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/javadb.php
- 05:35:05 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/flash2014.php
- 05:35:05 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/include/ba1993db48c5677b5ef9b9b59885e573.eot
- 05:35:07 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/include/ff28ee9d59d6f49ac7bec1d70b0e0688.eot
- 05:35:08 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/loadsilver.php
- 05:35:15 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/include/cdc7118beea93333dd84394740de6b79.jar
- 05:35:15 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/include/cdc7118beea93333dd84394740de6b79.jar
- 05:35:17 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /tresting/avalonr/loaddb.php
- 05:36:10 UTC - 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com - GET /software.php?05060536576195906
POST-INFECTION TRAFFIC:
- 05:35:21 UTC - 5.77.49.215 port 61107 - GET /stat?uid=100&downlink=1111&uplink=1111&id=002502BE&statpass=bpass&version=20140506&features=30i
&guid=99734915-aab3-4673-bce4-7a80112a56f6&comment=20140506&p=0&s= - 05:35:21 UTC - 5.77.49.215 port 31562 - Glupteba-style callback traffic
- 05:38:00 UTC - 173.194.116.179 - www.google.com - GET /robots.txt
- 05:38:01 UTC - 174.143.144.69 port 25 - GET /
- 05:38:03 UTC - 173.194.116.176 - www.google.com - GET /robots.txt
- 05:38:01 UTC - 174.143.144.69 port 25 - GET /
PRELIMINARY MALWARE ANALYSIS
JAVA EXPLOIT
File name: 2014-05-06-FlashPack-EK-java-exploit.jar
File size: 10.2 KB ( 10408 bytes )
MD5 hash: ad97fb241a7f8ec33d36a7735e5693d7
Detection ratio: 5 / 52
First submission: 2014-05-06 05:54:17 UTC
VirusTotal link: https://www.virustotal.com/en/file/35e59f62804e8fe688c6536ce0007f7cf8b65dc7924fc6531b6b5d87603664f1/analysis/
SILVERLIGHT EXPLOIT (SENT AS FIRST .EOT FILE)
File name: 2014-05-06-FlashPack-EK-silverlight-exploit.xap
File size: 21.8 KB ( 22319 bytes )
MD5 hash: 0fdf64c3cdd5d592fdb357fbba5efeec
Detection ratio: 30 / 52
First submission: 2014-03-13 18:36:49 UTC
VirusTotal link: https://www.virustotal.com/en/file/119fdd3aa3154ce53e8df0dcebfb9469fced6c76c1668cb0d8a1f98106a5ea98/analysis/
FIRST MALWARE FILE NOTED (SENT AS SECOND .EOT FILE)
File name: 2014-05-06-FlashPack-EK-malware-01.dll
File size: 13.0 KB ( 13312 bytes )
MD5 hash: 2ecd2f198f4c2ef219c7c20f07213c1a
Detection ratio: 3 / 52
First submission: 2014-05-06 05:58:35 UTC
VirusTotal link: https://www.virustotal.com/en/file/9481f5aef96d811fd497bc9cfd579419bec035771c0ffc181f794dd9fabb819d/analysis/
Malwr link: https://malwr.com/analysis/YjUyYzM5NmYyYzMzNGIxYWJhMDg2ZDNjNGViMTkxYzE/
MALWARE PAYLOAD
File name: 2014-05-06-FlashPack-EK-malware-payload.exe
File size: 104.4 KB ( 106937 bytes )
MD5 hash: 4e59aff2917f5185573624260853d73d
Detection ratio: 4 / 52
First submission: 2014-05-06 05:55:14 UTC
VirusTotal link: https://www.virustotal.com/en/file/b18b10d43482e1eae6c51fab4c15b42e76a72555f3545a3412a2b69c217e08cf/analysis/
Malwr link: https://malwr.com/analysis/ZDMxMjk3ZWFhYjRkNGFkMmE2ODdhMTk4ZDE0MWU1ODg/
LAST MALWARE DOWNLOADED
File name: 2014-05-06-FlashPack-EK-post-infection-malware.exe
File size: 149.9 KB ( 153510 bytes )
MD5 hash: a3cfa670cd32cce347cea317f5c23f89
Detection ratio: 11 / 52
First submission: 2014-05-06 05:59:20 UTC
VirusTotal link: https://www.virustotal.com/en/file/d6d701353be6799ff518f6f3bde9edb3304d688341f854705af10b5024f0fc79/analysis/
Malwr link: https://malwr.com/analysis/YjgxZjUzODM4YzNjNDg3OTg4YzAwNjJlOWU1N2M5YWQ/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
- 2014-05-06 05:34:59 UTC - 192.168.204.194:49203 - 89.121.252.70:80 - ET CURRENT_EVENTS Cushion Redirection
- 2014-05-06 05:35:00 UTC - 192.168.204.194:57167 - 192.168.204.2:53 - ET TROJAN Linux/Onimiki DNS trojan activity long format (Inbound)
- 014-05-06 05:35:00 UTC - 192.168.204.194:57167 - 192.168.204.2:53 - ET TROJAN Linux/Onimiki DNS trojan activity long format (Outbound)
- 2014-05-06 05:35:04 UTC - 89.121.252.70:80 - 192.168.204.194:49203 - ET INFO JAVA - ClassID
- 2014-05-06 05:35:05 UTC - 192.168.204.194:49207 - 89.121.252.70:80 - ET CURRENT_EVENTS Possible Safe/CritX/FlashPack Common Filename javadb.php
- 2014-05-06 05:35:05 UTC - 192.168.204.194:49208 - 89.121.252.70:80 - ET CURRENT_EVENTS Magnitude EK (formerly Popads) - Font Exploit - 32HexChar.eot
- 2014-05-06 05:35:05 UTC - 89.121.252.70:80 - 192.168.204.194:49207 - ET CURRENT_EVENTS Possible JavaFX Click To Run Bypass 2
- 2014-05-06 05:35:05 UTC - 89.121.252.70:80 - 192.168.204.194:49206 - ET CURRENT_EVENTS CritX/SafePack/FlashPack SilverLight Secondary Landing
- 2014-05-06 05:35:08 UTC - 192.168.204.194:49209 - 89.121.252.70:80 - ET CURRENT_EVENTS Safe/CritX/FlashPack SilverLight Payload
- 2014-05-06 05:35:09 UTC - 89.121.252.70:80 - 192.168.204.194:49209 - ET POLICY PE EXE or DLL Windows file download
- 2014-05-06 05:35:09 UTC - 89.121.252.70:80 - 192.168.204.194:49209 - ET INFO EXE - Served Inline HTTP
- 2014-05-06 05:35:09 UTC - 89.121.252.70:80 - 192.168.204.194:49209 - ET CURRENT_EVENTS Possible CritX/SafePack/FlashPack EXE Download
- 2014-05-06 05:35:15 UTC - 192.168.204.194:49210 - 89.121.252.70:80 - ET POLICY Vulnerable Java Version 1.7.x Detected
- 2014-05-06 05:35:15 UTC - 192.168.204.194:49210 - 89.121.252.70:80 - ET CURRENT_EVENTS Nuclear/Safe/CritX/FlashPack - Java Request - 32char hex-ascii
- 2014-05-06 05:35:16 UTC - 89.121.252.70:80 - 192.168.204.194:49211 - ET INFO JAR Size Under 30K Size - Potentially Hostile
- 2014-05-06 05:35:16 UTC - 89.121.252.70:80 - 192.168.204.194:49211 - ET INFO JAVA - Java Archive Download By Vulnerable Client
- 2014-05-06 05:35:17 UTC - 89.121.252.70 :80- 192.168.204.194:49210 - ET POLICY Java EXE Download
- 2014-05-06 05:35:17 UTC - 89.121.252.70:80 - 192.168.204.194:49210 - ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby
- 2014-05-06 05:35:21 UTC - 192.168.204.194:49212 - 5.77.49.215:61107 - ET TROJAN Win32/Glupteba CnC Checkin
- 2014-05-06 05:36:27 UTC - 192.168.204.194:49232 - 195.2.253.38:80 - ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-05-06-FlashPack-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-06-FlashPack-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.