2014-09-09 - (FILELESS INFECTION BY) ANGLER EK FROM 46.105.140.56 - TSEVID-SYNONYMI.JUSTDANCEATSEA.COM:8080
ASSOCIATED FILES:
- ZIP of the pcap(s): 2014-09-09-Angler-EK-traffic.pcap.zip
- ZIP of the malware: 2014-09-09-Angler-EK-malware.zip
NOTES:
- This is the same type of fileless infection Angler EK traffic seen yestersday ( link ).
- The malware payload and post-infection traffic are similar, if not the same, in many aspects.
- For more info on this traffic, see Kafeine's blog entry at: http://malware.dontneedcoffee.com/2014/08/angler-ek-now-capable-of-fileless.html
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 46.105.140.56 - tsevid-synonymi.justdanceatsea.com:8080 - Angler EK
- 94.126.178.29 - hgyudheedieibxy.com - Post-infection callback
- 95.141.36.218 - knpqxlxcwtlvgrdyhd.com - Post-infection callback
- 166.78.62.91 - hufqifjq.com - Post-infection callback
- 176.31.62.76 - itktxexjghvvxa.com - Post-infection callback
- 188.165.251.195 - qcemzrfxxqimzkxm.com - Post-infection callback
- 217.23.13.42 - nvlyffua.com - Post-infection callback
ANGLER EK:
- 14:46:06 UTC - local_host:49178 - tsevid-synonymi.justdanceatsea.com:8080 - GET /ndf4xx22ci.php
- 14:46:10 UTC - local_host:49178 - tsevid-synonymi.justdanceatsea.com:8080 - GET /2PDhzjcalvXNHRjbdIr_pYDT-RwxtCyNvhwWSNQG8UHziCD_2sXHdfXNVFeVxfaF
- 14:46:13 UTC - local_host:49178 - tsevid-synonymi.justdanceatsea.com:8080 - GET /6SuCHKKkf8Sf1aFXJPqD0R6r3oEDCrbwHFm23EU-Af2zwWdHgpn6mEGu5XlxFust
- 14:46:19 UTC - local_host:49178 - tsevid-synonymi.justdanceatsea.com:8080 - GET /qNhs3siJoyRLr08gTN2oi0yS2KzELEtEBHps8ABO_2TrPqlRwTrHzmsmUOn3-15Q
- 14:46:30 UTC - local_host:49178 - tsevid-synonymi.justdanceatsea.com:8080 - GET /NahZL2m_tDjEenoQf0wAuM3WwN1RqgWKxWS-E0rhoJMFKgt39hOhWWcUu7Vh5hK2
- 14:46:33 UTC - local_host:49178 - tsevid-synonymi.justdanceatsea.com:8080 - GET /sBb9d4H4_Bvq04nqS_GG1P5kPU7HhPyGSNTpTgt58amKZEG_ChEG3hfozXg7XBOP
POST-INFECTION TRAFFIC TO LEGITIMATE DOMAINS:
- 14:46:17 UTC - local_host:49180 - 208.113.226.171:80 - www.earthtools.org - POST /timezone/0/0
- 14:46:18 UTC - local_host:49181 - 23.206.109.98:80 - www.ecb.europa.eu - POST /stats/eurofxref/eurofxref-hist-90d.xml
- 14:46:25 UTC - local_host:49184 - 2.16.216.200:80 - www.download.windowsupdate.com - GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab
- 14:46:39 UTC - local_host:49188 - 208.113.226.171:80 - www.earthtools.org - POST /timezone/0/0
- 14:46:40 UTC - local_host:49181 - 23.206.109.98:80 - www.ecb.europa.eu - POST /stats/eurofxref/eurofxref-hist-90d.xml
- 14:46:50 UTC - local_host:49195 - 208.113.226.171:80 - www.earthtools.org - POST /timezone/0/0
- 14:46:51 UTC - local_host:49196 - 2.18.2.98:80 - www.ecb.europa.eu - POST /stats/eurofxref/eurofxref-hist-90d.xml
NOTE: These appear to be checking for location (www.earthtools.org) and connectivity. HTTP POST requests to the European Central Bank home page (www.ecb.europa.eu) sent zero bytes of post data and returned XML data on exchange rates. There was also traffic to www.google.com, but only saw several 3-way handshakes with the connection immediately FIN-ed by the server. Examine the pcap file for more details.
POST-INFECTION TRAFFIC TO MALWARE DOMAINS:
- 14:46:23 UTC - local_host:49183 - 188.165.251.195:443 - encrypted traffic to: qcemzrfxxqimzkxm.com
- 14:46:32 UTC - local_host:49186 - 188.165.251.195:443 - encrypted traffic to: qcemzrfxxqimzkxm.com
- 14:46:42 UTC - local_host:49190 - 217.23.13.42:443 - encrypted traffic to: nvlyffua.com
- 14:46:42 UTC - local_host:49191 - 94.126.178.29:443 - encrypted traffic to: hgyudheedieibxy.com
- 14:46:42 UTC - local_host:49192 - 95.141.36.218:443 - encrypted traffic to: knpqxlxcwtlvgrdyhd.com
- 14:46:43 UTC - local_host:49193 - 166.78.62.91:443 - encrypted traffic to: hufqifjq.com
- 14:46:43 UTC - local_host:49194 - 176.31.62.76:443 - encrypted traffic to: itktxexjghvvxa.com
- 14:46:56 UTC - local_host:49197 - 188.165.251.195:443 - encrypted traffic to: qcemzrfxxqimzkxm.com
- 14:47:09 UTC - local_host:49198 - 217.23.13.42:443 - encrypted traffic to: nvlyffua.com
- 14:48:24 UTC - local_host:49200 - 217.23.13.42:443 - encrypted traffic to: nvlyffua.com
- 14:49:38 UTC - local_host:49202 - 217.23.13.42:443 - encrypted traffic to: nvlyffua.com
- 14:50:47 UTC - local_host:49204 - 217.23.13.42:443 - encrypted traffic to: nvlyffua.com
- 14:51:55 UTC - local_host:49206 - 217.23.13.42:443 - encrypted traffic to: nvlyffua.com
- 14:53:03 UTC - local_host:49208 - 217.23.13.42:443 - encrypted traffic to: nvlyffua.com
- 14:54:13 UTC - local_host:49210 - 217.23.13.42:443 - encrypted traffic to: nvlyffua.com
NOTE: Also saw numerous DGA-style domains that didn't resolve. Examine the pcap file for more details.
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT:
File name: 2014-09-09-Angler-EK-flash-exploit.swf
File size: 75.3 KB ( 77068 bytes )
MD5 hash: 67ca9a31f220bc7b68f203c07ad668b9
Detection ratio: 1 / 55
First submission: 2014-09-08 14:58:31 UTC
VirusTotal link: https://www.virustotal.com/en/file/350836364013549b6a76aab79d57d109df6acc143759e24a952d3ff5d6a76ec4/analysis/
JAVA EXPLOIT:
File name: 2014-09-09-Angler-EK-java-exploit.jar
File size: 28.1 KB ( 28768 bytes )
MD5 hash: b7b59e710aca39073c67cda53871111e
Detection ratio: 14 / 53
First submission: 2014-09-04 08:25:44 UTC
VirusTotal link: https://www.virustotal.com/en/file/c6a5c9154b088c1ae8ccaeb7b987ae560a5325ab389f994619c92bc71610f17b/analysis/
MALWARE PAYLOAD:
File name: 2014-09-09-Angler-EK-malware-payload.dll
File size: 168.9 KB ( 172912 bytes )
MD5 hash: fc1e3c8bde2558636c8fc82de9bb38e9
Detection ratio: 2 / 54
First submission: 2014-09-09 15:22:03 UTC
VirusTotal link: https://www.virustotal.com/en/file/a098ef3e4d3cae52eaf32d0fe96400e91bf5cf29affa181d509d54008261e6f9/analysis/
DROPPED MALWARE 1 OF 2:
File name: 2014-09-09-Angler-EK-dropped-malware-1-of-2.exe
File size: 102.0 KB ( 104448 bytes )
MD5 hash: bbf0706b0591053cdedfcd5f6dfb19d6
Detection ratio: 4 / 53
First submission: 2014-09-09 15:23:09 UTC
VirusTotal link: https://www.virustotal.com/en/file/2df550dc4ef794692eea171420658827804b2b93cb39fc0b3990f75b6d1b29c1/analysis/
DROPPED MALWARE 2 OF 2:
File name: 2014-09-09-Angler-EK-dropped-malware-2-of-2.exe
File size: 490.5 KB ( 502284 bytes )
MD5 hash: ab6c0871794252ab3f6a2c97d87c9857
Detection ratio: 4 / 55
First submission: 2014-09-09 15:23:33 UTC
VirusTotal link: https://www.virustotal.com/en/file/ee549fef895947a50641c96491c1e6e13c4bcd3c9f0eaa95ad5e5593a65c673e/analysis/
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (without ET POLICY or ET INFO events):
- 2014-09-09 14:46:07 UTC - 46.105.140.56:8080 - 192.168.204.139:49178 - ETPRO CURRENT_EVENTS DRIVEBY Angler EK Apr 01 2014 (sid:2807913)
- 2014-09-09 14:46:10 UTC - 46.105.140.56:8080 - 192.168.204.139:49179 - ET CURRENT_EVENTS Angler Encoded Shellcode IE (sid:2018954)
- 2014-09-09 14:46:19 UTC - 192.168.204.2:53 - 192.168.204.139:55992 - ET DNS Standard query response, Name Error (sid:2001117)
- 2014-09-09 14:46:19 UTC - 46.105.140.56:8080 - 192.168.204.139:49182 - ET CURRENT_EVENTS Angler Encoded Shellcode Flash (sid:2018956)
- 2014-09-09 14:46:34 UTC - 46.105.140.56:8080 - 192.168.204.139:49187 - ET CURRENT_EVENTS Angler Encoded Shellcode Java (sid:2018957)
- 2014-09-09 14:46:43 UTC - 192.168.204.2:53 - 192.168.204.139:54850 - ET DNS Reply Sinkhole - Zinkhole.org (sid:2016419)
- 2014-09-09 14:46:43 UTC - 192.168.204.139:49194 - 176.31.62.76:443 - ET TROJAN Connection to Zinkhole Sinkhole IP (Possible Infected Host) (sid:2016419)
- 2014-09-09 14:46:43 UTC - 192.168.204.139:49190 - 217.23.13.42:443 - ET TROJAN Win32/Ramnit Checkin (sid:2018558)
- 2014-09-09 14:46:43 UTC - 192.168.204.2:53 - 192.168.204.139:55860 - ET CURRENT_EVENTS Zeus GameOver Possible DGA NXDOMAIN Responses (sid:2018316)
Sourcefire VRT ruleset from Snort 2.9.6.2 on Ubuntu 14.04 LTS:
- 2014-09-09 14:46:16 UTC - 192.168.204.139:49178 - 46.105.140.56:8080 - [120:8:2] (http_inspect) INVALID CONTENT-LENGTH OR CHUNK SIZE
- 2014-09-09 UTC - 192.168.204.139:various - various:443 - [1:31528:1] MALWARE-CNC Win.Trojan.Ramnit variant outbound detected (x12)
- 2014-09-09 UTC - 192.168.204.139:various - various:443 - [1:31527:1] MALWARE-CNC Win.Trojan.Ramnit variant outbound detected (x30)
FINAL NOTES
Once again, here are the associated files:
- ZIP of the pcap(s): 2014-09-09-Angler-EK-traffic.pcap.zip
- ZIP of the malware: 2014-09-09-Angler-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.