2014-06-09 - NUCLEAR EK FROM 185.10.57.167 - BT.REALWESTCHESTERCOUNTY.COM
ASSOCIATED FILES:
- ZIP of PCAPs: 2014-06-09-Nuclear-EK-traffic.pcap.zip
- ZIP of the malware: 2014-06-09-Nuclear-EK-malware.zip
CHAIN OF EVENTS
NUCLEAR EK:
- 05:57:31 UTC - 192.168.204.211:52003 - 185.10.57.167:80 - bt.realwestchestercounty.com - GET /f31e4820gvtqdw.html
- 05:57:50 UTC - 192.168.204.211:52009 - 185.10.57.167:80 - bt.realwestchestercounty.com - GET /3531460654/3/1402272480.jar
- 05:57:51 UTC - 192.168.204.211:52009 - 185.10.57.167:80 - bt.realwestchestercounty.com - GET /f/3/1402272480/3531460654/2
- 05:57:52 UTC - 192.168.204.211:52009 - 185.10.57.167:80 - bt.realwestchestercounty.com - GET /f/3/1402272480/3531460654/2/2
POST-INFECTION TRAFFIC:
- 05:58:04 UTC - 192.168.204.211:52011 - 14.54.223.63:80 - history-later.su - GET /b/shoe/1480
- 05:58:07 UTC - 192.168.204.211:52014 - 173.20.248.44:80 - gerring-serilg.su - GET /phocaguestbook-qq89/jquery/
- 05:58:15 UTC - 192.168.204.211:52015 - 173.20.248.44:80 - gerring-serilg.su - GET /phocaguestbook-qq89/jquery/
- 05:58:29 UTC - 192.168.204.211:52016 - 208.115.105.47:80 - proper.EBBENWOODWORKING.COM - POST /es/cambios.php
- 05:59:29 UTC - 192.168.204.211:49157 - 173.20.248.44:80 - gerring-serilg.su - GET /uniterevolutionq-ll56/soft64.dll
- 05:59:34 UTC - 192.168.204.211:49160 - 31.186.103.103:80 - defie-guret.su - GET /b/eve/37437f7382928de2151b8487
- 06:00:28 UTC - 192.168.204.211:49161 - 31.186.103.103:80 - defie-guret.su - POST /b/opt/D2047CDD51E03CC4E431CE55
- 06:00:32 UTC - 192.168.204.211:49162 - 31.186.103.103:80 - defie-guret.su - GET /b/letr/994920C1BEDB672D0B0A95BC
- 06:00:35 UTC - 192.168.204.211:49163 - 31.186.103.103:80 - defie-guret.su - POST /b/opt/9D011F4249E86E3EFC399CAF
- 06:00:55 UTC - 192.168.204.211:49164 - 31.186.103.103:80 - defie-guret.su - POST /b/req/0D478A09A56E15E910BFE778
- 06:01:15 UTC - 192.168.204.211:49165 - 31.186.103.103:80 - defie-guret.su - POST /b/req/23B74C8637E75EDD8236AC4C
CLICKFRAUD TRAFFIC BEGINS:
- 06:01:16 UTC - 192.168.204.211:49166 - 192.162.19.34:80 - country-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49169 - 192.162.19.34:80 - bubblegum-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49171 - 192.162.19.34:80 - aquariums-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49172 - 192.162.19.34:80 - projects-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49173 - 192.162.19.34:80 - ecored-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49177 - 192.162.19.34:80 - phantom-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49178 - 192.162.19.34:80 - provide-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49181 - 192.162.19.34:80 - truth-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49183 - 192.162.19.34:80 - available-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49182 - 192.162.19.34:80 - available-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49184 - 192.162.19.34:80 - travels-search.com - GET /
- 06:01:16 UTC - 192.168.204.211:49186 - 192.162.19.34:80 - blues-search.com - GET /
PRELIMINARY MALWARE ANALYSIS
JAVA EXPLOIT
File name: 2014-06-09-Nuclear-EK-java-exploit.jar
File size: 11.9 KB ( 12167 bytes )
MD5 hash: fcde039872d8596bc8304cbebb139b93
Detection ratio: 1 / 51
First submission: 2014-06-09 08:16:47 UTC
VirusTotal link: https://www.virustotal.com/en/file/d14526ffae471a7910f4c93ff327ca64a154b84f3cf061b8ce3b169de01b8236/analysis/
MALWARE PAYLOAD (1 OF 2)
File name: 2014-06-09-Nuclear-EK-malware-payload-01.exe
File size: 151.3 KB ( 154960 bytes )
MD5 hash: 28af2419726b96e9f7a43212f481b371
Detection ratio: 5 / 52
First submission: 2014-06-09 15:11:58 UTC
VirusTotal link: https://www.virustotal.com/en/file/f02792d0cabb7a6a86486738330cddace48ac2b3ced21c86a11f4331a08b24f1/analysis/
MALWARE PAYLOAD (2 OF 2)
File name: 2014-06-09-Nuclear-EK-malware-payload-02.exe
File size: 134.0 KB ( 137216 bytes )
MD5 hash: 997c01baf8c7b664f214ce0d4dfaee97
Detection ratio: 4 / 52
First submission: 2014-06-09 15:12:09 UTC
VirusTotal link: https://www.virustotal.com/en/file/a567448233d252a53a4d546f1e33047f8cd3971d3f0aeac56086d04ef25a2ee7/analysis/
POST-INFECTION MALWARE
File name: exe.exe
Stored in the user's AppData\Local\Temp directory as: UpdateFlashPlayer_88fd1df4.exe
File size: 146.0 KB ( 149512 bytes )
MD5 hash: e548e7e3a65dd40a781815de4e381f41
Detection ratio: 11 / 52
First submission: 2014-06-09 07:29:25 UTC
VirusTotal link: https://www.virustotal.com/en/file/88b092e3328babee786b01796fc80c1f893411892a88437a4592a13b660bd741/analysis/
SNORT EVENTS
SNORT EVENTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)
Emerging Threats and ETPRO rulesets:
- 2014-06-09 05:57:50 UTC - 192.168.204.211:52009 - 185.10.57.167:80 - ET CURRENT_EVENTS Nuclear EK JAR URI Struct Nov 05 2013 (sid:2017666)
- 2014-06-09 05:57:51 UTC - 185.10.57.167:80 - 192.168.204.211:52009 - ET CURRENT_EVENTS Exploit Kit Delivering JAR Archive to Client (sid:2014526)
- 2014-06-09 05:57:51 UTC - 192.168.204.211:52009 - 185.10.57.167:80 - ET CURRENT_EVENTS Nuclear EK Payload URI Struct Nov 05 2013 (sid:2017667)
- 2014-06-09 05:57:51 UTC - 185.10.57.167:80 - 192.168.204.211:52009 - ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby (sid:2013036)
- 2014-06-09 05:58:04 UTC - 192.168.204.211:52011 - 14.54.223.63:80 - ETPRO TROJAN Trojan-Spy.Win32.Zbot.relx Checkin (sid:2807742)
- 2014-06-09 05:58:08 UTC - 173.20.248.44:80 - 192.168.204.211:52014 - ET MALWARE Possible Windows executable sent when remote host claims to send a Text File (sid:2008438)
- 2014-06-09 05:58:29 UTC - 192.168.204.211:52016 - 208.115.105.47:80 - ET TROJAN Fareit/Pony Downloader Checkin 2 (sid:2014411)
- 2014-06-09 05:58:30 UTC - 208.115.105.47:80 - 192.168.204.211:52016 - ETPRO TROJAN Fareit/Pony Downloader CnC response (sid:2805976)
- 2014-06-09 05:59:34 UTC - 192.168.204.211:49160 - 31.186.103.103:80 - ET TROJAN W32/Asprox.ClickFraudBot CnC Beacon (sid:2018096)
- 2014-06-09 05:59:35 UTC - 31.186.103.103:80 - 192.168.204.211:49160 - ET TROJAN W32/Asprox.ClickFraudBot CnC Beacon Acknowledgement (sid:2018097)
- 2014-06-09 06:00:28 UTC - 192.168.204.211:49161 - 31.186.103.103:80 - ET TROJAN W32/Asprox.ClickFraudBot POST CnC Beacon (sid:2018098)
Sourcefire VRT ruleset:
- 2014-06-09 05:57:50 UTC - 192.168.204.211:52009 - 185.10.57.167:80 - EXPLOIT-KIT Nuclear exploit kit outbound jar request (sid:30219)
- 2014-06-09 05:57:51 UTC - 185.10.57.167:80 - 192.168.204.211:52009 - EXPLOIT-KIT Multiple exploit kit jar file download attempt (sid:27816)
- 2014-06-09 05:57:51 UTC - 192.168.204.211:52009 - 185.10.57.167:80 - EXPLOIT-KIT Nuclear exploit kit outbound payload request (sid:30220)
- 2014-06-09 05:57:51 UTC - 185.10.57.167:80 - 192.168.204.211:52009 - EXPLOIT-KIT Java User-Agent downloading Portable Executable - Possible exploit kit (sid:25042)
- 2014-06-09 05:57:51 UTC - 185.10.57.167:80 - 192.168.204.211:52009 - EXPLOIT-KIT Multiple exploit kit payload download (sid:28593)
- 2014-06-09 05:57:51 UTC - 185.10.57.167:80 - 192.168.204.211:52009 - EXPLOIT-KIT Multiple exploit kit single digit exe detection (sid:28423)
- 2014-06-09 05:58:08 UTC - 173.20.248.44:80 - 192.168.204.211:52014 - MALWARE-CNC Win.Trojan.Dofoil outbound connection (sid:28809)
- 2014-06-09 05:58:29 UTC - 192.168.204.211:52016 - 208.115.105.47:80 - MALWARE-CNC Win.Trojan.Zeus encrypted POST Data exfiltration (sid:27919)
- 2014-06-09 05:59:34 UTC - 192.168.204.211:49160 - 31.186.103.103:80 - MALWARE-CNC Win.Trojan.Cidox variant outbound connection (sid:29356)
FINAL NOTES
Once again, here are the associated files:
- ZIP of PCAPs: 2014-06-09-Nuclear-EK-traffic.pcap.zip
- ZIP of the malware: 2014-06-09-Nuclear-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.