2014-07-30 - RIG EK FROM 194.58.101.116 - FINISH.RESINBONDING.COM
ASSOCIATED FILES:
- ZIP of PCAP(s): 2014-07-30-Rig-EK-traffic.pcap.zip
- ZIP of the malware: 2014-07-30-Rig-EK-malware.zip
NOTES:
- Since early July 2014, people have been reporting pages from www.metro.us to the various malware-related sites I normally review.
- Today I used that site to generate Rig exploit kit traffic and infect a VM with (what I believe is) a Carberp/Rovnix variant.
- Indicators of possible compromise have been noted starting earlier this month:
- From scumware.org
- From Clean MX VirusWatch
- From urlquery.net
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 205.218.24.245 - www.metro.us - Compromised website
- 78.47.178.164 - gagle.us - Redirect
- 194.58.101.116 - finish.resinbonding.com - Rig EK
- 91.220.131.196 - Post-infection traffic over TCP port 443 (not HTTPS, not HTTP)
COMPROMISED WEBSITE AND REDIRECT CHAIN:
- 2014-07-30 00:54:10 UTC - 172.16.165.136:49170 - 205.218.24.245:80 - www.metro.us - GET /
- 2014-07-30 00:54:11 UTC - 172.16.165.136:49170 - 205.218.24.245:80 - www.metro.us - GET /newyork/
- 2014-07-30 00:54:16 UTC - 172.16.165.136:49195 - 78.47.178.164 :80 - gagle.us - GET /?mt
- 2014-07-30 00:54:17 UTC - 172.16.165.136:49195 - 78.47.178.164 :80 - gagle.us - GET /link.php
RIG EK:
- 2014-07-30 00:54:17 UTC - 172.16.165.136:49217 - 194.58.101.116:80 - finish.resinbonding.com - GET /?PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|Nzg0MTZhZGVjM2FjODFjMTRhMWZkMjViODhjOTg0MDQ - 2014-07-30 00:54:22 UTC - 172.16.165.136:49217 - 194.58.101.116:80 - finish.resinbonding.com - GET /index.php?req=mp3&num=32&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg%7CNzg0MTZhZGVjM2FjODFjMTRhMWZkMjViODhjOTg0MDQ - 2014-07-30 00:54:27 UTC - 172.16.165.136:49217 - 194.58.101.116:80 - finish.resinbonding.com - GET /index.php?req=swf&num=8778&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|Nzg0MTZhZGVjM2FjODFjMTRhMWZkMjViODhjOTg0MDQ - 2014-07-30 00:54:27 UTC - 172.16.165.136:49256 - 194.58.101.116:80 - finish.resinbonding.com - GET /index.php?req=xap&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|Nzg0MTZhZGVjM2FjODFjMTRhMWZkMjViODhjOTg0MDQ - 2014-07-30 00:54:28 UTC - 172.16.165.136:49217 - 194.58.101.116:80 - finish.resinbonding.com - GET /index.php?req=mp3&num=21637&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg%7CNzg0MTZhZGVjM2FjODFjMTRhMWZkMjViODhjOTg0MDQ
POST-INFECTION TRAFFIC:
- 2014-07-30 00:54:30 UTC - 172.16.165.136:49258 - 91.220.131.196:443 - C36C4AEB-1003-3C52-6BCE-D530CD62B2DC-01.............c.Cn
- 2014-07-30 00:54:36 UTC - 172.16.165.136:49260 - 91.220.131.196:443 - C36C4AEB-1003-3C52-6BCE-D530CD62B2DC-01.............c.Cn
- 2014-07-30 00:55:42 UTC - 172.16.165.136:49261 - 91.220.131.196:443 - C36C4AEB-1003-3C52-6BCE-D530CD62B2DC-01.............c.Cn
- 2014-07-30 00:56:41 UTC - 172.16.165.136:49262 - 91.220.131.196:443 - C36C4AEB-1003-3C52-6BCE-D530CD62B2DC-01.............c.Cn
- 2014-07-30 00:57:42 UTC - 172.16.165.136:49263 - 91.220.131.196:443 - C36C4AEB-1003-3C52-6BCE-D530CD62B2DC-01.............c.Cn
- 2014-07-30 00:59:03 UTC - 172.16.165.136:49264 - 91.220.131.196:443 - C36C4AEB-1003-3C52-6BCE-D530CD62B2DC-01.............c.Cn
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT:
File name: 2014-07-30-Rig-EK-flash-exploit.swf
File size: 4.4 KB ( 4459 bytes )
MD5 hash: 9ae59cc660c22ed9c61b70fd61544b0f
Detection ratio: 0 / 54
First submission: 2014-07-30 01:00:47 UTC
VirusTotal link: https://www.virustotal.com/en/file/68b53f82bc7f65dc672699dd72ecd8583b15cf0135ca64922350410238b42f4a/analysis/
SILVERLIGHT EXPLOIT:
File name: 2014-07-30-Rig-EK-silverlight-exploit.xap
File size: 47.2 KB ( 48324 bytes )
MD5 hash: 634437ccafcba0e951d1d1c034f8d736
Detection ratio: 3 / 53
First submission: 2014-07-28 17:46:17 UTC
VirusTotal link: https://www.virustotal.com/en/file/632c769483c1d63e59cb1f9f83375c2fc7aa6fb47d5e13a0898084453090597d/analysis/
MALWARE PAYLOAD:
File name: 2014-07-30-Rig-EK-malware-payload.exe
File size: 308.0 KB ( 315392 bytes )
MD5 hash: e821d7334d2ecc6bdbe899fa67830dad
Detection ratio: 2 / 53
First submission: 2014-07-30 01:00:00 UTC
VirusTotal link: https://www.virustotal.com/en/file/995c0a36805fe6a95aee37748e24230edad1350321dc6cd7acf0c2de0326010f/analysis/
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (not including ET INFO or ET POLICY rules):
- 00:54:12 UTC - 205.218.24.245:80 - 172.16.165.136:49170 - ET WEB_CLIENT Possible String.FromCharCode Javascript Obfuscation Attempt (sid:2011347)
- 00:54:19 UTC - 194.58.101.116:80 - 172.16.165.136:49217 - ET CURRENT_EVENTS Likely Evil XMLDOM Detection of Local File (sid:2018783)
- 00:54:19 UTC - 194.58.101.116:80 - 172.16.165.136:49217 - ET CURRENT_EVENTS XMLDOM Check for Presence TrendMicro AV Observed in RIG EK (sid:2018757)
- 00:54:19 UTC - 194.58.101.116:80 - 172.16.165.136:49217 - ET CURRENT_EVENTS XMLDOM Check for Presence Kaspersky AV Observed in RIG EK (sid:2018756)
- 00:54:22 UTC - 172.16.165.136:49217 - 194.58.101.116:80 - ET CURRENT_EVENTS Goon/Infinity URI Struct EK Landing May 05 2014 (sid:2018441)
- 00:54:25 UTC - 194.58.101.116:80 - 172.16.165.136:49217 - ET CURRENT_EVENTS GoonEK encrypted binary (3) (sid:2018297)
- 00:54:32 UTC - 172.16.165.136:49258 - 91.220.131.196:443 - ETPRO TROJAN Carberp/Rovnix Proxy Connection (sid:2808448)
Sourcefire VRT ruleset from Snort 2.9.6.0 on Ubuntu 14.04 LTS:
- 00:54:22 UTC - 172.16.165.136:49217 - 194.58.101.116:80 - [1:30936:3] EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure
- 00:54:25 UTC - 194.58.101.116:80 - 172.16.165.136:49217 - [1:30934:2] EXPLOIT-KIT Goon/Infinity/Rig exploit kit encrypted binary download
- 00:54:27 UTC - 172.16.165.136:49217 - 194.58.101.116:80 - [1:30936:3] EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure
- 00:54:27 UTC - 172.16.165.136:49256 - 194.58.101.116:80 - [1:30936:3] EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure
- 00:54:28 UTC - 172.16.165.136:49217 - 194.58.101.116:80 - [1:30936:3] EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure
- 00:54:28 UTC - 194.58.101.116:80 - 172.16.165.136:49256 - [1:28612:2] EXPLOIT-KIT Multiple exploit kit Silverlight exploit download
- 00:54:28 UTC - 194.58.101.116:80 - 172.16.165.136:49256 - [1:28612:2] EXPLOIT-KIT Multiple exploit kit Silverlight exploit download
- 00:54:31 UTC - 194.58.101.116:80 - 172.16.165.136:49217 - [1:30934:2] EXPLOIT-KIT Goon/Infinity/Rig exploit kit encrypted binary download
SCREEN SHOTS FROM THE TRAFFIC
Malicious iframe in page from compromised server:
Redirect chain pointing to Rig exploit kit:
After the Rig EK infection, here's an example of the traffic that triggered snort events for ETPRO TROJAN Carberp/Rovnix Proxy Connection:
FINAL NOTES
Once again, here are the associated files:
- ZIP of PCAP(s): 2014-07-30-Rig-EK-traffic.pcap.zip
- ZIP of the malware: 2014-07-30-Rig-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.