2014-06-18 - FAKE FLASH INSTALLER HOSTED ON 191.238.33[.]50 - UPDATEPLUGIN.AZUREWEBSITES[.]NET

NOTICE:

ASSOCIATED FILES:

BLOG ENTRIES SINCE I STARTED KEEPING TRACK:

 

TODAY'S TRAFFIC EXAMPLE

 

TRAFFIC FROM SANDBOX ANALYSIS OF THE MALWARE

 

PRELIMINARY MALWARE ANALYSIS

FAKE FLASH UPDATER:

File name:  FlashInstaller.exe
File size:  183,632 bytes
MD5 hash:  ae9769ed150f23d1ad1089ce8d4a7a30
Detection ratio:  21 / 54
First submission:  2014-06-17 13:24:40 UTC
VirusTotal link:  https://www.virustotal.com/en/file/8e3be02eadc2cbe899bef97f83218212ed428454efb63f21e9b7f5bd07996654/analysis/

 

FOLLOW-UP MALWARE FROM PCAP GENERATED BY MALWR SANDBOX ANALYSIS:

 

ALERTS

ALERTS FOR THE INITIAL TRAFFIC (from Sguil on Security Onion):

 

FROM TCPREPLAY ON PCAP FROM MALWR SANDBOX ANALYSIS:

 

SCREENSHOTS FROM THE TRAFFIC

Compromised website (lapelsa[.]com[.]ar):

 

First HTTP GET request to the fake Flash notification domain (bolsadelavivienda[.]com):

 

Second HTTP GET request to the fake Flash notification domain that contains link to the malware:

 

HTTP GET request to retrieve the fake Flash installer:

 

Click here to return to the main page.