2014-07-24 - SWEET ORANGE EK FROM 94.185.82.194 port 16122 - CDN.ABISTRA.CO - CDN.GEORGICAPARTNERS.COM
ASSOCIATED FILES:
- ZIP of PCAP(s): 2014-07-24-Sweet-Orange-EK-traffic.pcap.zip
- ZIP of the malware: 2014-07-24-Sweet-Orange-EK-malware.zip
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 98.129.229.18 - www.genesistoday.com - Compromised website
- 192.185.237.164 - cdn2.movetoclarksville.com - Redirect
- 94.185.82.194 - cdn.abistra.co and cdn.georgicapartners.com - Sweet Orange EK over TCP port 16122
COMPROMISED WEBSITE AND REDIRECT CHAIN:
- 02:19:39 UTC - 172.16.165.132:49179 - 98.129.229.18:80 - www.genesistoday.com - GET /products
- 02:19:40 UTC - 172.16.165.132:49183 - 98.129.229.18:80 - www.genesistoday.com - GET /assets/javascript/jquery.hoverIntent.minified.js
- 02:19:41 UTC - 172.16.165.132:49191 - 192.185.237.164:80 - cdn2.movetoclarksville.com - GET /k?t=1348301278
SWEET ORANGE EK:
- 02:19:58 UTC - 172.16.165.132:49203 - 94.185.82.194:16122 - cdn.abistra.co:16122 - GET /dig/local/stargalaxy.php?nebula=3
- 02:20:00 UTC - 172.16.165.132:49203 - 94.185.82.194:16122 - cdn.abistra.co:16122 - GET /dig/local/hxwXHAp
- 02:20:03 UTC - 172.16.165.132:49210 - 94.185.82.194:16122 - cdn.georgicapartners.com:16122 - GET /cars.php?demo=378
- 02:20:13 UTC - 172.16.165.132:49212 - 94.185.82.194:16122 - cdn.abistra.co:16122 - GET /dig/local/Fqxzdh.jar
- 02:20:13 UTC - 172.16.165.132:49213 - 94.185.82.194:16122 - cdn.abistra.co:16122 - GET /dig/local/cnJzjx.jar
- 02:20:13 UTC - 172.16.165.132:49214 - 94.185.82.194:16122 - cdn.abistra.co:16122 - GET /dig/local/Fqxzdh.jar
- 02:20:14 UTC - 172.16.165.132:49214 - 94.185.82.194:16122 - cdn.abistra.co:16122 - GET /dig/local/Fqxzdh.jar
- 02:20:16 UTC - 172.16.165.132:49214 - 94.185.82.194:16122 - cdn.abistra.co:16122 - GET /dig/local/Fqxzdh.jar
- 02:20:16 UTC - 172.16.165.132:49214 94.185.82.194:16122 - cdn.abistra.co:16122 - GET /dig/local/Fqxzdh.jar
NOTE: The HTTP GETrequests for .jar files all returned 404 not found.
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT (CVE-2014-0515)
File name: 2014-07-24-Sweet-Orange-EK-flash-exploit.swf
File size: 4.2 KB ( 4282 bytes )
MD5 hash: 612103976c2466d44cff4344d55464d1
Detection ratio: 1 / 53
First submission: 2014-07-24 15:06:39 UTC
VirusTotal link: https://www.virustotal.com/en/file/3f2f98d71de6f182b574958d7a5cc31f505e76a7d49efa5abf8091d3769e0abb/analysis/
MALWARE PAYLOAD
File name: 2014-07-24-Sweet-Orange-EK-malware-payload.exe
File size: 252.0 KB ( 258048 bytes )
MD5 hash: c6f1689e36afd1e67dd0acdae5498f32
Detection ratio: 10 / 53
First submission: 2014-07-24 14:08:32 UTC
VirusTotal link: https://www.virustotal.com/en/file/76d08c42a4c4d653b77ce9fa5aeb7a0ef496afdd40f703e250d7e5d7739794cb/analysis/
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (not including ET INFO or ET POLICY rules):
- 2014-07-24 02:19:41 UTC - 98.129.229.18:80 - 172.16.165.132:49179 - ETPRO WEB_CLIENT Mozilla Firefox IFRAME Cross Site Scripting (sid:2800052)
- 2014-07-24 02:19:42 UTC - 172.16.165.132:49191 -> 192.185.237.164:80 - ET CURRENT_EVENTS Fake CDN Sweet Orange Gate July 17 2014 (sid:2018737)
- 2014-07-24 02:19:42 UTC - 98.129.229.18:80 - 172.16.165.132:49179 - ET WEB_CLIENT Possible HTTP 404 XSS Attempt (External Source) (sid:2010518)
- 2014-07-24 02:19:58 UTC - 172.16.165.132:49203 - 94.185.82.194:16122 - ET POLICY HTTP Request on Unusual Port Possibly Hostile (sid:2006408)
- 2014-07-24 02:20:04 UTC - 94.185.82.194:16122 -> 172.16.165.132:49210 - ET POLICY PE EXE or DLL Windows file download (sid:2000419)
Sourcefire VRT ruleset from Snort 2.9.6.0 on Ubuntu 14.04 LTS:
- 2014-07-24 02:19:40 UTC - 98.129.229.18:80 - 172.16.165.132:49179 - [1:1841:16] FILE-JAVA Oracle Javascript URL host spoofing attempt
- 2014-07-24 02:19:40 UTC - 98.129.229.18:80 - 172.16.165.132:49179 - [1:3679:12] INDICATOR-OBFUSCATION Multiple Products IFRAME src javascript code execution
HIGHLIGHTS FROM THE TRAFFIC
Malicious javascript from compromised website:
Redirect using var jquery_datepicker (something I've documented before with Sweet Orange EK traffic):
Sweet Orange EK delivers CVE-2014-0515 Flash exploit:
EXE payload sent after successful Flash exploit:
FINAL NOTES
Once again, here are the associated files:
- ZIP of PCAP(s): 2014-07-24-Sweet-Orange-EK-traffic.pcap.zip
- ZIP of the malware: 2014-07-24-Sweet-Orange-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.