2014-05-09 - FIESTA EK FROM - 205.234.214.168 - 9XGERH0.DIMATUR.PT
ASSOCIATED FILES:
- ZIP of the PCAPs: 2014-05-09-Fiesta-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-09-Fiesta-EK-malware.zip
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 107.6.132.155 - www.dressupgames.com - Comrpomised website
- 81.176.226.166 - matrica.aktivator.biz - First redirect
- 141.101.116.168 - fakal.info - Second redirect (Flash-based)
- 141.101.116.172 - rewol.info - Last redirect
- 205.234.214.168 - 9xgerh0.dimatur.pt - Fiesta EK
- 195.2.253.38 - 195.2.253.38 - Post-infection callback
COMPROMISED WEBSITE AND REDIRECTS:
- 04:39:13 UTC - www.dressupgames.com - GET /celebrities/hipster-barbie-dress-up-game-10507.html
- 04:39:14 UTC - www.dressupgames.com - GET /assets/javascript/dug-javascript.js
- 04:39:15 UTC - matrica.aktivator.biz - GET /j.php?i
- 04:39:16 UTC - fakal.info - GET /swfeasy/banner.swf
- 04:39:16 UTC - fakal.info - GET /swfeasy/banner.swf?cid=lbo4kf4kh6kbbfoo854o2dp9a7
- 04:39:16 UTC - rewol.info - GET /adv.php?cid=lbo4kf4kh6kbbfoo854o2dp9a7
FIESTA EK:
- 04:39:17 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/2
- 04:39:18 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/24f639f17d382e3f4143000d010255090701510d075b560a07075055065b5107;118800;94
- 04:39:18 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/2d8bf0ab72921b965b015459540b525a07510f595252515907570e0153525654
- 04:39:19 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/03a623dca3e19829435f170d0008575b0506560d065154580500575507515355;4060531
- 04:39:22 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/25b7f06df12728fa5145090c540b055c0700550c5252065f0706545453520153;4
- 04:39:22 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/25b7f06df12728fa5145090c540b055c0700550c5252065f0706545453520153;4;1
- 04:39:23 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/17af8d5d8620186c52470a5d0a5f065c0402565d0c06055f040457050d060252;6
- 04:39:24 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/17af8d5d8620186c52470a5d0a5f065c0402565d0c06055f040457050d060252;6;1
- 04:39:34 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/145e4aaa8620186c52445e5e065a52590401025e0003515a0407030601035657;5
- 04:39:35 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/145e4aaa8620186c52445e5e065a52590401025e0003515a0407030601035657;5;1
- 04:39:35 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/19cca5a1259ee80a504b0258530e5209040c54585557510a040a550054575607
- 04:39:36 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/480661094d2b27ca5740550d040a0301010d070d02530002010b06550353070f;1;2
- 04:39:36 UTC - 9xgerh0.dimatur.pt - GET /0vzh954/480661094d2b27ca5740550d040a0301010d070d02530002010b06550353070f;1;2;1
POST-INFECTION CALLBACK:
- 04:39:35 UTC - 195.2.253.38 - POST /
PRELIMINARY MALWARE ANALYSIS
JAVA EXPLOIT
File name: 2014-05-09-Fiesta-EK-java-exploit.jar
File size: 4.7 KB ( 4841 bytes )
MD5 hash: cf6f537855ae300c490cf8287cf73f60
Detection ratio: 5 / 52
First submission: 2014-05-08 02:16:07 UTC
VirusTotal link: https://www.virustotal.com/en/file/efa0080779a5218db2529203716c8e95a811e5f4c4e468184b9e0e7f45875ae6/analysis/
SILVERLIGHT EXPLOIT
File name: 2014-05-09-Fiesta-EK-silverlight-exploit.xap
File size: 5.2 KB ( 5335 bytes )
MD5 hash: 6ecac70fe1a8202709168802b8af3831
Detection ratio: 0 / 52
First submission: 2014-05-09 07:14:33 UTC
VirusTotal link: https://www.virustotal.com/en/file/18c4d378473ac1e5f97f467eac5efd20069fe378b6b916e439bb600ca9a734ea/analysis/
FLASH EXPLOIT
File name: 2014-05-09-Fiesta-EK-flash-exploit.swf
File size: 9.8 KB ( 10037 bytes )
MD5 hash: 044cbfdd392380c696c06e7e6cdbc4f6
Detection ratio: 0 / 52
First submission: 2014-05-08 15:28:42 UTC
VirusTotal link: https://www.virustotal.com/en/file/bcbabb7d8ae512ff3f8e8e986e698c8f96b8988397f172bc7c934ae559638b78/analysis/
File name: 2014-05-09-Fiesta-EK-flash-exploit-uncompressed.swf
File size: c94e253db4ecbdea4f03667b3d11b360
MD5 hash: 15.1 KB ( 15473 bytes )
Detection ratio: 0 / 52
First submission: 2014-05-09 07:15:06 UTC
VirusTotal link: https://www.virustotal.com/en/file/ef22d0f8d90f43e02bd53e5b059754dce650493b15b2549dfcd37a7b42539760/analysis/
MALWARE PAYLOAD
File name: 2014-05-09-Fiesta-EK-malware-payload.exe
File size:
MD5 hash:
Detection ratio:
First submission:
VirusTotal link: https://www.virustotal.com/en/file/403a8e164843314f87f1514f7037ea5138d685cfbea5144e13c7edfbacea73ee/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
- 2014-05-09 04:39:15 UTC - 192.168.204.232:49183 - 107.6.132.155:80 - ET POLICY Outdated Windows Flash Version IE
- 2014-05-09 04:39:18 UTC - 192.168.204.232:49191 - 205.234.214.168:80 - ET CURRENT_EVENTS Fiesta URI Struct
- 2014-05-09 04:39:18 UTC - 205.234.214.168:80 - 192.168.204.232:49191 - ET CURRENT_EVENTS Fiesta Flash Exploit Download
- 2014-05-09 04:39:19 UTC - 205.234.214.168:80 - 192.168.204.232:49193 - ET CURRENT_EVENTS Fiesta SilverLight Exploit Download
- 2014-05-09 04:39:35 UTC - 192.168.204.232:49202 - 205.234.214.168:80 - ET POLICY Vulnerable Java Version 1.6.x Detected
- 2014-05-09 04:39:35 UTC - 192.168.204.232:49202 - 205.234.214.168:80 - ET CURRENT_EVENTS Unknown - Java Request - gt 60char hex-ascii
- 2014-05-09 04:39:35 UTC - 205.234.214.168:80 - 192.168.204.232:49202 - ET CURRENT_EVENTS Exploit Kit Delivering JAR Archive to Client
- 2014-05-09 04:39:35 UTC - 205.234.214.168:80 - 192.168.204.232:49202 - ET CURRENT_EVENTS Possible Fiesta Jar with four-letter class names
- 2014-05-09 04:39:35 UTC - 205.234.214.168:80 - 192.168.204.232:49202 - ET INFO JAVA - Java Archive Download By Vulnerable Client
- 2014-05-09 04:39:35 UTC - 192.168.204.232:49200 - 195.2.253.38:80 - ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
PATH FROM COMPROMISED WEBSITE TO FIESTA EK DOMAIN
From www.dressupgames.com/celebrities/hipster-barbie-dress-up-game-10507.html to www.dressupgames.com/assets/javascript/dug-javascript.js
From www.dressupgames.com/assets/javascript/dug-javascript.js to matrica.aktivator.biz/j.php?i
From matrica.aktivator.biz/j.php?i to fakal.info/swfeasy/banner.swf
From fakal.info/swfeasy/banner.swf?cid=lbo4kf4kh6kbbfoo854o2dp9a7 to rewol.info/adv.php?cid=lbo4kf4kh6kbbfoo854o2dp9a7
NOTE: This is a Flash ad-based redirect.
From rewol.info/adv.php?cid=lbo4kf4kh6kbbfoo854o2dp9a7 to 9xgerh0.dimatur.pt/0vzh954/2
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAPs: 2014-05-09-Fiesta-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-09-Fiesta-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.