2014-10-27 - SWEET ORANGE EK FROM 38.84.134.199 - A.PAVERSSEARCH.COM:51439 & K.RETAININGWALLINC.COM:51439
ASSOCIATED FILES:
- ZIP of the pcap: 2014-10-27-Sweet-Orange-EK-traffic.pcap.zip
- ZIP of the malware: 2014-10-27-Sweet-Orange-EK-malware.zip
NOTES:
- This actor now uses main_request_data_content as the variable for the gate (see the screenshots section below).
- Like the previous three times, today's malware payload (QBot) is digitally signed, and it didn't do anything on the infected VM.
RECENT ACTIVITY I'VE DOCUMENTED FROM THIS ACTOR:
- 2014-10-27 - Sweet Orange EK from 38.84.134.199 - a.paverssearch.com:51439 & k.retainingwallinc.com:51439
- 2014-10-03 - Sweet Orange EK from 8.28.175.74 - b.epavers.com:17767 & k.epavers.com:17767
- 2014-09-25 - Sweet Orange EK from 8.28.175.67 - cdn.americasrapper.com:10016 & cdn5.blumaxmaterial.com:10016
- 2014-09-19 - Sweet Orange EK from 8.28.175.67 - cdn2.sweetgeorgicas.net:17982 & cdn5.sweetsgeorgica.com:17982
- 2014-09-04 - Sweet Orange EK from 38.84.134.208 - cdn.livistro.com:17982 & cdn5.marchepoulet.com:17982
- 2014-08-29 - Sweet Orange EK from 95.163.121.188 - cdn3.thecritico.com:16122 & cdn5.thecritico.mx:16122
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 107.150.19.133 - dresseslux.com - Compromised website
- 192.185.16.158 - img.kirklandhouse.info - Redirect/gate
- 38.84.134.199 - a.paverssearch.com:51439 & k.retainingwallinc.com:51439 - Sweet Orange EK
COMPROMISED WEBSITE AND REDIRECT CHAIN:
- 23:20:39 UTC - 192.168.204.151:49266 - 107.150.19.133:80 - dresseslux.com - GET /
- 23:20:40 UTC - 192.168.204.151:49267 - 107.150.19.133:80 - dresseslux.com - GET /wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
- 23:20:40 UTC - 192.168.204.151:49278 - 192.185.16.158:80 - img.kirklandhouse.info - GET /k?ts=489318713
SWEET ORANGE EK:
- 23:20:42 UTC - 192.168.204.151:49288 - 38.84.134.199:51439 - a.paverssearch.com:51439 - GET /uninstall/promo/keyword/birds.php?winter=3
- 23:20:42 UTC - 192.168.204.151:49288 - 38.84.134.199:51439 - a.paverssearch.com:51439 - GET /uninstall/promo/keyword/kN2PbenzF
- 23:20:46 UTC - 192.168.204.151:49296 - 38.84.134.199:51439 - k.retainingwallinc.com:51439 - GET /cars.php?cert=1877&ports=2012&timeline=4&pets=1503&
image=171&list=2482&extra=415 - 23:21:02 UTC - 192.168.204.151:49396 - 38.84.134.199:51439 - a.paverssearch.com:51439 - GET /uninstall/promo/keyword/IIFjkv.jar
- 23:21:02 UTC - 192.168.204.151:49397 - 38.84.134.199:51439 - a.paverssearch.com:51439 - GET /uninstall/promo/keyword/AnEgG.jar
- 23:21:02 UTC - 192.168.204.151:49398 - 38.84.134.199:51439 - a.paverssearch.com:51439 - GET /uninstall/promo/keyword/IIFjkv.jar
- 23:21:02 UTC - 192.168.204.151:49398 - 38.84.134.199:51439 - a.paverssearch.com:51439 - GET /uninstall/promo/keyword/IIFjkv.jar
- 23:21:02 UTC - 192.168.204.151:49398 - 38.84.134.199:51439 - a.paverssearch.com:51439 - GET /uninstall/promo/keyword/IIFjkv.jar
- 23:21:02 UTC - 192.168.204.151:49398 - 38.84.134.199:51439 - a.paverssearch.com:51439 - GET /uninstall/promo/keyword/IIFjkv.jar
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT
File name: 2014-10-27-Sweet-Orange-EK-flash-exploit.swf
File size: 4.6 KB ( 4676 bytes )
MD5 hash: 6d5591ef4d3ddb1c0b47d52a58e36036
Detection ratio: 0 / 53
First submission: 2014-10-28 00:35:16 UTC
VirusTotal link: https://www.virustotal.com/en/file/9c5d7c0a2c1e9accfe4d22dfb3e08daa6b9dc933cb9a4c944357bf0be7c7485c/analysis/
MALWARE PAYLOAD
File name: 2014-10-27-Sweet-Orange-EK-malware-payload.exe
File size: 283.9 KB ( 290688 bytes )
MD5 hash: a55bcf2921b05d06dfaafdaf0ca7902b
Detection ratio: 6 / 53
First submission: 2014-10-27 17:35:16 UTC
VirusTotal link: https://www.virustotal.com/en/file/07d4adb40183a4d7826d4efa267bf6b3db6fac83f50d14fa9c5c3bb1c53567da/analysis/
Malwr.com link: https://malwr.com/analysis/NWRlOTRiYmZiMzA5NGRiYWIxYjU2Yzg0YTBkMzg2ZmE/
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (not including ET INFO or ET POLICY rules):
- 2014-10-27 23:20:40 UTC - 192.168.204.151:49278 - 192.185.16.158:80 - ET CURRENT_EVENTS Sweet Orange CDN Gate Sept 09 2014 Method 2 (sid:2019146)
- 2014-10-27 23:20:42 UTC - 192.168.204.151:49288 - 38.84.134.199:various - ET POLICY HTTP Request on Unusual Port Possibly Hostile (sid:2006408)
- 2014-10-27 23:20:46 UTC - 38.84.134.199:51439 - 192.168.204.151:49296 - ET POLICY PE EXE or DLL Windows file download (sid:2000419)
Sourcefire VRT ruleset from Snort 2.9.6.2 on Debian 7:
- 2014-10-27 23:20:46 UTC - 38.84.134.199:51439 - 192.168.204.151:49296 - [1:11192:16] FILE-EXECUTABLE download of executable content
- 2014-10-27 23:20:46 UTC - 38.84.134.199:51439 - 192.168.204.151:49296 - [1:15306:18] FILE-EXECUTABLE Portable Executable binary file magic detected
SCREENSHOTS FROM THE TRAFFIC
Malicious, partially obfuscated script in .js file from compromised website:
Redirect/gate pointing to Sweet Orange EK:
FINAL NOTES
Once again, here are the associated files:
- ZIP of the pcap: 2014-10-27-Sweet-Orange-EK-traffic.pcap.zip
- ZIP file of the malware: 2014-10-27-Sweet-Orange-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.