2014-07-25 - RIG EK FROM 194.58.101.49 - WELCOME.SHOPSTHATGIVEA.COM
ASSOCIATED FILES:
- ZIP of PCAP(s): 2014-07-25-Rig-EK-traffic.pcap.zip
- ZIP of the malware: 2014-07-25-Rig-EK-malware.zip
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 194.58.101.49 - welcome.shopsthatgivea.com - Rig EK
- 188.241.116.231 - shared.wdc0.com and hosted.wdc01.com - Post-infection traffic using HTTPS (port 443)
RIG EK:
- 20:56:00 UTC - 172.16.165.132:49182 - 194.58.101.49:80 - welcome.shopsthatgivea.com - GET /?PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|NzE1OTllYTUyNTM4MTcxYjI0YmZiYzIzMGUxNzk5OGQ - 20:56:08 UTC - 172.16.165.132:49182 - 194.58.101.49:80 - welcome.shopsthatgivea.com - GET /index.php?req=swf&num=2888&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|NzE1OTllYTUyNTM4MTcxYjI0YmZiYzIzMGUxNzk5OGQ - 20:56:08 UTC - 172.16.165.132:49191 - 194.58.101.49:80 - welcome.shopsthatgivea.com - GET /index.php?req=xap&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|NzE1OTllYTUyNTM4MTcxYjI0YmZiYzIzMGUxNzk5OGQ - 20:56:15 UTC - 172.16.165.132:49191 - 194.58.101.49:80 - welcome.shopsthatgivea.com - GET /index.php?req=mp3&num=54285120&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg%7CNzE1OTllYTUyNTM4MTcxYjI0YmZiYzIzMGUxNzk5OGQ&dop=0
POST-INFECTION TRAFFIC:
- 20:58:20 UTC - 172.16.165.132:49199 - 188.241.116.231:443 - HTTPS traffic to shared.wdc0.com
- 20:58:21 UTC - 172.16.165.132:49201 - 188.241.116.231:443 - HTTPS traffic to shared.wdc0.com
- 21:00:25 UTC - 172.16.165.132:49202 - 188.241.116.231:443 - HTTPS traffic to hosted.wdc01.com
- 21:00:26 UTC - 172.16.165.132:49203 - 188.241.116.231:443 - HTTPS traffic to hosted.wdc01.com
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT:
File name: 2014-07-25-Rig-EK-flash-exploit.swf
File size: 4.3 KB ( 4453 bytes )
MD5 hash: 3d7e96bd371bfbac440864dc651a0ddf
Detection ratio: 0 / 53
First submission: 2014-07-25 19:39:40 UTC
VirusTotal link: https://www.virustotal.com/en/file/48272657d2347f7dfca47f8c99822264c1ac7df44a37fbd3b555e40bed99d3dd/analysis/
SILVERLIGHT EXPLOIT:
File name: 2014-07-25-Rig-EK-silverlight-exploit.xap
File size: 47.5 KB ( 48688 bytes )
MD5 hash: 1699d8065bb7e9ae66491d6e52cc6981
Detection ratio: 9 / 52
First submission: 2014-07-23 10:46:54 UTC
VirusTotal link: https://www.virustotal.com/en/file/d6928f1c8680059cddb757a3d219717f0ed5ca42ae0cd9f8bbfeaf3602cee5c5/analysis/
MALWARE PAYLOAD:
File name: 2014-07-25-Rig-EK-malware-payload.exe
File size: 219.5 KB ( 224768 bytes )
MD5 hash: 7ef60352e4076902e4817115125ab72f
Detection ratio: 2 / 53
First submission: 2014-07-25 18:45:07 UTC
VirusTotal link: https://www.virustotal.com/en/file/78c076664d94fbb6fecfc16e08e5155ffee947a5a8867f1bc2268be9e2c97faf/analysis/
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (not including ET INFO or ET POLICY events):
- 20:56:01 UTC - 194.58.101.49:80 - 172.16.165.132:49182 - ET CURRENT_EVENTS XMLDOM Check for Presence TrendMicro AV Observed in RIG EK (sid:2018757)
- 20:56:01 UTC - 194.58.101.49:80 - 172.16.165.132:49182 - ET CURRENT_EVENTS XMLDOM Check for Presence Kaspersky AV Observed in RIG EK (sid:2018756)
- 20:56:08 UTC - 172.16.165.132:49182 - 194.58.101.49:80 - ET CURRENT_EVENTS Goon/Infinity URI Struct EK Landing May 05 2014 (sid:2018441)
- 20:56:18 UTC - 194.58.101.49:80 - 172.16.165.132:49191 - ET CURRENT_EVENTS GoonEK encrypted binary (3) (sid:2018297)
- 20:58:21 UTC - 188.241.116.231:443 - 172.16.165.132:49199 - ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (KINS C2) (sid:2018725)
- 20:58:21 UTC - 188.241.116.231:443 - 172.16.165.132:49199 - ET TROJAN Self-Signed Cert Observed in Various Zbot Strains (sid:2018284)
Sourcefire VRT ruleset from Snort 2.9.6.0 on Ubuntu 14.04 LTS:
- 20:56:08 UTC - 172.16.165.132:49182 - 194.58.101.49:80 - [1:30936:3] EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure
- 20:56:08 UTC - 172.16.165.132:49191 - 194.58.101.49:80 - [1:30936:3] EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure
- 20:56:09 UTC - 194.58.101.49:80 - 172.16.165.132:49191 - [1:28612:2] EXPLOIT-KIT Multiple exploit kit Silverlight exploit download
- 20:56:09 UTC - 194.58.101.49:80 - 172.16.165.132:49191 - [1:28612:2] EXPLOIT-KIT Multiple exploit kit Silverlight exploit download
- 20:56:15 UTC - 172.16.165.2:53 - 172.16.165.132:50992 - [1:254:15] PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no authority
- 20:56:15 UTC - 172.16.165.132:49191 - 194.58.101.49:80 - [1:30936:3] EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure
- 20:56:18 UTC - 194.58.101.49:80 - 172.16.165.132:49191 - [1:30934:2] EXPLOIT-KIT Goon/Infinity/Rig exploit kit encrypted binary download
- 20:58:20 UTC - 172.16.165.2:53 - 172.16.165.132:49193 - [1:254:15] PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no authority
- 21:00:25 UTC - 172.16.165.2:53 - 172.16.165.132:65258 - [1:254:15] PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no authority
FINAL NOTES
Once again, here are the associated files:
- ZIP of PCAP(s): 2014-07-25-Rig-EK-traffic.pcap.zip
- ZIP of the malware: 2014-07-25-Rig-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.