2014-08-22 - FIESTA EK FROM 64.202.116.154 - QOPQOP.IN.UA
ASSOCIATED FILES:
- ZIP of the pcap(s): 2014-08-22-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-08-22-Fiesta-EK-malware.zip
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 94.229.79.58 - www.scienceforums.net - Compromised website
- 176.102.38.75 - stringlikc.com - Redirect
- 64.202.116.154 - qopqop.in.ua - Fiesta EK
COMPROMISED WEBSITE AND REDIRECT:
- 16:01:29 UTC - 192.168.204.147:49328 - 94.229.79.58:80 - www.scienceforums.net - GET /
- 16:01:32 UTC - 192.168.204.147:49333 - 176.102.38.75:80 - stringlikc.com - GET /KAVwkEcsjMGlTH.js?GpCkLf=9361c4bd03176208687c9336054a51
FIESTA EK:
- 16:01:34 UTC - qopqop.in.ua - GET /igf35wx/2
- 16:01:36 UTC - qopqop.in.ua - GET /igf35wx/618dad325b41594d45465e5f535f070200040b5f5506030903025e53575c5504;118800;94
- 16:01:37 UTC - qopqop.in.ua - GET /igf35wx/1cfa1cce54eb6ce458060a5a035857550756555a0501535e04500056075b0553
- 16:01:38 UTC - qopqop.in.ua - GET /igf35wx/47f75bd48598ef5b475b100c075950040202550c0100540f01040000035a0202;4060531
- 16:01:39 UTC - qopqop.in.ua - GET /igf35wx/5d5aaf22779f09a9590d575a535d06020351065a5504020900575356575e5404;910
- 16:01:40 UTC - qopqop.in.ua - GET /igf35wx/23fcc40ca0596f1e51430d58510f0453040655585756005807000054550c5655;6
- 16:01:46 UTC - qopqop.in.ua - GET /igf35wx/23fcc40ca0596f1e51430d58510f0453040655585756005807000054550c5655;6;1
- 16:01:50 UTC - qopqop.in.ua - GET /igf35wx/1f0446a55556ab4952165b0f060d55050753030f0054510e04555603020e0754;4
- 16:01:56 UTC - qopqop.in.ua - GET /igf35wx/1f0446a55556ab4952165b0f060d55050753030f0054510e04555603020e0754;4;1
- 16:02:17 UTC - qopqop.in.ua - GET /igf35wx/1ece446ba0596f1e5215085e060f02520750505e0056065904560552020c5054;5
- 16:02:23 UTC - qopqop.in.ua - GET /igf35wx/1ece446ba0596f1e5215085e060f02520750505e0056065904560552020c5054;5;1
- 16:02:24 UTC - qopqop.in.ua - GET /igf35wx/557d004603e79f785447565f020b00060300045f0452040d0006515306085200
- 16:02:30 UTC - qopqop.in.ua - GET /igf35wx/394cdea86b5250b850415158565e5508050c075850075103060a5254525d070e;1;2
- 16:02:36 UTC - qopqop.in.ua - GET /igf35wx/394cdea86b5250b850415158565e5508050c075850075103060a5254525d070e;1;2;1
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT:
File name: 2014-08-22-Fiesta-EK-flash-exploit.swf
File size: 9.9 KB ( 10129 bytes )
MD5 hash: 094590df1b3069fdded1f54578711f92
Detection ratio: 0 / 55
First submission: 2014-08-22 12:59:05 UTC
VirusTotal link: https://www.virustotal.com/en/file/f9c4824f94199d22836ff2efa40013c771532e1d9db797dc4dac71d32b8d2ccc/analysis/
JAVA EXPLOIT:
File name: 2014-08-22-Fiesta-EK-java-exploit.jar
File size: 5.0 KB ( 5121 bytes )
MD5 hash: 1a7297d283505c4f7fd536d8801034e8
Detection ratio: 6 / 54
First submission: 2014-08-22 11:40:01 UTC
VirusTotal link: https://www.virustotal.com/en/file/1b10c2a30b45ad4c72d905a0e06ab4d1c50832734ecda199f276a4904e9cda09/analysis/
PDF EXPLOIT:
File name: 2014-08-22-Fiesta-EK-pdf-exploit.pdf
File size: 6.9 KB ( 7032 bytes )
MD5 hash: 76e0b26a1e14dfaf1b89880f3bb8c0f4
Detection ratio: 4 / 52
First submission: 2014-08-23 15:45:24 UTC
VirusTotal link: https://www.virustotal.com/en/file/ef28f595436d36f468df3b47427aa6627de4eabe543d6018833c7be65572cc17/analysis/
SILVERLIGHT EXPLOIT:
File name: 2014-08-22-Fiesta-EK-silverlight-exploit.xap
File size: 21.8 KB ( 22310 bytes )
MD5 hash: e68b1d99c0874d163a13aad634219fa0
Detection ratio: 1 / 55
First submission: 2014-08-22 17:04:57 UTC
VirusTotal link: https://www.virustotal.com/en/file/d82f544a10a932c1ab947bd481836d770a6704edc5fc5b1130255ed57a3a9d19/analysis/
MALWARE PAYLOAD:
File name: 2014-08-22-Fiesta-EK-malware-payload.exe
File size: 447.0 KB ( 457728 bytes )
MD5 hash: 34e0d3ab5e72377db1f5fb66952ce511
Detection ratio: 12 / 51
First submission: 2014-08-22 14:54:16 UTC
VirusTotal link: https://www.virustotal.com/en/file/49786bb07234b142a18f5c976b45252c1c96133e0d9e29386d1a0de337e9178b/analysis/
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (without ET POLICY or ET INFO events):
- 2014-08-22 15:59:19 UTC - 192.168.204.147:49333 - 176.102.38.75:80 ET CURRENT_EVENTS Fiesta EK randomized javascript Gate Jul 18 2014 (sid:2018741)
- 2014-08-22 16:01:36 UTC - 192.168.204.147:49354 - 64.202.116.154:80 - ET CURRENT_EVENTS Fiesta URI Struct (sid:2018407)
- 2014-08-22 16:01:38 UTC - 64.202.116.154:80 - 192.168.204.147:49357 - ET CURRENT_EVENTS Fiesta SilverLight Exploit Download (sid:2018409)
- 2014-08-22 16:01:38 UTC - 64.202.116.154:80 - 192.168.204.147:49354 - ET CURRENT_EVENTS Fiesta Flash Exploit Download (sid:2018411)
- 2014-08-22 16:01:39 UTC - 64.202.116.154:80 - 192.168.204.147:49362 - ET CURRENT_EVENTS Fiesta PDF Exploit Download (sid:2018408)
- 2014-08-22 16:01:39 UTC - 64.202.116.154:80 - 192.168.204.147:49362 - ETPRO WEB_CLIENT Adobe PDF Memory Corruption /Ff Dictionary Key Corruption (sid:2801334)
- 2014-08-22 16:01:39 UTC - 64.202.116.154:80 - 192.168.204.147:49362 - ET CURRENT_EVENTS PDF /XFA and PDF-1.[0-4] Spec Violation (seen in pamdql and other EKs) (sid:2016001)
- 2014-08-22 16:01:39 UTC - 64.202.116.154:80 - 192.168.204.147:49362 - ET WEB_CLIENT PDF With Embedded File (sid:2011507)
- 2014-08-22 16:01:39 UTC - 64.202.116.154:80 - 192.168.204.147:49362 - ET CURRENT_EVENTS DRIVEBY Incognito libtiff PDF Exploit Recieved (sid:2014316)
- 2014-08-22 16:02:24 UTC - 192.168.204.147:49367 - 64.202.116.154:80 - ET CURRENT_EVENTS Unknown - Java Request - gt 60char hex-ascii (sid:2014912)
Sourcefire VRT ruleset from Snort 2.9.6.0 on Ubuntu 14.04 LTS:
- 2014-08-22 16:01:36 UTC - 192.168.204.147:various - 64.202.116.154:80 - [1:29443:6] EXPLOIT-KIT Fiesta exploit kit outbound connection attempt (x13)
- 2014-08-22 16:01:39 UTC - 64.202.116.154:80 - 192.168.204.147:49362 - [1:23041:4] FILE-PDF EmbeddedFile contained within a PDF
SCREENSHOTS FROM THE TRAFFIC
Redirect pointing to Fiesta EK domain:
FINAL NOTES
Once again, here are the associated files:
- ZIP of the pcap(s): 2014-08-22-Fiesta-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-08-22-Fiesta-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.