2014-08-19 - FIESTA EK FROM 64.202.116.154 - QUATRO.IN.UA
ASSOCIATED FILES:
- ZIP of the pcap(s): 2014-08-19-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-08-19-Fiesta-EK-malware.zip
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 207.58.140.165 - www.visajourney.com - Compromised website
- 176.102.38.75 - glinkino.com - Redirect
- 64.202.116.154 - quatro.in.ua - Fiesta EK
COMPROMISED WEBSITE AND REDIRECT:
- 23:49:49 UTC - 172.16.165.133:49251 - 207.58.140.165:80 - www.visajourney.com - GET /
- 23:49:52 UTC - 172.16.165.133:49256 - 176.102.38.75:80 - glinkino.com - GET /UEeQS8gzsjY.js?NOAXGH4sTZQ=0c6f19eca255dbbab
FIESTA EK:
- 23:49:53 UTC - quatro.in.ua - GET /fm93lok/2
- 23:49:55 UTC - quatro.in.ua - GET /fm93lok/5c2b1e2f6fec03a046145459035e0354035003510a5150560e5601040200030706;112202;228
- 23:49:55 UTC - quatro.in.ua - GET /fm93lok/18e5c6ccc0e9b2d9585d090e510d5251070b5406580201530a0d56535053520202
- 23:49:55 UTC - quatro.in.ua - GET /fm93lok/3c6cd2239be66f47400f405856090301055007505f065003085605055757035200;4060129
- 23:50:04 UTC - quatro.in.ua - GET /fm93lok/1f19bed77416beed52165a02505e55050755000a595106070a53025f5100555604;4
- 23:50:10 UTC - quatro.in.ua - GET /fm93lok/1f19bed77416beed52165a02505e55050755000a595106070a53025f5100555604;4;1
- 23:50:11 UTC - quatro.in.ua - GET /fm93lok/6139f2329d751bd855415802540902000002020a5d0651020d04005f5557025305;6
- 23:50:17 UTC - quatro.in.ua - GET /fm93lok/6139f2329d751bd855415802540902000002020a5d0651020d04005f5557025305;6;1
- 23:50:41 UTC - quatro.in.ua - GET /fm93lok/61c1cf88390761455743020a515d090a0002520258525a080d0450575003095905
- 23:50:41 UTC - quatro.in.ua - GET /fm93lok/67fd3fbd9d751bd855470d5f015d535600045757085200540d0255020003530505;5
- 23:50:48 UTC - quatro.in.ua - GET /fm93lok/67fd3fbd9d751bd855470d5f015d535600045757085200540d0255020003530505;5;1
- 23:50:49 UTC - quatro.in.ua - GET /fm93lok/61c1cf88390761455743020a515d090a0002520258525a080d0450575003095905
- 23:50:51 UTC - quatro.in.ua - GET /fm93lok/04f7bd27a20b163a534c030c505f030506075704595050070b0155515101035603;1;2
- 23:51:00 UTC - quatro.in.ua - GET /fm93lok/04f7bd27a20b163a534c030c505f030506075704595050070b0155515101035603;1;2;1
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT:
File name: https://www.virustotal.com/en/file/14157ae7e01186cae2134239cb89c67992f46e1930e7eff4d9207aa8b8bc13a9/analysis/
File size: 9.9 KB ( 10149 bytes )
MD5 hash: 27018fcf2bd5913986b85fdb6984c864
Detection ratio: 0 / 41
First submission: 2014-08-18 23:29:38 UTC
VirusTotal link: https://www.virustotal.com/en/file/14157ae7e01186cae2134239cb89c67992f46e1930e7eff4d9207aa8b8bc13a9/analysis/
JAVA EXPLOIT:
File name: 2014-08-19-Fiesta-EK-java-exploit.jar
File size: 5.0 KB ( 5117 bytes )
MD5 hash: 2c0045b6c6e2db6674ba90459f66342a
Detection ratio: 6 / 53
First submission: 2014-08-18 11:11:23 UTC
VirusTotal link: https://www.virustotal.com/en/file/4b2709550a6ecbe21a1cec1c86f5117110b41f2d5d5f06280a75f3ab65e64f6d/analysis/
SILVERLIGHT EXPLOIT:
File name: 2014-08-19-Fiesta-EK-silverlight-exploit.xap
File size: 10.5 KB ( 10702 bytes )
MD5 hash: baace6aa770d0bbb85ff4440033d07ef
Detection ratio: 3 / 53
First submission: 2014-08-20 01:02:27 UTC
VirusTotal link: https://www.virustotal.com/en/file/2f06d12ff56bf7c7719e0288e95d81d37c6d2fd4de97ccb5d873c0a717c78aba/analysis/
MALWARE PAYLOAD:
File name: 2014-08-19-Fiesta-EK-malware-payload.exe
File size: 478.0 KB ( 489472 bytes )
MD5 hash: 7e3afae2e9ecc9cdf17e48ba4bed3613
Detection ratio: 3 / 53
First submission: 2014-08-20 01:02:42 UTC
VirusTotal link: https://www.virustotal.com/en/file/a0b27ee297ee789bc2ada5185751463ae58a1bdcfcbf9560e6f7e0bb244a4fa6/analysis/
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (without ET POLICY or ET INFO events):
- 23:49:52 UTC - 172.16.165.133:49256 - 176.102.38.75:80 - ET CURRENT_EVENTS Fiesta EK randomized javascript Gate Jul 18 2014 (sid:2018741)
- 23:49:55 UTC - 172.16.165.133:49260 - 64.202.116.154:80 - ET CURRENT_EVENTS Fiesta URI Struct (sid:2018407)
- 23:49:55 UTC - 64.202.116.154:80 - 172.16.165.133:49260 - ET CURRENT_EVENTS Fiesta Flash Exploit Download (sid:2018411)
- 23:49:56 UTC - 64.202.116.154:80 - 172.16.165.133:49264 - ET CURRENT_EVENTS Fiesta SilverLight Exploit Download (sid:2018409)
- 23:50:41 UTC - 172.16.165.133:49272 - 64.202.116.154:80 - ET CURRENT_EVENTS Unknown - Java Request - gt 60char hex-ascii (sid:2014912)
Sourcefire VRT ruleset from Snort 2.9.6.0 on Ubuntu 14.04 LTS:
- 23:49:55 UTC - 172.16.165.133:various - 64.202.116.154:80 - [1:29443:6] EXPLOIT-KIT Fiesta exploit kit outbound connection attempt (x8)
SCREENSHOTS FROM THE TRAFFIC
Malicious javascript in compromised website
Redirect pointign to Fiesta EK
FINAL NOTES
Once again, here are the associated files:
- ZIP of the pcap(s): 2014-08-19-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-08-19-Fiesta-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.