2014-05-19 - FAKE FLASH UPDATER HOSTED ON DL.DROPBOXUSERCONTENT.COM
ASSOCIATED FILES:
- ZIP of the PCAPs: 2014-05-19-fake-Flash-updater-pcaps.zip
- ZIP of the malware: 2014-05-19-fake-Flash-updater-malware.zip
NOTES:
- I first noticed this fake Flash updater reported in January 2014 on news.softpedia.com (link).
- Since 2014-04-24, I started documenting whenenever I ran into this fake Flash updater traffic.
- Until recent days, I've only seen this on Microsft OneDrive, but now it's moved.
- Today, the fake Flash updater is hosted on a DropBox account.
BLOG ENTRIES SINCE I STARTED KEEPING TRACK:
- 2014-04-24 - fake Flash update from 217.26.210.127 (www.wizardcomputers.rs) points to malware on Microsoft OneDrive IP
- 2014-04-28 - fake Flash updater hosted on Microsoft OneDrive IP addresses
- 2014-04-29 - Today's fake Flash updater hosted on Microsoft OneDrive
- 2014-05-03 - Another fake Flash updater hosted on Microsoft OneDrive
- 2014-05-11 - Today's fake Flash updater hosted on Microsoft OneDrive
- 2014-05-14 - Today's fake Flash updater hosted on Microsoft OneDrive
- 2014-05-17 - fake Flash updater hosted on 23.91.112.4 - preud-homme.be
- 2014-05-19 - fake Flash updater hosted on dl.dropboxusercontent.com
TODAY'S TRAFFIC EXAMPLES
compromised website --> fake Flash updater notice --> site hosting the malware
vexpress.com.ar --> www.gesic.clt --> dl.dropboxusercontent.com
- 2014-05-19 20:39:29 UTC - 172.16.223.131:49166 200.58.126.139:80 - fvexpress.com.ar - GET /contacto.html
- 2014-05-19 20:39:30 UTC - 172.16.223.131:49166 200.58.126.139:80 - fvexpress.com.ar - GET /Scripts/AC_RunActiveContent.js
- 2014-05-19 20:39:30 UTC - 172.16.223.131:49170 200.58.126.139:80 - fvexpress.com.ar - GET /Scripts/AC_ActiveX.js
- 2014-05-19 20:39:30 UTC - 172.16.223.131:49173 200.111.67.70:80 - www.gesic.cl - GET /Connections/RvtMN6Qj.php?id=16152324
- 2014-05-19 20:39:31 UTC - 172.16.223.131:49173 200.111.67.70:80 - www.gesic.cl - GET /Connections/RvtMN6Qj.php?id=16152330
- 2014-05-19 20:39:32 UTC - 172.16.223.131:49173 200.111.67.70:80 - www.gesic.cl - GET /Connections/RvtMN6Qj.php?id=16152329
- 2014-05-19 20:39:35 UTC - 172.16.223.131:49173 200.111.67.70:80 - www.gesic.cl - GET /Connections/RvtMN6Qj.php?html=27
- 2014-05-19 20:39:36 UTC - 172.16.223.131:49173 200.111.67.70:80 - www.gesic.cl - GET /Connections/checker.php [repeats several times]
- 2014-05-19 20:39:43 UTC - 172.16.223.131:49179 23.21.86.153:443 - https://dl.dropboxusercontent.com/u/10631615/InstallerFlash.exe
compromised website --> fake Flash updater notice --> site hosting the malware
www.knottednest.ca --> smartcup.com --> dl.dropboxusercontent.com
- 2014-05-19 20:40:54 UTC - 172.16.223.131:49186 209.236.72.177:80 - www.knottednest.ca - GET /
- 2014-05-19 20:40:55 UTC - 172.16.223.131:49192 70.32.68.115:80 - smartcup.com - GET /KNTbfxQ4.php?id=13830896
- 2014-05-19 20:40:55 UTC - 172.16.223.131:49192 70.32.68.115:80 - smartcup.com - GET /KNTbfxQ4.php?html=27
- 2014-05-19 20:40:56 UTC - 172.16.223.131:49192 70.32.68.115:80 - smartcup.com - GET /checker.php [repeats several times]
- 2014-05-19 20:41:27 UTC - 172.16.223.131:49195 54.225.136.69:443 - https://dl.dropboxusercontent.com/u/10631615/InstallerFlash.exe
compromised website --> fake Flash updater notice --> site hosting the malware
www.jmnrwec.edu.in --> 97.74.250.91 --> dl.dropboxusercontent.com
- 2014-05-19 20:45:38 UTC - 172.16.223.131:49254 198.1.64.67 :80 - www.jmnrwec.edu.in - GET /BMC/
- 2014-05-19 20:45:38 UTC - 172.16.223.131:49257 97.74.250.91:80 - 97.74.250.91 - GET /jobs/zphdP4Jt.php?id=9625030
- 2014-05-19 20:45:39 UTC - 172.16.223.131:49257 97.74.250.91:80 - 97.74.250.91 - GET /jobs/zphdP4Jt.php?html=27
- 2014-05-19 20:45:40 UTC - 172.16.223.131:49257 97.74.250.91:80 - 97.74.250.91 - GET /jobs/checker.php [repeats several times]
- 2014-05-19 20:45:44 UTC - 172.16.223.131:49261 50.16.243.219:443 - https://dl.dropboxusercontent.com/u/10631615/InstallerFlash.exe
TRAFFIC FROM FAKE FLASH UPDATER INFECTING A VM
The sandbox analysis on Malwr.com didn't show any post-infection traffic, so I ran the malware in a VM and got the following:
- 2014-05-19 23:53:08 UTC - 172.16.223.131:49421 - 193.105.210.32:80 - domaintomakeit.com - POST /unecheitd/8732593/index.php
- 2014-05-19 23:53:09 UTC - 172.16.223.131:49422 - 23.91.112.4:80 - preud-homme.be - GET /agivenlike.exe
- 2014-05-19 23:53:09 UTC - 172.16.223.131:49423 - 23.91.112.4:80 - preud-homme.be - GET /yoshowstra.exe
- 2014-05-19 23:53:09 UTC - 172.16.223.131:49424 - 23.91.112.4:80 - preud-homme.be - GET /griyeacomours.exe
- 2014-05-19 23:54:02 UTC - 172.16.223.131:49426 - 176.193.212.55:80 - mitger-qaser.com - GET /b/shoe/54607 [Repeats several times]
- 2014-05-19 23:54:51 UTC - 172.16.223.131:49433 - 212.92.187.130:80 - king-jinert.com - GET /com-phocaguestbook/jquery/ [Repeats several times]
- 2014-05-19 23:57:26 UTC - 172.16.223.131:49464 - 212.92.187.130:80 - king-jinert.com - GET /com-phocaguestbook/ajax/ [Repeats several times]
PRELIMINARY MALWARE ANALYSIS
FAKE FLASH UPDATER
File name: InstallerFlash.exe
File size: 216.3 KB ( 221528 bytes )
MD5 hash: 7f97715f36faee799ced8bf5b5e6bcf7
Detection ratio: 3 / 52
First submission: 2014-05-19 12:19:49 UTC
VirusTotal link: https://www.virustotal.com/en/file/d9b17c9384504806425c33f010dcb91dd98161ab2f6e043beda13d55a15c0ebf/analysis/
Malwr link: https://malwr.com/analysis/M2ZiMDNmYjdlYjI4NDg0YWExMDRmYjA2NzdkN2NhNGE/
FOLLOW-UP MALWARE 1 OF 3
File name: agivenlike.exe
File size: 153.5 KB ( 157192 bytes )
MD5 hash: 76cc6e8d38dc4dd7fe7c39d5e6d6347c
Detection ratio: 1 / 52
First submission: 2014-05-20 01:01:40 UTC
VirusTotal link: https://www.virustotal.com/en/file/18513e3f4cedc1905c176c7c09b8654c9b2f964fe1f07a605f8676b7e994a601/analysis/
Malwr link: https://malwr.com/submission/status/Zjk2MDkwOGMwYjJlNDI0Mjk0YjVkNWI3YWVkZGU5NjI/ (analysis pending)
FOLLOW-UP MALWARE 2 OF 3
File name: griyeacomours.exe
File size: 138.5 KB ( 141836 bytes )
MD5 hash: e8ef066c0428f73a070cf9a5bcdfba1b
Detection ratio: 1 / 52
First submission: 2014-05-20 01:10:44 UTC
VirusTotal link: https://www.virustotal.com/en/file/8b7bd426585a9b9d114ce9f474d35c5fc6b95f094f0affbbf059199577cc371f/analysis/
Malwr link: https://malwr.com/submission/status/MzIzY2RiM2ZlNzM4NDhlNmIwYjhlYTlmZDhlYjMxOTk/ (analysis pending)
FOLLOW-UP MALWARE 3 OF 3
File name: yoshowstra.exe
File size: 514.0 KB ( 526336 bytes )
MD5 hash: 23dc2c46bd7f94703390bdee9bd4a8a2
Detection ratio: 9 / 52
First submission: 2014-05-20 01:11:11 UTC
VirusTotal link: https://www.virustotal.com/en/file/89e1d05560f606ed74f061df6aa86f44d3bbe13d827ad6fb314023bf8a7acd77/analysis/
Malwr link: https://malwr.com/analysis/NTVkMDIxNzhiNzEwNDc0ZmJmZTIxODAwNzRiMGI4NjQ/
SNORT EVENTS
PRE-INFECTION EVENTS:
- ET CURRENT EVENTS Malicious Redirect 8x8 script tag (sid:2018053)
- ET POLICY DropBox User Content Access over SSL (sid:2017015)
EVENTS SEEN FROM RUNNING THE MALWARE IN A VM (monitored by Security Onion):
Emerging Threats ruleset:
- 2014-05-19 23:53:08 UTC - 172.16.223.131:49421 - 193.105.210.32:80 - ET TROJAN Fareit/Pony Downloader Checkin 2 (sid:2014411)
- 2014-05-19 23:53:09 UTC - 172.16.223.131:49422 - 23.91.112.4:80 - ET TROJAN Possible Graftor EXE Download Common Header Order (sid:2018254)
- 2014-05-19 23:53:09 UTC - 172.16.223.131:49423 - 23.91.112.4:80 - ET TROJAN Possible Graftor EXE Download Common Header Order (sid:2018254)
- 2014-05-19 23:53:09 UTC - 172.16.223.131:49424 - 23.91.112.4:80 - ET TROJAN Possible Graftor EXE Download Common Header Order (sid:2018254)
Sourcefire VRT ruleset:
- 2014-05-19 23:53:08 UTC - 172.16.223.131:49421 - 193.105.210.32:80 - MALWARE-CNC Win.Trojan.Zeus encrypted POST Data exfiltration (sid:27919)
- 2014-05-19 23:53:09 UTC - 172.16.223.131:49422 - 23.91.112.4:80 - MALWARE-CNC Win.Trojan.Zeus variant outbound connection (sid:27918)
- 2014-05-19 23:53:09 UTC - 172.16.223.131:49423 - 23.91.112.4:80 - MALWARE-CNC Win.Trojan.Zeus variant outbound connection (sid:27918)
- 2014-05-19 23:53:09 UTC - 172.16.223.131:49424 - 23.91.112.4:80 - MALWARE-CNC Win.Trojan.Zeus variant outbound connection (sid:27918)
- 2014-05-19 23:53:51 UTC - 172.16.223.131:49425 - 5.149.255.138:53 - MALWARE-CNC Win.Trojan.Bunitu variant outbound connection (sid:28996)
- 2014-05-19 23:57:59 UTC - 172.16.223.131:49472 - 5.149.255.138:53 - MALWARE-CNC Win.Trojan.Bunitu variant outbound connection (sid:28996)
HIGHLIGHTS FROM THE TRAFFIC
Taken from the last example--from the comrpomised website to the fake Flash updater notification:
From the initial URL of the fake Flash updater notification to the next URL in the chain of events:
The fake Flash updater notification javascript that contains links to the malware in the DropBox account:
FINAL NOTES
Once again, here are links for the associated files:
- ZIP of the PCAPs: 2014-05-19-fake-Flash-updater-pcaps.zip
- ZIP of the malware: 2014-05-19-fake-Flash-updater-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.