2014-06-02 - NUCLEAR EK FROM 93.189.40.43 - GROZAM.HIPERJOGOS.INFO
ASSOCIATED FILES:
- ZIP of PCAPs: 2014-06-02-Nuclear-EK.pcap.zip
- ZIP of the malware: 2014-06-02-Nuclear-EK-malware.zip
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 5.9.141.183 - www.mirneboskrebov.ru - Compromised website
- 80.240.139.203 - brozdec.uneekstudio.com - Redirect
- 93.189.40.43 - grozam.hiperjogos.info - Nuclear EK
COMPROMISED WEBSITE AND REDIRECT:
- 02:32:54 UTC - 5.9.141.183 - www.mirneboskrebov.ru - GET /
- 02:32:54 UTC - 5.9.141.183 - www.mirneboskrebov.ru - GET /wp-content/plugins/featured-content-gallery/scripts/mootools.v1.11.js
- 02:32:56 UTC - 80.240.139.203 - brozdec.uneekstudio.com - GET /jtrsuyowertdhsrtj13.html
NUCLEAR EK:
- 02:32:56 UTC - 93.189.40.43 - grozam.hiperjogos.info - GET /0bf4cc74wl1a8.html
- 02:32:58 UTC - 93.189.40.43 - grozam.hiperjogos.info - GET /764774271/1/1401655380.swf
- 02:33:01 UTC - 93.189.40.43 - grozam.hiperjogos.info - GET /f/1/1401655380/764774271/7
- 02:33:17 UTC - 93.189.40.43 - grozam.hiperjogos.info - GET /764774271/1/1401655380.htm
- 02:33:19 UTC - 93.189.40.43 - grozam.hiperjogos.info - GET /f/1/1401655380/764774271/5/x00804090407000700080150050f0304045106565601;1;5
- 02:33:42 UTC - 93.189.40.43 - grozam.hiperjogos.info - GET /764774271/1/1401655380.jar
- 02:33:43 UTC - 93.189.40.43 - grozam.hiperjogos.info - GET /764774271/1/1401655380.jar
- 02:33:53 UTC - 93.189.40.43 - grozam.hiperjogos.info - GET /f/1/1401655380/764774271/2
- 02:34:00 UTC - 93.189.40.43 - grozam.hiperjogos.info - GET /f/1/1401655380/764774271/2/2
POST-INFECTION TRAFFIC:
- SMTP traffic on port 25 - pharmacy spam with different spoofed senders:
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT
File name: 2014-06-02-Nuclear-EK-flash-exploit.swf
File size: 9.3 KB ( 9525 bytes )
MD5 hash: 0e4fdee8dfd5b482541d3fd8c3ada0d4
Detection ratio: 1 / 48
First submission: 2014-04-24 13:47:41 UTC
VirusTotal link: https://www.virustotal.com/en/file/4788cca43f06752bd6d52978cbf8058fa4a3aeb76bc5242ee83da4223ec2de13/analysis/
JAVA EXPLOIT
File name: 2014-06-02-Nuclear-EK-java-exploit.jar
File size: 11.3 KB ( 11599 bytes )
MD5 hash: 807ab697e5b5c1f716db966325842108
Detection ratio: 3 / 53
First submission: 2014-05-30 13:45:40 UTC
VirusTotal link: https://www.virustotal.com/en/file/c43dbbadd79f2c50f67bfc265825fbac3887f6840b1dbb2e2556148f597d80c7/analysis/
MALWARE PAYLOAD
File name: 2014-06-02-Nuclear-EK-malware-payload.exe
File size: 136.0 KB ( 139264 bytes )
MD5 hash: 72f2c27f180c6998e36ff67a1c841d7c
Detection ratio: 3 / 52
First submission: 2014-06-02 04:07:13 UTC
VirusTotal link: https://www.virustotal.com/en/file/09d58f7370eaa06381032ab2c52f2c995553f2023196d834d2288ce2779c242a/analysis/
Malwr link: https://malwr.com/analysis/MjNkMjQ5NDFkNzg4NGJhMWFhZTRmMDA5YTY1NWEzMDY/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
Emerging Threats ruleset:
- 2014-06-02 02:32:59 UTC - 93.189.40.43:80 - 192.168.204.196:49652 - ET CURRENT_EVENTS DRIVEBY Nuclear EK SWF (sid:2018362)
- 2014-06-02 02:33:01 UTC - 192.168.204.196:49652 - 93.189.40.43:80 - ET CURRENT_EVENTS Nuclear EK Payload URI Struct Nov 05 2013 (sid:2017667)
- 2014-06-02 02:33:02 UTC - 93.189.40.43:80 - 192.168.204.196:49652 - ET CURRENT_EVENTS Blackhole Exploit Kit Delivering Executable to Client (sid:2013962)
- 2014-06-02 02:33:42 UTC - 192.168.204.196:49655 - 93.189.40.43:80 - ET CURRENT_EVENTS Nuclear EK JAR URI Struct Nov 05 2013 (sid:2017666)
- 2014-06-02 02:33:43 UTC - 93.189.40.43:80 - 192.168.204.196:49655 - ET CURRENT_EVENTS Exploit Kit Delivering JAR Archive to Client (sid:2014526)
- 2014-06-02 02:33:53 UTC - 93.189.40.43:80 - 192.168.204.196:49656 - ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby (sid:2013036)
Sourcefire VRT ruleset:
- 2014-06-02 02:33:01 UTC - 192.168.204.196:49652 - 93.189.40.43:80 - EXPLOIT-KIT Nuclear exploit kit outbound payload request (sid:30220)
- 2014-06-02 02:33:02 UTC - 93.189.40.43:80 - 192.168.204.196:49652 - EXPLOIT-KIT Multiple exploit kit payload download (sid:28593)
- 2014-06-02 02:33:02 UTC - 93.189.40.43:80 - 192.168.204.196:49652 - EXPLOIT-KIT Multiple exploit kit single digit exe detection (sid:28423)
- 2014-06-02 02:33:42 UTC - 192.168.204.196:49655 - 93.189.40.43:80 - EXPLOIT-KIT Nuclear exploit kit outbound jar request (sid:30219)
- 2014-06-02 02:33:43 UTC - 93.189.40.43:80 - 192.168.204.196:49655 - EXPLOIT-KIT Multiple exploit kit jar file download attempt (sid:27816)
- 2014-06-02 02:33:53 UTC - 93.189.40.43:80 - 192.168.204.196:49656 - EXPLOIT-KIT Java User-Agent downloading Portable Executable - Possible exploit kit (sid:25042)
HIGHLIGHTS FROM THE TRAFFIC
Embedded iframe in java file from compromised website:
Redirect:
Nuclear EK delivers Flash exploit:
EXE payload sent after successful Flash exploit:
Nuclear EK delivers CVE-2013-2551 MSIE exploit:
EXE payload sent after successful CVE-2013-2551 MSIE exploit:
Nuclear EK delivers Java exploit:
EXE payload sent after successful Java exploit:
FINAL NOTES
Once again, here are the associated files:
- ZIP of PCAPs: 2014-06-02-Nuclear-EK.pcap.zip
- ZIP of the malware: 2014-06-02-Nuclear-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.