2014-08-01 - NUCLEAR EK FROM 85.159.213.246 - PARALETAS.PATMOS-STAR.COM
ASSOCIATED FILES:
- ZIP of PCAP(s): 2014-08-01-Nuclear-EK-traffic.pcap.zip
- ZIP of the malware: 2014-08-01-Nuclear-EK-malware.zip
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 95.85.17.107 - cucnaterafos.amtranexperts.com - Malicious redirect
- 85.159.213.246 - paraletas.patmos-star.com - Nuclear EK
- Various IP addresses - Post-infection traffic (see below)
REDIRECT (REPEATED):
- 2014-08-01 00:52:30 UTC - 172.16.165.132:49475 - 95.85.17.107:80 - cucnaterafos.amtranexperts.com - GET /roriskajetas15.html
- 2014-08-01 00:52:30 UTC - 172.16.165.132:49476 - 95.85.17.107:80 - cucnaterafos.amtranexperts.com - GET /roriskajetas15.html
- 2014-08-01 00:52:30 UTC - 172.16.165.132:49478 - 95.85.17.107:80 - cucnaterafos.amtranexperts.com - GET /roriskajetas15.html
- 2014-08-01 00:52:30 UTC - 172.16.165.132:49477 - 95.85.17.107:80 - cucnaterafos.amtranexperts.com - GET /roriskajetas15.html
- 2014-08-01 00:52:30 UTC - 172.16.165.132:49479 - 95.85.17.107:80 - cucnaterafos.amtranexperts.com - GET /roriskajetas15.html
NUCLEAR EK:
- 2014-08-01 00:52:30 UTC - 172.16.165.132:49480 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /32af58c4ga4.html
- 2014-08-01 00:52:30 UTC - 172.16.165.132:49481 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /32af58c4ga4.html
- 2014-08-01 00:52:30 UTC - 172.16.165.132:49482 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /32af58c4ga4.html
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49484 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /3597476258/1/1406832420.jar
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49486 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /3597476258/1/1406832420.jar
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49485 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /3597476258/1/1406832420.jar
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49486 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /f/1/1406832420/3597476258/2
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49487 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /f/1/1406832420/3597476258/2
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49488 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /f/1/1406832420/3597476258/2
- 2014-08-01 00:52:42 UTC - 172.16.165.132:49486 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /f/1/1406832420/3597476258/2/2
- 2014-08-01 00:52:42 UTC - 172.16.165.132:49487 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /f/1/1406832420/3597476258/2/2
- 2014-08-01 00:52:42 UTC - 172.16.165.132:49488 - 85.159.213.246:80 - paraletas.patmos-star.com - GET /f/1/1406832420/3597476258/2/2
POST-INFECTION TRAFFIC:
- 2014-08-01 00:53:32 UTC - 172.16.165.132:49498 - 74.125.228.49:80 - www.google.com - GET /
- Numerous attempts to connect with different mail servers over port 25
Also saw encrypted TCP streams to the following IP addresses:
- 2014-08-01 00:52:56 UTC - 172.16.165.132:49491 - 111.121.193.238:443
- 2014-08-01 00:53:27 UTC - 172.16.165.132:49493 - 77.120.107.90:44510
- 2014-08-01 00:53:31 UTC - 172.16.165.132:49494 - 103.15.107.118:12510
- 2014-08-01 00:53:31 UTC - 172.16.165.132:49495 - 174.138.165.90:12510
- 2014-08-01 00:53:31 UTC - 172.16.165.132:49496 - 188.190.114.109:12510
- 2014-08-01 00:53:31 UTC - 172.16.165.132:49497 - 85.114.141.62:12510
- 2014-08-01 00:54:01 UTC - 172.16.165.132:49529 - 77.120.107.90:44510
- 2014-08-01 00:55:04 UTC - 172.16.165.132:49572 - 77.120.107.90:44510
- 2014-08-01 00:55:37 UTC - 172.16.165.132:49587 - 77.120.107.90:44510
Information on these callback IP addresses:
- 77.120.107.90 - Ukraine, Kiev - Kyivski Telekomunikatsiyni Merezhi, LLC - Viola DC
- 85.114.141.62 - Germany, Dusseldorf - Fast IT Colocation
- 103.15.107.118 - Hong Kong - Hong Kong IDC (Gigabit hosting)
- 111.121.193.238 - China, Guiyang - China Telecom
- 174.138.165.90 - United States, Phoenix AZ - Webquest,Inc
- 188.190.114.109 - Ukraine, Kharkiv - Infium LLC
PRELIMINARY MALWARE ANALYSIS
JAVA EXPLOIT:
File name: 2014-08-01-Nuclear-EK-java-exploit.jar
File size: 11.2 KB ( 11474 bytes )
MD5 hash: 8851958384b1cbb376e6c4c25aced05a
Detection ratio: 0 / 54
First submission: 2014-08-01 02:29:49 UTC
VirusTotal link: https://www.virustotal.com/en/file/c737abdecbf3b7856a5eebda668af46b95a469ea4c8987e9fa2304cade48d121/analysis/
MALWARE PAYLOAD:
File name: 2014-08-01-Nuclear-EK-malware-payload.exe
File size: 158.9 KB ( 162744 bytes )
MD5 hash: 0e2a570edd577f27ba711afd9557f718
Detection ratio: 3 / 53
First submission: 2014-08-01 02:30:06 UTC
VirusTotal link: https://www.virustotal.com/en/file/a9dd22ce9baf671e1a2b07203e237fdbb21f9f8d509b3c1157f350b445e7dd47/analysis/
Totalhash link: http://totalhash.com/analysis/0e962aab55a923dbde1afae9f7c29c0974126674
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (without ET POLICY or ET INFO events):
- 2014-08-01 00:52:30 UTC - 85.159.213.246:80 - 172.16.165.132:49482 - ET CURRENT_EVENTS DRIVEBY Nuclear EK Landing May 23 2014 (sid:2018595)
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49484 - 85.159.213.246:80 - ET CURRENT_EVENTS Nuclear EK JAR URI Struct Nov 05 2013 (sid:2017666)
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49486 - 85.159.213.246:80 - ET CURRENT_EVENTS Nuclear EK Payload URI Struct Nov 05 2013 (sid:2017667)
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 - 172.16.165.132: 49486 - ET CURRENT_EVENTS Blackhole Exploit Kit Delivering Executable to Client (sid:2013962)
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 - 172.16.165.132: 49486 - ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby (sid:2013036)
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 - 172.16.165.132: 49486 - ET TROJAN VMProtect Packed Binary Inbound via HTTP - Likely Hostile (sid:2009080)
- 2014-08-01 00:53:32 UTC - 172.16.165.132: 49498 - 74.125.228.49:80 - ET USER_AGENTS Internet Explorer 6 in use - Significant Security Risk (sid:2010706)
- 2014-08-01 00:53:32 UTC - 172.16.165.132: 49498 - 74.125.228.49:80 - ETPRO TROJAN unknown google.com connectivity check (sid:2808012)
- 2014-08-01 00:53:32 UTC - 172.16.165.132: 49498 - 74.125.228.49:80 - ET USER_AGENTS User Agent Containing http Suspicious - Likely Spyware/Trojan (sid:2003394)
Sourcefire VRT ruleset from Snort 2.9.6.2 on Ubuntu 14.04 LTS:
- 172.16.165.2:53 - 172.16.165.132:various - [1:254:15] PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no authority (numerous times throughout pcap)
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49484 -> 85.159.213.246:80 - [1:30219:2] EXPLOIT-KIT Nuclear exploit kit outbound jar request
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49486 -> 85.159.213.246:80 - [1:30219:2] EXPLOIT-KIT Nuclear exploit kit outbound jar request
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49485 -> 85.159.213.246:80 - [1:30219:2] EXPLOIT-KIT Nuclear exploit kit outbound jar request
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49486 - [1:27816:5] EXPLOIT-KIT Multiple exploit kit jar file download attempt
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49486 -> 85.159.213.246:80 - [1:30220:2] EXPLOIT-KIT Nuclear exploit kit outbound payload request
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49485 - [1:27816:5] EXPLOIT-KIT Multiple exploit kit jar file download attempt
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49484 - [1:27816:5] EXPLOIT-KIT Multiple exploit kit jar file download attempt
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49487 -> 85.159.213.246:80 - [1:30220:2] EXPLOIT-KIT Nuclear exploit kit outbound payload request
- 2014-08-01 00:52:41 UTC - 172.16.165.132:49488 -> 85.159.213.246:80 - [1:30220:2] EXPLOIT-KIT Nuclear exploit kit outbound payload request
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49486 - [1:11192:16] FILE-EXECUTABLE download of executable content
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49486 - [1:25042:3] EXPLOIT-KIT Java User-Agent downloading Portable Executable - Possible exploit kit
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49486 - [1:28593:1] EXPLOIT-KIT Multiple exploit kit payload download
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49486 - [1:28423:1] EXPLOIT-KIT Multiple exploit kit single digit exe detection
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49486 - [1:15306:18] FILE-EXECUTABLE Portable Executable binary file magic detected
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49487 - [1:11192:16] FILE-EXECUTABLE download of executable content
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49487 - [1:25042:3] EXPLOIT-KIT Java User-Agent downloading Portable Executable - Possible exploit kit
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49487 - [1:28593:1] EXPLOIT-KIT Multiple exploit kit payload download
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49487 - [1:28423:1] EXPLOIT-KIT Multiple exploit kit single digit exe detection
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49487 - [1:15306:18] FILE-EXECUTABLE Portable Executable binary file magic detected
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49488 - [1:11192:16] FILE-EXECUTABLE download of executable content
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49488 - [1:25042:3] EXPLOIT-KIT Java User-Agent downloading Portable Executable - Possible exploit kit
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49488 - [1:28593:1] EXPLOIT-KIT Multiple exploit kit payload download
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49488 - [1:28423:1] EXPLOIT-KIT Multiple exploit kit single digit exe detection
- 2014-08-01 00:52:41 UTC - 85.159.213.246:80 -> 172.16.165.132:49488 - [1:15306:18] FILE-EXECUTABLE Portable Executable binary file magic detected
- 2014-08-01 00:52:42 UTC - 172.16.165.132:49486 -> 85.159.213.246:80 - [1:30220:2] EXPLOIT-KIT Nuclear exploit kit outbound payload request
- 2014-08-01 00:52:42 UTC - 172.16.165.132:49487 -> 85.159.213.246:80 - [1:30220:2] EXPLOIT-KIT Nuclear exploit kit outbound payload request
- 2014-08-01 00:52:42 UTC - 172.16.165.132:49488 -> 85.159.213.246:80 - [1:30220:2] EXPLOIT-KIT Nuclear exploit kit outbound payload request
- 2014-08-01 00:52:42 UTC - 85.159.213.246:80 -> 172.16.165.132:49486 - [1:28423:1] EXPLOIT-KIT Multiple exploit kit single digit exe detection
- 2014-08-01 00:52:42 UTC - 85.159.213.246:80 -> 172.16.165.132:49487 - [1:28423:1] EXPLOIT-KIT Multiple exploit kit single digit exe detection
- 2014-08-01 00:52:42 UTC - 85.159.213.246:80 -> 172.16.165.132:49488 - [1:28423:1] EXPLOIT-KIT Multiple exploit kit single digit exe detection
FINAL NOTES
Once again, here are the associated files:
- ZIP of PCAP(s): 2014-08-01-Nuclear-EK-traffic.pcap.zip
- ZIP of the malware: 2014-08-01-Nuclear-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.