2014-05-16 - NUCLEAR EK FROM 37.157.250.13 - HOSPITALITY.MEDICALBODYDONATIONS.ORG
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-05-16-Nuclear-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-16-Nuclear-EK-malware.zip
SIMILAR BLOG ENTRIES:
- 2014-05-08 - Nuclear EK from 146.0.43.86 - denounce.verybutts.com - Original referer: 209.8.115.80 - asrv-a.akamaihd.net/sd/apps/fusionx/0.0.4.html?aff=1800-1005
- 2014-05-13 - Nuclear EK from 37.157.250.10 - full.409cremate.com - Original referer: 174.37.212.117 - gin.mapdiv.net/sd/apps/fusionx/0.0.4.html?aff=2040-2041
- 2014-05-16 - Nuclear EK from 37.157.250.13 - hospitality.medicalbodydonations.org - Original referer: 174.37.212.117 - gop.findopt.net/sd/apps/fusionx/0.0.4.html?aff=2040-2141
NOTES:
- This is another ad-related redirect to Nuclear EK, very similar to my previous blog entries listed above.
- The patterns in the traffic are nearly identical.
- As always, don't let the browser update page fool you... Nuclear EK traffic is happening behind the scenes!
CHAIN OF EVENTS
FAKE IE UPDATE PAGE AND REDIRECTS:
- 19:29:11 UTC - 174.37.212.117 - gop.findopt.net - GET /sd/apps/fusionx/0.0.4.html?aff=2040-2141
- 19:29:11 UTC - 174.37.212.117 - gop.findopt.net - GET /sd/apps/fusionx/0.0.4.js
- 19:29:11 UTC - 107.23.131.125 - ad.convfunnel.com - GET /fusionx/www/delivery/afr.php?zoneid=1786&cb=16000418092
- 19:29:11 UTC - 107.23.131.125 - ad.convfunnel.com - GET /fusionx/www/delivery/lg.php?bannerid=2091&[long string of characters]
- 19:29:11 UTC - 107.23.131.125 - ad.convfunnel.com - GET /fusionx/www/delivery/ck.php?oaparams=2__bannerid=2091[long string of characters]
- 19:29:11 UTC - 78.47.182.238 - hbomb.agentlyusedhomestore.com - GET /assets/js/jquery-1.4.4.min.js?ver=4.47.5038
NUCLEAR EK:
- 19:29:13 UTC - 37.157.250.13 - hospitality.medicalbodydonations.org - GET /3/wa3jf3oy8y0b9l3uc2r1c7w2gq.html
- 19:29:23 UTC - 37.157.250.13 - hospitality.medicalbodydonations.org - GET /2101209192/3/1400247480.jar
- 19:29:23 UTC - 37.157.250.13 - hospitality.medicalbodydonations.org - GET /2101209192/3/1400247480.jar
- 19:29:24 UTC - 37.157.250.13 - hospitality.medicalbodydonations.org - GET /f/3/1400247480/2101209192/2
- 19:29:25 UTC - 37.157.250.13 - hospitality.medicalbodydonations.org - GET /2101209192/3/1400247480.htm
- 19:29:25 UTC - 37.157.250.13 - hospitality.medicalbodydonations.org - GET /f/3/1400247480/2101209192/2/2
- 19:29:27 UTC - 37.157.250.13 - hospitality.medicalbodydonations.org - GET /f/3/1400247480/2101209192/5
POST-INFECTION CALLBACK FROM SECOND MALWARE PAYLOAD:
- 19:29:58 UTC - 108.61.152.115 - free.charliebever.com - POST /en/language.php
NOTES:
- The first malware payload didn't do anything in my infected VM. Malwr.com's sandbox analysis (link) shows what would've happened.
- It's the same type of click-fraud trojan I've documented before in recent Rig EK traffic on 2014-05-07.
- The callback traffic to molinaderrec.com shown below has previously triggered the following events:
- ET TROJAN W32/Asprox.ClickFraudBot CnC Beacon (sid:2018096)
- ET TROJAN W32/Asprox.ClickFraudBot CnC Beacon Acknowledgement (sid:2018097)
- ET TROJAN W32/Asprox.ClickFraudBot POST CnC Beacon (sid:2018098)
- ET TROJAN Trojan-Spy.Win32.Zbot.hmcm Checkin (sid:2018437)
- Similar post-infection traffic can be found in previous blog entries on 2014-05-07 (Rig EK), 2014-05-08 (Nuclear EK) and 2014-05-12 (Fiesta EK).
HTTP GET REQUESTS FROM MALWR.COM ANALYSIS OF FIRST MALWARE PAYLOAD:
- 22:04:58 UTC - 176.109.191.91 - mix-juert.com - GET /b/shoe/1480
- 22:05:00 UTC - 108.53.38.131 - phil-comfo.com - GET /comphocaguestbook-e18.90/jquery/
- 22:05:47 UTC - 91.200.201.12 - phil-comfo.com - GET /comuniterevolution-l12.87/soft32.dll
- 22:05:52 UTC - 91.244.140.40 - molinaderrec.com - GET /b/eve/7477ad6e7f46f29b700dfbf2
- 22:06:51 UTC - 91.244.140.40 - molinaderrec.com - POST /b/opt/6BE668E13DDE88FA36EFD70F
- 22:06:51 UTC - 91.244.140.40 - molinaderrec.com - GET /b/letr/FA044F8DAD88891FA6B9D6EA
- 22:06:52 UTC - 91.244.140.40 - molinaderrec.com - POST /b/opt/98969B19E3AF49C3E89E1636
- 22:07:09 UTC - 91.244.140.40 - molinaderrec.com - POST /b/req/183A0A7F73B55E8478840171
- 22:07:30 UTC - 91.244.140.40 - molinaderrec.com - POST /b/req/BA869CD55FCFB82B54FEE7DE
- 22:07:32 UTC - 192.162.19.34 - phantom-search.com - GET /
- 22:07:32 UTC - 192.162.19.34 - helped-search.com - GET /
- 22:07:32 UTC - 192.162.19.34 - phantom-search.com - GET /style.css
- 22:07:32 UTC - 192.162.19.34 - thousands-search.com - GET /
- 22:07:33 UTC - 192.162.19.34 - phantom-search.com - GET /btn_search.png
- 22:07:33 UTC - 192.162.19.34 - helped-search.com - GET /style.css
- 22:07:33 UTC - 192.162.19.34 - thousands-search.com - GET /style.css
- 22:07:33 UTC - 192.162.19.34 - phantom-search.com - GET /icon_serch.png
- 22:07:33 UTC - 192.162.19.34 - phantom-search.com - GET /logo.png
- 22:07:33 UTC - 192.162.19.34 - helped-search.com - GET /btn_search.png
- 22:07:33 UTC - 192.162.19.34 - thousands-search.com - GET /btn_search.png
- 22:07:33 UTC - 192.162.19.34 - helped-search.com - GET /logo.png
- 22:07:33 UTC - 192.162.19.34 - helped-search.com - GET /icon_serch.png
- 22:07:33 UTC - 192.162.19.34 - thousands-search.com - GET /logo.png
- 22:07:33 UTC - 192.162.19.34 - thousands-search.com - GET /icon_serch.png
- 22:07:41 UTC - 46.244.10.228 - fats-cats.com - GET /b/pkg/T3080tqcmjym7r7
- 22:07:41 UTC - 46.244.10.228 - fats-cats.com - GET /b/pkg/T3080zaa9xqcu3e
- 22:07:42 UTC - 46.244.10.228 - fats-cats.com - GET /b/pkg/T3080lrrrczzgkj
- 22:07:42 UTC - 5.149.251.53 - 5.149.251.53 - GET /clk.php?z=eAEVzEFqwzAQR[long string of characters]
- 22:07:42 UTC - 5.149.251.53 - 5.149.251.53 - GET /clk.php?z=eAEVjs1qxDAMh[long string of characters]
- 22:07:42 UTC - 216.172.63.56 - 216.172.63.56 - GET /feed-w7/click?aff=10108&saff=0&cid=01c4bf8ed0b7a1c67477e4ce362b2af2
- 22:07:42 UTC - 88.214.241.53 - flyclick.biz - GET /click?app=app37&click=[long string of characters]
- 22:07:42 UTC - 216.172.54.27 - 216.172.54.27 - GET /feed/go.php?id=16673f[long string of characters]
- 22:07:44 UTC - 173.239.42.219 - xml.boomerangmediaservices.com - GET /click?i=AAZpBZlmMl0_0
- 22:07:44 UTC - 173.239.42.220 - xml.primusad.com - GET /click?i=TKOg3SBOd*g_0
- 22:07:45 UTC - 173.239.42.220 - filter.primusad.com - GET /filter?q=car+daytona+loan+new&i=TKOg3SBOd*g_0&t=207453515
- 22:07:45 UTC - 173.239.36.122 - xml.plusfind.net - GET /click?i=29jNBwqwvsU_0
- 22:07:46 UTC - 162.159.244.18 - www.hollywoodobsessed.com - GET /?utm_source=[long string of characters]
- 22:07:47 UTC - 70.42.254.214 - click.accoona.com - GET /r1.php?h=2cd67cc381b8[long string of characters]
- 22:07:47 UTC - 162.159.244.18 - www.hollywoodobsessed.com - GET /wp-content/plugins/[several different GET requests caused the original page]
- 22:07:47 UTC - 70.42.254.214 - click.accoona.com - GET /r2.php?h=2cd67cc3[long string of characters]
- 22:07:48 UTC - 70.42.254.214 - 7230.click.accoona.com - GET /cad.php?utm_source=7230&[long string of characters]
- 22:07:48 UTC - 173.194.65.95 - fonts.googleapis.com - GET /css?family=Oswald:400,700
- 22:07:49 UTC - 5.152.178.88 - 5.152.178.88 - GET /go.php?s=7
- 22:07:51 UTC - 91.244.140.40 - molinaderrec.com - POST /b/opt/D768FB52E7449C31EC75C3C4
- 22:07:53 UTC - 54.230.15.42 - dtym7iokkjlif.cloudfront.net - GET /media/js/jquery.shareaholic-publishers-sb.min.js?ver=6.1.5.1
PRELIMINARY MALWARE ANALYSIS
JAVA EXPLOIT (PROBABLY CVE-2012-1723):
File name: 2014-05-16-Nuclear-EK-java-exploit.jar
File size: 18.1 KB ( 18559 bytes )
MD5 hash: 785ab9c37cabcc12ac63b68dfbbcb4f8
Detection ratio: 6 / 52
First submission: 2014-05-16 21:26:46 UTC
VirusTotal link: https://www.virustotal.com/en/file/995daaef46943b0a97f4b610c95ff3641bcab05d2e32486e3b0852c4a09618c4/analysis/
FIRST MALWARE PAYLOAD:
File name: 2014-05-16-Nuclear-EK-malware-payload-01.exe
File size: 138.0 KB ( 141312 bytes )
MD5 hash: fa0f8efcc88449e77d192d16146fcf1e
Detection ratio: 1 / 53
First submission: 2014-05-16 21:27:03 UTC
VirusTotal link: https://www.virustotal.com/en/file/e01053c8ab57e484fbabcd032d594183af377cc4ba98e3f245e26875e5d8306f/analysis/
Malwr link: https://malwr.com/analysis/MDIzZTkwZmFkZjVmNDI2YWEzNWVjMGExODU3MzMwOGE/
SECOND MALWARE PAYLOAD:
File name: 2014-05-16-Nuclear-EK-malware-payload-02.exe
File size: 131.5 KB ( 134656 bytes )
MD5 hash: 0da2099e51e4712042e6c837170eb631
Detection ratio: 2 / 53
First submission: 2014-05-16 21:27:26 UTC
VirusTotal link: https://www.virustotal.com/en/file/821d6301728763570cf0fc060b552a67ac95a9871bf34197f02becc13878400f/analysis/
Malwr link: https://malwr.com/analysis/ZDI2YTdiMGJlMjk1NDRmNzkzZTk0YWZlNzIyNGRmOWE/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
Sourcefire VRT events:
- 2014-05-16 19:29:23 UTC - 172.16.223.131:49274 - 37.157.250.13:80 - EXPLOIT-KIT Nuclear exploit kit outbound jar request (sid:30219)
- 2014-05-16 19:29:23 UTC - 37.157.250.13:80 - 172.16.223.131:49274 - EXPLOIT-KIT Multiple exploit kit jar file download attempt (sid:27816)
- 2014-05-16 19:29:24 UTC - 172.16.223.131:49274 - 37.157.250.13:80 - EXPLOIT-KIT Nuclear exploit kit outbound payload request (sid:30220)
- 2014-05-16 19:29:24 UTC - 37.157.250.13:80 - 172.16.223.131:49274 - EXPLOIT-KIT Java User-Agent downloading Portable Executable - Possible exploit kit (sid:25042)
- 2014-05-16 19:29:24 UTC - 37.157.250.13:80 - 172.16.223.131:49274 - EXPLOIT-KIT Multiple exploit kit single digit exe detection (sid:28423)
- 2014-05-16 19:29:27 UTC - 37.157.250.13:80 - 172.16.223.131:49265 - EXPLOIT-KIT Multiple exploit kit payload download (sid:28593)
- 2014-05-16 19:29:57 UTC - 172.16.223.131:49278 - 108.61.152.115:80 - MALWARE-CNC Win.Trojan.Zeus encrypted POST Data exfiltration (sid:27919)
Emerging Threats events:
- 2014-05-16 19:29:13 UTC - 37.157.250.13:80 - 172.16.223.131:49265 - ET CURRENT_EVENTS DRIVEBY Nuclear EK Landing May 05 2014 (sid:2018451)
- 2014-05-16 19:29:23 UTC - 172.16.223.131:49274 - 37.157.250.13:80 - ET CURRENT_EVENTS Nuclear EK JAR URI Struct Nov 05 2013 (sid:2017666)
- 2014-05-16 19:29:23 UTC - 37.157.250.13:80 - 172.16.223.131:49274 - ET CURRENT_EVENTS Hostile _dsgweed.class JAR exploit (sid:2018031)
- 2014-05-16 19:29:24 UTC - 172.16.223.131:49274 - 37.157.250.13:80 - ET CURRENT_EVENTS Nuclear EK Payload URI Struct Nov 05 2013 (sid:2017667)
- 2014-05-16 19:29:25 UTC - 37.157.250.13:80 - 172.16.223.131:49274 - ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby (sid:2013036)
- 2014-05-16 19:29:27 UTC - 37.157.250.13:80 - 172.16.223.131:49265 - ET CURRENT_EVENTS Blackhole Exploit Kit Delivering Executable to Client (sid:2013962)
- 2014-05-16 19:29:57 UTC - 172.16.223.131:49278 - 108.61.152.115:80 - ET TROJAN Fareit/Pony Downloader Checkin 2 (sid:2014411)
HIGHLIGHTS FROM 2014-05-08 TRAFFIC
gop.findopt.net - GET /sd/apps/fusionx/0.0.4.html?aff=2040-2141
gop.findopt.net - GET /sd/apps/fusionx/0.0.4.js -- obfuscated javascript points to ad.convfunnel.com
ad.convfunnel.com - GET /fusionx/www/delivery/afr.php?zoneid=1786&cb=16000418092 -- iframe points to hbomb.agentlyusedhomestore.com
hbomb.agentlyusedhomestore.com - GET /assets/js/jquery-1.4.4.min.js?ver=4.47.5038 -- another iframe points to Nuclear EK
Nuclear EK sends Java exploit:
Malware payload after successful Java exploit:
Nuclear EK delivers MSIE exploit CVE-2013-2551:
Malware payload after successful MSIE exploit:
Post-infection callback traffic, ET TROJAN Fareit/Pony Downloader Checkin 2 (Emerging Threats) or MALWARE-CNC Win.Trojan.Zeus encrypted POST Data exfiltration (Sourcefire VRT):
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAP: 2014-05-16-Nuclear-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-16-Nuclear-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.