2014-05-29 - FLASHPACK EK FROM 37.230.117.89 - FAHHDFG.UYY95.COM
ASSOCIATED FILES:
- ZIP of the PCAP: 2014-05-29-FlashPack-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-29-FlashPack-EK-malware.zip
PREVIOUS FLASHPACK EK TRAFFIC ON THIS BLOG:
- 2014-03-29 - FlashPack EK from 31.31.196.12 - bkapaep35cp5h47qef1lpgl.fm.gen.tr
- 2014-04-03 - FlashPack EK from 78.157.209.194 - dqpo63edlc6eurmpd42wbl9.forexforum.gen.tr
- 2014-04-12 - FlashPack EK from 176.102.37.55 - kliftpres.com
- 2014-04-13 - FlashPack EK from 176.102.37.55 - weoikcus.org
- 2014-04-17 - FlashPack EK from 178.33.85.108 - 9iunfi0idsvtxk4ymdgr9j7.gecekiyafetleri.gen.tr
- 2014-05-06 - FlashPack EK from 89.121.252.70 - 5tcq1yyzey8kafdq1nmvqtw.lchhmba.com
- 2014-05-11 - FlashPack EK from 82.146.41.116 - dg9sdgykl.trade-e.com
- 2014-05-19 - FlashPack EK from 95.154.246.90 - ley9nbu9c4c5r3oie3819it.ns1.bayandovmeci.com
- 2014-05-24 - FlashPack EK from 62.212.128.199 - g07a1kxcnp83x1z21fjvqtw.parfumleri.org
- 2014-05-29 - FlashPack EK from 37.230.117.89 - fahhdfg.uyy95.com
CHAIN OF EVENTS
FAILED INFECTION PATH:
- 05:23:49 UTC - 192.168.204.236:49167 - 202.4.238.2:80 - www.parisi.com.au - GET /
- 05:23:52 UTC - 192.168.204.236:49167 - 202.4.238.2:80 - www.parisi.com.au - GET /js/menu.js
- 05:23:53 UTC - 192.168.204.236:49170 - 37.247.127.133:80 - www.giralweb.com - GET /Gpf7Mgjh.php
- 05:23:53 UTC - 192.168.204.236:49171 - 37.247.121.125:80 - 37.247.121.125 - GET /info.php
SUCCESSFUL INFECTION PATH TO FLASHPACK EK:
- 05:23:49 UTC - 192.168.204.236:49167 - 202.4.238.2:80 - www.parisi.com.au - GET /
- 05:23:54 UTC - 192.168.204.236:49175 - 77.66.47.228:80 - jvstop.com - GET /top
- 05:23:56 UTC - 192.168.204.236:49177 - 37.230.117.89:80 - fahhdfg.uyy95.com - GET /docentx/audit/allow.php
- 05:23:56 UTC - 192.168.204.236:49177 - 37.230.117.89:80 - fahhdfg.uyy95.com - GET /docentx/audit/js/pd.php?id=7061726973692e636f6d2e6175
- 05:23:57 UTC - 192.168.204.236:49177 - 37.230.117.89:80 - fahhdfg.uyy95.com - POST /docentx/audit/json.php
- 05:23:57 UTC - 192.168.204.236:49177 - 37.230.117.89:80 - fahhdfg.uyy95.com - GET /docentx/audit/msie.php
- 05:23:57 UTC - 192.168.204.236:49178 - 37.230.117.89:80 - fahhdfg.uyy95.com - GET /docentx/audit/javaim.php
- 05:23:58 UTC - 192.168.204.236:49178 - 37.230.117.89:80 - fahhdfg.uyy95.com - GET /docentx/audit/flash2014.php
- 05:24:01 UTC - 192.168.204.236:49178 - 37.230.117.89:80 - fahhdfg.uyy95.com - GET /docentx/audit/loadmsie.php?id=2477
- 05:24:02 UTC - 192.168.204.236:49177 - 37.230.117.89:80 - fahhdfg.uyy95.com - GET /docentx/audit/include/8b6dd.swf
- 05:24:04 UTC - 192.168.204.236:49178 - 37.230.117.89:80 - fahhdfg.uyy95.com - GET /docentx/audit/loadfla20014.php
- 05:24:07 UTC - 192.168.204.236:49180 - 37.230.117.89:80 - fahhdfg.uyy95.com - GET /docentx/audit/include/b2cb37ae3e320080e529ed1ed58452a2.jar
- 05:24:08 UTC - 192.168.204.236:49181 - 37.230.117.89:80 - fahhdfg.uyy95.com - GET /docentx/audit/loadim.php
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT
File name: 2014-05-29-FlashPack-EK-flash-exploit.swf
File size: 27.2 KB ( 27835 bytes )
MD5 hash: 712c6f1ee2c34b2990105346a7594c49
Detection ratio: 2 / 53
First submission: 2014-05-21 15:12:10 UTC
VirusTotal link: https://www.virustotal.com/en/file/ec6bced5f9d8b436cb00bfbf1710df65b60774ca086196472c66d76c45ac7c9b/analysis/
File name: 2014-05-29-FlashPack-EK-flash-exploit-uncompressed.swf
File size: 41.2 KB ( 42235 bytes )
MD5 hash: 951ab1bd44b0a7037d37e948403319ac
Detection ratio: 1 / 53
First submission: 2014-05-29 07:31:07 UTC
VirusTotal link: https://www.virustotal.com/en/file/d0bc873a873c17bcb85191aa15d8a04ec2b2448f6a37c8899d4abb6c871f7bdd/analysis/
JAVA EXPLOIT
File name: 2014-05-29-FlashPack-EK-java-exploit.jar
File size: 9.9 KB ( 10177 bytes )
MD5 hash: 3a3f7c0cb8915613f55be65659f5dc58
Detection ratio: 14 / 52
First submission: 2013-11-27 22:04:09 UTC
VirusTotal link: https://www.virustotal.com/en/file/e1eab121381faec86cb3762bea02d72bb899e9867ab402c06d95c55b26ccfe4a/analysis/
MALWARE PAYLOAD
File name: 2014-05-29-FlashPack-EK-malware-payload.exe
File size: 87.0 KB ( 89088 bytes )
MD5 hash: 913f0d60ff4f3bb5ab1d0dccc6fbc7ee
Detection ratio: 5 / 52
First submission: 2014-05-29 07:29:05 UTC
VirusTotal link: https://www.virustotal.com/en/file/c52c23618138bc766d3c7d9c170d23a6e7ef698a1613d9339a5fdb1e690efb04/analysis/
Malwr link: https://malwr.com/analysis/MTZmY2VjMjEyYjNhNDE0NmFlZDBlNGY2YzhjNzE0ZGE/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
Emerging Threats ruleset:
- 2014-05-29 05:23:57 UTC - 192.168.204.236:49177 - 37.230.117.89:80 - ET CURRENT_EVENTS Safe/CritX/FlashPack URI with Windows Plugin-Detect Data (sid:2017812)
- 2014-05-29 05:23:58 UTC - 192.168.204.236:49178 - 37.230.117.89:80 - ET CURRENT_EVENTS Possible Safe/CritX/FlashPack Common Filename javaim.php (sid:2018239)
- 2014-05-29 05:23:59 UTC - 37.230.117.89:80 - 192.168.204.236:49177 - ET CURRENT_EVENTS DRIVEBY FlashPack 2013-2551 May 13 2014 (sid:2018469)
- 2014-05-29 05:23:59 UTC - 192.168.204.236:49178 - 37.230.117.89:80 - ET CURRENT_EVENTS DRIVEBY FlashPack Flash Exploit flash2014.php (sid:2018471)
- 2014-05-29 05:24:02 UTC - 192.168.204.236:49178 - 37.230.117.89:80 - ET CURRENT_EVENTS Safe/CritX/FlashPack Payload (sid:2017813)
- 2014-05-29 05:24:02 UTC - 37.230.117.89:80 - 192.168.204.236:49178 - ET CURRENT_EVENTS Possible CritX/SafePack/FlashPack EXE Download (sid:2017297)
- 2014-05-29 05:24:08 UTC - 192.168.204.236:49180 - 37.230.117.89:80 - ET CURRENT_EVENTS Nuclear/Safe/CritX/FlashPack - Java Request - 32char hex-ascii (sid:2014751)
Sourcefire VRT ruleset:
- 2014-05-29 05:23:59 UTC - 37.230.117.89:80 - 192.168.204.236:49177 - EXPLOIT-KIT CritX exploit kit landing page - redirection to Microsoft Internet Explorer exploit (sid:30966)
- 2014-05-29 05:23:59 UTC - 192.168.204.236:49178 - 37.230.117.89:80 - EXPLOIT-KIT CritX exploit kit outbound request for Adobe Flash landing page (sid:30970)
- 2014-05-29 05:23:59 UTC - 37.230.117.89:80 - 192.168.204.236:49178 - EXPLOIT-KIT CritX exploit kit landing page - redirection to Adobe Flash exploit (sid:30967)
- 2014-05-29 05:24:02 UTC - 192.168.204.236:49178 - 37.230.117.89:80 - EXPLOIT-KIT CritX exploit kit payload download attempt (sid:29166)
- 2014-05-29 05:24:02 UTC - 192.168.204.236:49178 - 37.230.117.89:80 - EXPLOIT-KIT CritX exploit kit payload request (sid:30973)
- 2014-05-29 05:24:02 UTC - 37.230.117.89:80 - 192.168.204.236:49178 - EXPLOIT-KIT CritX exploit kit Portable Executable download (sid:24791)
- 2014-05-29 05:24:02 UTC - 37.230.117.89:80 - 192.168.204.236:49178 - EXPLOIT-KIT CritX exploit kit payload download attempt (sid:29167)
- 2014-05-29 05:24:02 UTC - 37.230.117.89:80 - 192.168.204.236:49178 - EXPLOIT-KIT Multiple exploit kit payload download (sid:28593)
- 2014-05-29 05:24:08 UTC - 192.168.204.236:49180 - 37.230.117.89:80 - EXPLOIT-KIT CritX exploit kit outbound jar request (sid:29165)
- 2014-05-29 05:24:09 UTC - 37.230.117.89:80 - 192.168.204.236:49180 - EXPLOIT-KIT Multiple exploit kit jar file download attempt (sid:27816)
- 2014-05-29 05:24:09 UTC - 37.230.117.89:80 - 192.168.204.236:49181 - EXPLOIT-KIT Java User-Agent downloading Portable Executable - Possible exploit kit (sid:25042)
HIGHLIGHTS FROM THE TRAFFIC
Malicious Javascript in page from compromised website:
Redirect:
FlashPack EK delivers CVE-2013-2551 MSIE exploit:
FlashPack EK delivers Flash exploit:
FlashPack EK delivers Java exploit:
The same EXE payload sent after each successful exploit:
FINAL NOTES
Once again, here are the associated files:
- ZIP of the PCAP: 2014-05-29-FlashPack-EK-traffic.pcap.zip
- ZIP of the malware: 2014-05-29-FlashPack-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.