2014-05-13 - NUCLEAR EK FROM 37.157.250.10 - FULL.409CREMATE.COM
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-05-13-Nuclear-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-13-Nuclear-EK-malware.zip
NOTES:
- This is another ad-related redirect to Nuclear EK, very similar to my previous blog entry on 2014-05-08.
- The patterns in the traffic are nearly identical.
- Don't let the fake browser update page fool you... Nuclear EK traffic is happening behind the scenes!
CHAIN OF EVENTS
FAKE IE UPDATE PAGE AND REDIRECTS:
- 04:06:16 UTC - 174.37.212.117 - gin.mapdiv.net - GET /sd/apps/fusionx/0.0.4.html?aff=2040-2041
- 04:06:16 UTC - 174.37.212.117 - gin.mapdiv.net - GET /sd/apps/fusionx/0.0.4.js
- 04:06:16 UTC - 54.236.193.179 - ad.convfunnel.com - GET /fusionx/www/delivery/afr.php?zoneid=1225&cb=79576211594
- 04:06:16 UTC - 54.236.193.179 - ad.convfunnel.com - GET /fusionx/www/delivery/lg.php?bannerid=2091&[long string of characters]
- 04:06:16 UTC - 54.236.193.179 - ad.convfunnel.com - GET /fusionx/www/delivery/ck.php?oaparams=2__bannerid=2091[long string of characters]
- 04:06:17 UTC - 78.47.182.238 - faint.healthylivingclinics.com - GET /assets/js/jquery-1.4.4.min.js?ver=1.78.4939
NUCLEAR EK:
- 04:06:19 UTC - 37.157.250.10 - full.409cremate.com - GET /3/i8br0r6g3w0o3dh9hu5fq2rp.html
- 04:06:34 UTC - 37.157.250.10 - full.409cremate.com - GET /786849417/3/1399932900.jar
- 04:06:34 UTC - 37.157.250.10 - full.409cremate.com - GET /f/3/1399932900/786849417/2
- 04:06:35 UTC - 37.157.250.10 - full.409cremate.com - GET /f/3/1399932900/786849417/2/2
POST-INFECTION CALLBACK:
- 04:07:11 UTC - 108.61.152.106 - group.aggipulla.com - POST /en/language.php
PRELIMINARY MALWARE ANALYSIS
JAVA EXPLOIT:
File name: 2014-05-13-Nuclear-EK-java-exploit.jar
File size: 12.7 KB ( 12955 bytes )
MD5 hash: 92aa1ca351c9ada3a219cd8c9c91ba24
Detection ratio: 4 / 51
First submission: 2014-05-12 13:13:38 UTC
VirusTotal link: https://www.virustotal.com/en/file/0a629bb1a66fc3527d979df4229cb0f3c308543398e99033845d6a807be6c791/analysis/
MALWARE PAYLOAD:
File name: 2014-05-13-Nuclear-EK-malware-payload.exe
File size: 79.0 KB ( 80896 bytes )
MD5 hash: b58e69c9d3887b3665339eab4b9cfd36
Detection ratio: 5 / 52
First submission: 2014-05-13 04:22:26 UTC
VirusTotal link: https://www.virustotal.com/en/file/b3a9a97024c37222b76602f5f732f8dd822071049dfceb10e046cb83ef529724/analysis/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
- 2014-05-13 04:06:19 UTC - 37.157.250.10:80 - 192.168.204.195:49186 - ET CURRENT_EVENTS DRIVEBY Nuclear EK Landing May 05 2014 (sid:2018451)
- 2014-05-13 04:06:34 UTC - 192.168.204.195:49194 - 37.157.250.10:80 - ET POLICY Vulnerable Java Version 1.7.x Detected (sid:2014297)
- 2014-05-13 04:06:34 UTC - 192.168.204.195:49194 - 37.157.250.10:80 - ET CURRENT_EVENTS Nuclear EK JAR URI Struct Nov 05 2013 (sid:2017666)
- 2014-05-13 04:06:34 UTC - 37.157.250.10:80 - 192.168.204.195:49194 - ET CURRENT_EVENTS Hostile _dsgweed.class JAR exploit (sid:2018031)
- 2014-05-13 04:06:34 UTC - 37.157.250.10:80 - 192.168.204.195:49194 - ET INFO JAVA - Java Archive Download By Vulnerable Client (sid:2014473)
- 2014-05-13 04:06:34 UTC - 192.168.204.195:49194 - 37.157.250.10:80 - ET CURRENT_EVENTS Nuclear EK Payload URI Struct Nov 05 2013 Nov 05 2013 (sid:2017667)
- 2014-05-13 04:06:35 UTC - 37.157.250.10:80 - 192.168.204.195:49194 - ET POLICY PE EXE or DLL Windows file download (sid:2000419)
- 2014-05-13 04:06:35 UTC - 37.157.250.10:80 - 192.168.204.195:49194 - ET INFO EXE - Served Inline HTTP (sid:2014519)
- 2014-05-13 04:06:35 UTC - 37.157.250.10:80 - 192.168.204.195:49194 - ET CURRENT_EVENTS Blackhole Exploit Kit Delivering Executable to Client (sid:2013962)
- 2014-05-13 04:06:35 UTC - 37.157.250.10:80 - 192.168.204.195:49194 - ET POLICY Java EXE Download (sid:2013037)
- 2014-05-13 04:06:35 UTC - 37.157.250.10:80 - 192.168.204.195:49194 - ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby (sid:2013036)
- 2014-05-13 04:06:35 UTC - 37.157.250.10:80 - 192.168.204.195:49194 - ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) (sid:2015744)
- 2014-05-13 04:07:11 UTC - 192.168.204.195:49198 - 108.61.152.106:80 - ET TROJAN Fareit/Pony Downloader Checkin 2 (sid:2014411)
HIGHLIGHTS FROM 2014-05-08 TRAFFIC
gin.mapdiv.net - GET /sd/apps/fusionx/0.0.4.html?aff=2040-2041
gin.mapdiv.net - GET /sd/apps/fusionx/0.0.4.js -- obfuscated javascript points to ad.convfunnel.com
ad.convfunnel.com - GET /fusionx/www/delivery/afr.php?zoneid=1225&cb=79576211594 -- iframe points to faint.healthylivingclinics.com
faint.healthylivingclinics.com - GET /assets/js/jquery-1.4.4.min.js?ver=1.78.4939 -- another iframe points to Nuclear EK
Nuclear EK sends Java exploit:
Malware payload after successful Java exploit:
Post-infection callback traffic, ET TROJAN Fareit/Pony Downloader Checkin 2:
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-05-13-Nuclear-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-13-Nuclear-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.