2014-05-26 - NUCLEAR EK FROM 192.243.115.146 - B631C84CiWS0DL.TEMENOPBG.RU & 3655320711-4.TEMENOPBG.RU
PCAP AND MALWARE:
- ZIP of the PCAP: 2014-05-26-Nuclear-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-26-Nuclear-EK-malware.zip
SIMILAR BLOG ENTRIES:
- 2014-05-08 - Nuclear EK from 146.0.43.86 - denounce.verybutts.com - Original referer: asrv-a.akamaihd.net/sd/apps/fusionx/0.0.4.html?aff=1800-1005
- 2014-05-13 - Nuclear EK from 37.157.250.10 - full.409cremate.com - Original referer: gin.mapdiv.net/sd/apps/fusionx/0.0.4.html?aff=2040-2041
- 2014-05-16 - Nuclear EK from 37.157.250.13 - hospitality.medicalbodydonations.org - Original referer: gop.findopt.net/sd/apps/fusionx/0.0.4.html?aff=2040-2141
- 2014-05-26 - Nuclear EK from 192.243.115.146 - b631c84ciws0dl.temenopbg.ru & 3655320711-4.temenopbg.ru - Original referer: same as above
NOTES:
- Was curious if these ad URLs still generate Nuclear EK traffic, so I checked the last one from 2014-05-16, and it did.
- The infection chain remains the same as my previous entries (see above section), but the domain names have changed.
- Post-infection traffic shows callback requests similar to Asprox botnet malware.
CHAIN OF EVENTS
FAKE IE UPDATE PAGE AND REDIRECTS:
- 02:39:41 UTC - 174.37.233.13 - gop.findopt.net - GET /sd/apps/fusionx/0.0.4.html?aff=2040-2141
- 02:39:41 UTC - 174.37.233.13 - gop.findopt.net - GET /sd/apps/fusionx/0.0.4.js
- 02:39:41 UTC - 54.86.231.28 - www.ybpassbacks.com - GET /fusionx/www/delivery/afr.php?zoneid=1786&cb=23912495981
- 02:39:41 UTC - 54.86.231.28 - www.ybpassbacks.com - GET /fusionx/www/delivery/lg.php?bannerid=2091&[long string of characters]
- 02:39:42 UTC - 54.86.231.28 - www.ybpassbacks.com - GET /fusionx/www/delivery/ck.php?oaparams=2__bannerid=2091[long string of characters]
- 02:39:42 UTC - 78.47.182.238 - aus.lewisvilleoverheadgaragedoor.com - GET /assets/js/jquery-1.4.4.min.js?ver=2.8.1899
NUCLEAR EK:
- 02:39:44 UTC - 192.243.115.146 - b631c84ciws0dl.temenopbg.ru - GET /
- 02:40:05 UTC - 192.243.115.146 - 3655320711-4.temenopbg.ru - GET /1401051000.jar
- 02:40:06 UTC - 192.243.115.146 - 3655320711-4.temenopbg.ru - GET /f/1401051000/2
- 02:40:08 UTC - 192.243.115.146 - 3655320711-4.temenopbg.ru - GET /f/1401051000/2/2
POST-INFECTION CALLBACK FROM SECOND MALWARE PAYLOAD:
- 02:40:13 UTC - 114.37.97.60 - preluner-ter.com - GET /b/shoe/1480
- 02:40:20 UTC - 46.187.117.175 - tarbus-coteh.com - GET /com-phocaguestbook-php-q98.74/jquery/
- 02:41:38 UTC - 46.187.117.175 - tarbus-coteh.com - GET /com-uniterevolution-php-k69.65/soft64.dll
- 02:41:50 UTC - 76.127.161.112 - joye-luck.com - GET /b/eve/9e781ccf2ba9ee5e1846b066
- 02:42:43 UTC - 37.193.48.182 - joye-luck.com - POST /b/opt/6C0CC1D2A568ED7E10B91FEF
- 02:42:44 UTC - 37.193.48.182 - joye-luck.com - GET /b/letr/D7E89B1575FCFF1DC02D0D8C
- 02:42:45 UTC - 37.193.48.182 - joye-luck.com - POST /b/opt/8A22A0C6C71ACA0772CB3896
- 02:43:02 UTC - 37.193.48.182 - joye-luck.com - POST /b/req/2AEF0C2480BCA34F356D51DE
- 02:43:23 UTC - 37.193.48.182 - joye-luck.com - POST /b/req/28A9983B549858CCE149AA5D
CLICK FRAUD TRAFFIC BEGINS:
- 02:43:24 UTC - 192.162.19.34 - username-search.com - GET /
- 02:43:24 UTC - 192.162.19.34 - perimeter-search.com - GET /
- 02:43:24 UTC - 192.162.19.34 - forest-search.com - GET /
- 02:43:24 UTC - 192.162.19.34 - documents-search.com - GET /
- 02:43:24 UTC - 192.162.19.34 - country-search.com - GET /
- 02:43:24 UTC - 192.162.19.34 - travels-search.com - GET /
- 02:43:24 UTC - 192.162.19.34 - travels-search.com - GET /
- 02:43:24 UTC - 192.162.19.34 - blues-search.com - GET /
- 02:43:24 UTC - 192.162.19.34 - blues-search.com - GET /
- 02:43:24 UTC - 192.162.19.34 - ecored-search.com - GET /
- 02:43:25 UTC - 192.162.19.34 - companies-search.com - GET /
ADDITIONAL NOTES:
- Saw the following DNS query that didn't resolve:
- 02:40:19 UTC - Standard query 0x02be A avenue.GROWERDIRECTROSES.COM
- 02:40:19 UTC - Standard query response 0x02be No such name
- Malwr.com analysis of the second malware payload shows the same DNS query, but it also shows the following traffic HTTP:
- 208.115.105.47 - cats.GROWERDIRECTROSES.COM - POST /es/break.php
PRELIMINARY MALWARE ANALYSIS
JAVA EXPLOIT
File name: 2014-05-26-Nuclear-EK-java-exploit.jar
File size: 10.2 KB ( 10419 bytes )
MD5 hash: 443ce6291f701418353db118f6d08d27
Detection ratio: 0 / 52
First submission: 2014-05-26 03:36:36 UTC
VirusTotal link: https://www.virustotal.com/en/file/b9eecbf110a75906eb89cb276edfe4ff731a889866849aafd43b9de84cf06e2d/analysis/
MALWARE PAYLOAD 1 OF 2
File name: 2014-05-26-Nuclear-EK-malware-payload-01.exe
File size: 208.7 KB ( 213736 bytes )
MD5 hash: a929660981a45d8c349df13727ccd807
Detection ratio: 3 / 52
First submission: 2014-05-26 03:37:01 UTC
VirusTotal link: https://www.virustotal.com/en/file/a13a3362eab8fd1c24aad3c187cff0442a7230d518bf28c39e78fca7d691e78f/analysis/
Malwr link: https://malwr.com/analysis/NGM1NmNhNmJmMTkxNDk5Y2E1YWM3Y2M5ODVlOWNlMDI/
MALWARE PAYLOAD 2 OF 2
File name: 2014-05-26-Nuclear-EK-malware-payload-02.exe
File size: 181.5 KB ( 185856 bytes )
MD5 hash: 6d9fd705920d01fa643b40512436f1aa
Detection ratio: 4 / 53
First submission: 2014-05-26 03:42:39 UTC
VirusTotal link: https://www.virustotal.com/en/file/4ee55d2ff5ab6b27bd89524e8d53948ab31ccc2be9776bc6e5b8bb2c22a4bee5/analysis/
Malwr link: https://malwr.com/analysis/MzNlMWQ3OTMxZjY0NDNiNGI3YWNhYmI0MTQwNjhlMWM/
POST-INFECTION MALWARE DOWNLOADED
File name: UpdateFlashPlayer_070536b5.exe
File size: 198.3 KB ( 203065 bytes )
MD5 hash: e9897f59508fe11860a749c46114a27a
Detection ratio: 10 / 52
First submission: 2014-05-26 03:43:45 UTC
VirusTotal link: https://www.virustotal.com/en/file/5d3a3a48fe63445305fe8fd2151cd53f6411b54298bf51d86e54afe2648ce8cb/analysis/
Malwr link: https://malwr.com/analysis/MzExY2I0ZmIyMTQzNDcwYTg3YjM5ZTRjM2Q2YzllNjQ/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion):
Emerging Threats ruleset
- 2014-05-26 02:39:42 UTC - 192.168.204.229:50736 - 78.47.182.238:80 - ET CURRENT_EVENTS Possible Malvertising Redirect URI Struct (sid:2018454)
- 2014-05-26 02:40:05 UTC - 192.168.204.229:50756 - 192.243.115.146:80 - ET CURRENT_EVENTS Java UA Requesting Numeric.ext From Base Dir (Observed in Redkit/Sakura) (sid:2017199)
- 2014-05-26 02:40:05 UTC - 192.168.204.229:50756 - 192.243.115.146:80 - ET CURRENT_EVENTS Nuclear EK JAR URI Struct Nov 05 2013 (sid:2017666)
- 2014-05-26 02:40:05 UTC - 192.168.204.229:50756 - 192.243.115.146:80 - ET CURRENT_EVENTS FlimKit Jar URI Struct (sid:2017152)
- 2014-05-26 02:40:06 UTC - 192.243.115.146:80 - 192.168.204.229:50756 - ET CURRENT_EVENTS Exploit Kit Delivering JAR Archive to Client (sid:2014526)
- 2014-05-26 02:40:06 UTC - 192.168.204.229:50756 - 192.243.115.146:80 - ET CURRENT_EVENTS Nuclear EK Payload URI Struct Nov 05 2013 (sid:2017667)
- 2014-05-26 02:40:07 UTC - 192.243.115.146:80 - 192.168.204.229:50756 - ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby (sid:2013036)
- 2014-05-26 02:41:50 UTC - 192.168.204.229:49159 - 76.127.161.112:80 - ET TROJAN W32/Asprox.ClickFraudBot CnC Beacon (sid:2018096)
- 2014-05-26 02:41:53 UTC - 76.127.161.112:80 - 192.168.204.229:49159 - ET TROJAN W32/Asprox.ClickFraudBot CnC Beacon Acknowledgement (sid:2018097)
- 2014-05-26 02:42:43 UTC - 192.168.204.229:49161 - 37.193.48.182:80 - ET TROJAN Trojan-Spy.Win32.Zbot.hmcm Checkin (sid:2018437)
- 2014-05-26 02:42:43 UTC - 192.168.204.229:49161 - 37.193.48.182:80 - ET TROJAN W32/Asprox.ClickFraudBot POST CnC Beacon (sid:2018098)
Sourcefire VRT ruleset
- 2014-05-26 02:40:05 UTC - 192.168.204.229:50756 - 192.243.115.146:80 - EXPLOIT-KIT Nuclear exploit kit outbound jar request (sid:30219)
- 2014-05-26 02:40:06 UTC - 192.243.115.146:80 - 192.168.204.229:50756 - EXPLOIT-KIT Multiple exploit kit jar file download attempt (sid:27816)
- 2014-05-26 02:40:06 UTC - 192.168.204.229:50756 - 192.243.115.146:80 - EXPLOIT-KIT Nuclear exploit kit outbound payload request (sid:30220)
- 2014-05-26 02:40:07 UTC - 192.243.115.146:80 - 192.168.204.229:50756 - EXPLOIT-KIT Java User-Agent downloading Portable Executable - Possible exploit kit (sid:25042)
- 2014-05-26 02:40:07 UTC - 192.243.115.146:80 - 192.168.204.229:50756 - EXPLOIT-KIT Multiple exploit kit payload download (sid:28593)
- 2014-05-26 02:40:07 UTC - 192.243.115.146:80 - 192.168.204.229:50756 - EXPLOIT-KIT Multiple exploit kit single digit exe detection (sid:28423)
- 2014-05-26 02:40:20 UTC - 46.187.117.175:80 - 192.168.204.229:50759 - MALWARE-CNC Win.Trojan.Dofoil outbound connection (sid:28809)
- 2014-05-26 02:41:50 UTC - 192.168.204.229:49159 - 76.127.161.112:80 - MALWARE-CNC Win.Trojan.Cidox variant outbound connection (sid:29356)
FINAL NOTES
Once again, here are the associated files:
- ZIP of the PCAP: 2014-05-26-Nuclear-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-26-Nuclear-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.