2014-07-18 - FLASHPACK EK FROM 88.80.186.247 - PISTOLEOR.TUSTILO.COM.AR
ASSOCIATED FILES:
- ZIP of PCAP(s): 2014-07-18-FlashPack-EK-traffic.pcap.zip
- ZIP of the malware: 2014-07-18-FlashPack-EK-artifacts-and-malware.zip
NOTES:
- I Checked scumware.org, and found today's compromised site that generated FlashPack EK.
- The malware payload was generally identified as a Zusy variant, and it didn't generate any traffic on the infected VM or any of the sandbox environments I tried.
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 217.160.117.223 - www.gastechwarrington.co.uk - Compromised website
- 188.120.251.39 - rabiorik.ru - Redirect
- 88.80.186.247 - pistoleor.tustilo.com.ar - FlashPack EK
COMPROMISED WEBSITE AND REDIRECT:
- 2014-07-18 01:43:48 UTC - 172.16.165.133:51843 - 217.160.117.223:80 - www.gastechwarrington.co.uk - GET /
- 2014-07-18 01:44:03 UTC - 172.16.165.133:51882 - 188.120.251.39:80 - rabiorik.ru - GET /egfgcmb.cgi?default
FLASHPACK EK:
- 2014-07-18 01:44:04 UTC - 172.16.165.133:51894 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/dseasonc.php
- 2014-07-18 01:44:07 UTC - 172.16.165.133:51894 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/zwhoser.js
- 2014-07-18 01:44:09 UTC - 172.16.165.133:51894 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/djobtheyp.php
- 2014-07-18 01:44:09 UTC - 172.16.165.133:51926 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/nbitep.php
- 2014-07-18 01:44:09 UTC - 172.16.165.133:51925 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/hreprinteds.php
- 2014-07-18 01:44:09 UTC - 172.16.165.133:51928 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/rcannisterh.php
- 2014-07-18 01:44:09 UTC - 172.16.165.133:51924 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/qoweb.php
- 2014-07-18 01:44:10 UTC - 172.16.165.133:51894 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/rflushm/ee2fb77.swf
- 2014-07-18 01:44:10 UTC - 172.16.165.133:51925 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/rflushm/f2103.swf
- 2014-07-18 01:44:10 UTC - 172.16.165.133:51894 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/rflushm/32f79a11.swf
- 2014-07-18 01:44:11 UTC - 172.16.165.133:51894 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/rflushm/dacff06.jar
- 2014-07-18 01:44:11 UTC - 172.16.165.133:51894 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/addres.class
- 2014-07-18 01:44:11 UTC - 172.16.165.133:51925 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/rflushm/1c6ca502.js
- 2014-07-18 01:44:11 UTC - 172.16.165.133:51894 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/addres.class
- 2014-07-18 01:44:14 UTC - 172.16.165.133:51925 - 88.80.186.247:80 - pistoleor.tustilo.com.ar - GET /maxadira/yworldsd/xflippedt.php [!]
NOTE: [!] shows where the malware payload was delivered.
PRELIMINARY MALWARE ANALYSIS
FLASH FILE 1 OF 3:
File name: 32f79a11.swf
File size: 24.1 KB ( 24716 bytes )
MD5 hash: 7c2eda24dde273296164a3ff22b68b33
Detection ratio: 2 / 53
First submission: 2014-07-11 22:59:57 UTC
VirusTotal link: https://www.virustotal.com/en/file/ab19fe50198888d1f9a97066a138a5472604e618d9bb88dd66081348f770f3bf/analysis/
FLASH FILE 2 OF 3:
File name: ee2fb77.swf
File size: 8.2 KB ( 8387 bytes )
MD5 hash: 7d24428037f9dbf5a5c93e87640ba171
Detection ratio: 0 / 54
First submission: 2014-07-18 01:58:41 UTC
VirusTotal link: https://www.virustotal.com/en/file/c7688f16d38ab4ac8bdea19a9eae890d6aaaa29b01c1007c1a6fc1e3031e3b51/analysis/
FLASH FILE 3 OF 3:
File name: f2103.swf
File size: 28.7 KB ( 29384 bytes )
MD5 hash: 160cb833072ff661a653a688ce50e251
Detection ratio: 0 / 54
First submission: 2014-07-18 01:58:58 UTC
VirusTotal link: https://www.virustotal.com/en/file/9e412340a0fc114687917086d99147bb01188b6e815204e5fd6ee13502f810f4/analysis/
JAVA EXPLOIT:
File name: dacff06.jar
File size: 29.5 KB ( 30256 bytes )
MD5 hash: 6937c8c52866b3534bba8d3a4a4f5bd0
Detection ratio: 13 / 53
First submission: 2014-07-14 07:32:44 UTC
VirusTotal link: https://www.virustotal.com/en/file/c66ae3f4f5ae8cd438377021a316fe1752631276a0bc24cf827bece8497f9918/analysis/
MALWARE PAYLOAD:
File name: 2014-07-18-FlashPack-EK-malware-pyaload.exe
File size: 156.5 KB ( 160256 bytes )
MD5 hash: 392e3285be49ce3ba1ba9f544fdca9cb
Detection ratio: 18 / 54
First submission: 2014-07-17 12:02:25 UTC
VirusTotal link: https://www.virustotal.com/en/file/0f400ecafb0130bec2dbdb02265595e4c5e8399f664bf5c367784e962ff93604/analysis/
Malwr link: https://malwr.com/analysis/NWNjYmRiMmQzMThjNDNkYzk3ZDA2MTZiNGNmYzRmN2I/
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (not including the ET INFO or ET POLICY sigantures):
- 2014-07-18 01:44:04 UTC - 88.80.186.247:80 - 172.16.165.133:51894 - ET WEB_CLIENT Possible Hex Obfuscation Usage On Webpage (sid: 2012119)
- 2014-07-18 01:44:04 UTC - 88.80.186.247:80 - 172.16.165.133:51894 - ET CURRENT_EVENTS Safe/CritX/FlashPack EK Secondary Landing Jul 11 2014 (sid: 2018668)
- 2014-07-18 01:44:15 UTC - 88.80.186.247:80 - 172.16.165.133:51925 - ET CURRENT_EVENTS Possible CritX/SafePack/FlashPack EXE Download (sid: 2017297)
Sourcefire VRT ruleset from Snort 2.9.6.0 on Ubuntu 14.04 LTS:
- 2014-07-18 01:44:08 UTC - 88.80.186.247:80 - 172.16.165.133:51894 - [1:23878:8] BROWSER-PLUGINS Oracle JRE Deployment Toolkit ActiveX clsid access attempt
- 2014-07-18 01:44:15 UTC - 88.80.186.247:80 - 172.16.165.133:51925 - [1:11192:16] FILE-EXECUTABLE download of executable content
- 2014-07-18 01:44:15 UTC - 88.80.186.247:80 - 172.16.165.133:51925 - [1:24791:3] EXPLOIT-KIT CritX exploit kit Portable Executable download
- 2014-07-18 01:44:15 UTC - 88.80.186.247:80 - 172.16.165.133:51925 - [1:29167:1] EXPLOIT-KIT CritX exploit kit payload download attempt
- 2014-07-18 01:44:15 UTC - 88.80.186.247:80 - 172.16.165.133:51925 - [1:28593:1] EXPLOIT-KIT Multiple exploit kit payload download
- 2014-07-18 01:44:15 UTC - 88.80.186.247:80 - 172.16.165.133:51925 - [1:15306:18] FILE-EXECUTABLE Portable Executable binary file magic detected
NOTE: These Snort events were taken
SCREENSHOTS FROM THE TRAFFIC
Malicious iframe after the closing HTML tag from the comrpomised website:
Redirect pointing to the landing page for FlashPack EK:
Landing page for FlashPack EK:
HTTP GET reqeusts for the 3 different Flash exploits seen in this traffic:
FlashPack EK sends the CVE-2013-2551 MSIE exploit:
FlashPack EK sends the Java exploit:
FlashPack EK sends the malware payload:
FINAL NOTES
Once again, here are the associated files:
- ZIP of PCAP(s): 2014-07-18-FlashPack-EK-traffic.pcap.zip
- ZIP of the malware: 2014-07-18-FlashPack-EK-artifacts-and-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.