2014-09-23 - RIG EK FROM 178.132.203.26 - MDIF.BOROUGHVENTUREMENSWEAR.COM
ASSOCIATED FILES:
- ZIP of the pcap: 2014-09-23-Rig-EK-traffic.pcap.zip
- ZIP of the malware: 2014-09-23-Rig-EK-malware.zip
NOTES:
- This appears to be Operation Windigo serving Rig EK, which I first documented on
- Kafeine noted Windigo group moving from FlashPack to Rig EK back in July: http://malware.dontneedcoffee.com/2014/07/bye-bye-flash-ek-and-windigo-group.html
- For more information about Operation Windigo, ESET published a report avaialable here.
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 104.28.9.19 - www.ipadrental.hk - Compromised website
- 188.120.198.1 - 7pt5u45u8b1m3bm9hcm4bmn.ahik.net - Cushion redirect
- 188.120.198.1 - 7pt5u45u8b1m3bm9hcm4bmn519953ff25fe74b1d5f9ae6e2302945e4.ahik.ne - Cushion redirect
- 178.132.203.26 - mdif.boroughventuremenswear.com - Rig EK
COMPROMISED WEBSITE:
- 03:34:25 UTC - 192.168.204.137:49393 - 104.28.9.19:80 - www.ipadrental.hk - GET /
CUSHION REDIRECT AND RIG EK:
- 03:34:26 UTC - 192.168.204.137:49395 - 188.120.198.1:80 - 7pt5u45u8b1m3bm9hcm4bmn.ahik.net - GET /index.php?m=bHBucXhldnY9b3d3aHFtcCZ0aW1lPTE
0MDkyMzAxMTM1MjIzMDQ1Mzgmc3JjPTE5OSZzdXJsPXd3dy5pcGFkcmVudGFsLmhrJnNwb3J0PTgwJmtleT0zQjdFOTQ2NCZzdXJpPS8= - 03:34:28 UTC - 192.168.204.137:49397 - 188.120.198.1:80 - 7pt5u45u8b1m3bm9hcm4bmn519953ff25fe74b1d5f9ae6e2302945e4.ahik.net - GET /index2.php
- 03:34:30 UTC - 192.168.204.137:49398 - 178.132.203.26:80 - mdif.boroughventuremenswear.com - GET /?PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|ZDg4ZDFmMzc0NGEwMjdlZmZiNTg3OWFkYzQxZWFmZWI - 03:34:36 UTC - 192.168.204.137:49398 - 178.132.203.26:80 - mdif.boroughventuremenswear.com - GET /index.php?req=swf&num=941&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|ZDg4ZDFmMzc0NGEwMjdlZmZiNTg3OWFkYzQxZWFmZWI - 03:34:36 UTC - 192.168.204.137:49399 - 178.132.203.26:80 - mdif.boroughventuremenswear.com - GET /index.php?req=xap&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|ZDg4ZDFmMzc0NGEwMjdlZmZiNTg3OWFkYzQxZWFmZWI
- 03:35:14 UTC - 192.168.204.137:49401 - 188.120.198.1:80 - 7pt5u45u8b1m3bm9hcm4bmn519953ff25fe74b1d5f9ae6e2302945e4.ahik.net - GET /index2.php
- 03:35:15 UTC - 192.168.204.137:49402 - 178.132.203.26:80 - mdif.boroughventuremenswear.com - GET /?PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|ZDg4ZDFmMzc0NGEwMjdlZmZiNTg3OWFkYzQxZWFmZWI - 03:35:30 UTC - 192.168.204.137:49402 - 178.132.203.26:80 - mdif.boroughventuremenswear.com - GET /index.php?req=swf&num=8820&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|ZDg4ZDFmMzc0NGEwMjdlZmZiNTg3OWFkYzQxZWFmZWI - 03:35:31 UTC - 192.168.204.137:49402 - 178.132.203.26:80 - mdif.boroughventuremenswear.com - GET /index.php?req=mp3&num=55594523&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg%7CZDg4ZDFmMzc0NGEwMjdlZmZiNTg3OWFkYzQxZWFmZWI&dop=0170
- 03:35:40 UTC - 192.168.204.137:49403 - 188.120.198.1:80 - 7pt5u45u8b1m3bm9hcm4bmn519953ff25fe74b1d5f9ae6e2302945e4.ahik.net - GET /index2.php
- 03:35:42 UTC - 192.168.204.137:49405 - 178.132.203.26:80 - mdif.boroughventuremenswear.com - GET /?PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|ZDg4ZDFmMzc0NGEwMjdlZmZiNTg3OWFkYzQxZWFmZWI - 03:36:18 UTC - 192.168.204.137:49408 - 178.132.203.26:80 - mdif.boroughventuremenswear.com - GET /index.php?req=xml&num=735&PHPSSESID=
njrMNruDMh7HApzBKv7cTKZNKU7YHVnYmMzMhe6JVg|ZDg4ZDFmMzc0NGEwMjdlZmZiNTg3OWFkYzQxZWFmZWI
NOTE: The browser (IE 10) crashed and restarted the exploit chain three times.
FINAL REDIRECT TO ADULTFRIENDFINDER.COM:
- 03:36:11 UTC - 192.168.204.137:49407 - 188.120.198.1:80 - fpdofr11nhade3z7e6oj1zx.glowjogjabeauty.com - GET /adsort.php?yy=1&aid=2&atr=exts&src=199
- 03:36:19 UTC - 192.168.204.137:49407 - 188.120.198.1:80 - fpdofr11nhade3z7e6oj1zx.glowjogjabeauty.com - GET /favicon.ico
- 03:36:19 UTC - 192.168.204.137:49406 - 188.120.198.1:80 - fpdofr11nhade3z7e6oj1zx.glowjogjabeauty.com - GET /adsort.php?zz=1&aid=2&atr=exts&src=199
- 03:36:19 UTC - 192.168.204.137:49406 - 188.120.198.1:80 - fpdofr11nhade3z7e6oj1zx.glowjogjabeauty.com - GET /4/
- 03:36:22 UTC - 192.168.204.137:49409 - 208.88.180.72:80 - adultfriendfinder.com - GET /go/p1011105.subdirs
- 03:36:23 UTC - 192.168.204.137:49409 - 208.88.180.72:80 - adultfriendfinder.com - GET /go/page/landing_page_68?nid=18&layout=qna&pid=p1011105.subdirs&
ip=auto&no_click=1&alpo_redirect=1
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT
File name: 2014-09-23-Rig-EK-flash-exploit.swf
File size: 4.0 KB ( 4111 bytes )
MD5 hash: a177091ca56a80cecfc5f7a125913b00
Detection ratio: 1 / 53
First submission: 2014-09-10 08:40:49 UTC
VirusTotal link: https://www.virustotal.com/en/file/cbb51c733020ad5c110c02e8e625ac4ea24836f448f5b4fe7db114dbcaa6a888/analysis/
SILVERLIGHT EXPLOIT
File name: 2014-09-23-Rig-EK-silverlight-exploit.xap
File size: 27.5 KB ( 28123 bytes )
MD5 hash: b6ccac3725de163ff5f33447516ea08d
Detection ratio: 3 / 54
First submission: 2014-09-17 03:16:43 UTC
VirusTotal link: https://www.virustotal.com/en/file/1c586859a8d724715deb207c088e9143fd99da2bf2c7d73fc47cf23301917601/analysis/
MALWARE PAYLOAD
File name: 2014-09-23-Rig-EK-malware-payload.exe
File size: 89.6 KB ( 91761 bytes )
MD5 hash: 6b6648e52e8a77c4f333ba3962bb623c
Detection ratio: 5 / 54
First submission: 2014-09-23 03:51:17 UTC
VirusTotal link: https://www.virustotal.com/en/file/9ea9091c048283e3f8b97f2e1a811012f84b5fd7e4da065cf119f7bb4b536d65/analysis/
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (not including ET INFO or ET POLICY rules):
- 2014-09-23 03:34:26 UTC - 192.168.204.137:49395 - 188.120.198.1:80 - ET CURRENT_EVENTS Cushion Redirection (sid:2017552)
- 2014-09-23 03:34:27 UTC - 192.168.204.137:50814 - 192.168.204.2:53 - ET TROJAN Linux/Onimiki DNS trojan activity long format (Inbound) (sid:2018276)
- 2014-09-23 03:34:27 UTC - 192.168.204.137:50814 - 192.168.204.2:53 - ET TROJAN Linux/Onimiki DNS trojan activity long format (Outbound) (sid:2018275)
- 2014-09-23 03:34:30 UTC - 192.168.204.137:49398 - 178.132.203.26:80 - ET CURRENT_EVENTS RIG EK Landing URI Struct (sid:2019072)
- 2014-09-23 03:34:31 UTC - 178.132.203.26:80 - 192.168.204.137:49398 - ET CURRENT_EVENTS RIG EK Landing Page Sept 17 2014 (sid:2019193)
- 2014-09-23 03:34:31 UTC - 178.132.203.26:80 - 192.168.204.137:49398 - ET CURRENT_EVENTS Likely Evil XMLDOM Detection of Local File (sid:2018783)
- 2014-09-23 03:34:36 UTC - 192.168.204.137:49398 - 178.132.203.26:80 - ET CURRENT_EVENTS Goon/Infinity URI Struct EK Landing May 05 2014 (sid:2018441)
- 2014-09-23 03:35:31 UTC - 178.132.203.26:80 - 192.168.204.137:49402 - ET CURRENT_EVENTS GoonEK encrypted binary (3) (sid:2018297)
Sourcefire VRT ruleset from Snort 2.9.6.2 on Debian 7 (not including preprocessor events):
- 2014-09-23 03:34:26 UTC - 104.28.9.19:80 - 192.168.204.137:49393 - [1:26528:3] INDICATOR-COMPROMISE Unix.Backdoor.Cdorked redirect attempt
- 2014-09-23 03:34:27 UTC - 192.168.204.137:various - 192.168.204.2:53 - [1:30272:1] MALWARE-OTHER Unix.Trojan.Onimiki redirected client DNS request (x5)
- 2014-09-23 03:34:36 UTC - 192.168.204.137:various - 178.132.203.26:80 - [1:30936:3] EXPLOIT-KIT Goon/Infinity/Rig exploit kit outbound uri structure (x5)
- 2014-09-23 03:34:37 UTC - 178.132.203.26:80 - 192.168.204.137:49399 - [1:28612:2] EXPLOIT-KIT Multiple exploit kit Silverlight exploit download (x2)
- 2014-09-23 03:35:31 UTC - 178.132.203.26:80 - 192.168.204.137:49402 - [1:30934:2] EXPLOIT-KIT Goon/Infinity/Rig exploit kit encrypted binary download
FINAL NOTES
Once again, here are the associated files:
- ZIP of the pcap: 2014-09-23-Rig-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-09-23-Rig-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.