2015-01-22 - ANGLER EK FROM 64.251.14.164 AND 207.182.149.13
ASSOCIATED FILES:
- ZIP of the pcap: 2015-01-21-and-2015-01-22-Angler-EK-pcaps.zip
- ZIP of the malware: 2015-01-21-Angler-EK-malware.zip
NOTES:
- I infected a VM yesterday with Angler exploit kit (EK). I tried again today, but I only got the EK landing page each time.
- I got a Flash exploit from the EK, but I was running an outdated version of Flash Player 11.4, and it's not the new 0-day exploit reported by Kafiene (link).
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 117.104.160.130 - www.victorianpoloclub.com.au - Comrpomised website
- 185.14.28.204 - nic.kraview.com and usa.musicalmanager.com - Redirect
- 207.182.149.13 - hydroceppoweron.metalmaidenphotography.rocks - Angler EK (infection from 2015-01-21)
- 64.251.14.164 - dthemacheathkgraham.howisyoursweetspot.com - Angler EK (1st attempt from 2015-01-22)
- 207.182.149.13 - eturnstartsikkanese. and returnstartsikkanese.innovativeapplicationsblog.com - Angler EK (2nd attempt from 2015-01-22)
- 207.182.149.13 - governat.richdadradio.co.uk - Angler EK (3rd attempt from 2015-01-22)
- 209.126.97.209 - jyjhsvgkpeni0g.com - ET TROJAN Bedep Checkin Response
- 188.138.25.107 - drain.diskant.co.uk - ET TROJAN Fareit/Pony Downloader Checkin 2
- 173.224.126.19 - asop83uyteramxop.com - ET MALWARE Fun Web Products Spyware User-Agent (FunWebProducts)
- 83.69.233.133 - ipsalomenatep58highwayroad.biz:8080 - ET TROJAN Ursnif Checkin
- 79.99.6.187 - 79.99.6.187:8080 - ETPRO TROJAN Win32/Injector.BOIK Downloader Checkin
COMPROMISED WEBSITE AND REDIRECT:
- 2015-01-21 23:41:40 UTC - www.victorianpoloclub.com.au - GET /
- 2015-01-21 23:41:43 UTC - nic.kraview.com - GET /js/script.js
ANGLER EK:
- 2015-01-21 23:41:44 UTC - hydroceppoweron.metalmaidenphotography.rocks - GET /e4pzex31kf.php
- 2015-01-21 23:41:48 UTC - hydroceppoweron.metalmaidenphotography.rocks - GET /4ne_iqmOKEs_KVuX7cfg_qIMuoQsTkJAoA0zfzhLEL7g_b4MRf-RyKV6jMTUJTVr
- 2015-01-21 23:41:49 UTC - hydroceppoweron.metalmaidenphotography.rocks - GET /pWZ_Qelf1_9HUjVUpC8R989gZKMonTPCkKJB3sxElu-_c7lZhBIkT-2ad0cQoQY7
POST-INFECTION CONNECTIVITY CHECK BY THE MALWARE:
- 2015-01-21 23:41:55 UTC - www.earthtools.org - POST /timezone/0/0
- 2015-01-21 23:41:55 UTC - www.ecb.europa.eu - POST /stats/eurofxref/eurofxref-hist-90d.xml
OTHER POST-INFECTION TRAFFIC:
- 2015-01-21 23:41:57 UTC - jyjhsvgkpeni0g.com - POST /
- 2015-01-21 23:41:58 UTC - jyjhsvgkpeni0g.com - POST /
- 2015-01-21 23:42:05 UTC - jyjhsvgkpeni0g.com - POST /
- 2015-01-21 23:42:10 UTC - drain.diskant.co.uk - POST /news.php
- 2015-01-21 23:42:11 UTC - jyjhsvgkpeni0g.com - POST /
- 2015-01-21 23:42:24 UTC - ipsalomenatep58highwayroad.biz:8080 - GET /photoLibrary/?user=632c7580bc5383c43738fd96edcbba95&id=5&ver=111&os=498139398&
os2=256&host=0&k=2953951398&type=555 - 2015-01-21 23:42:28 UTC - ipsalomenatep58highwayroad.biz:8080 - POST /photoLibrary/?user=632c7580bc5383c43738fd96edcbba95&id=5&ver=111&os=498139398&
os2=256&host=0&k=2953951398&type=555 - 2015-01-21 23:42:28 UTC - 8ipsalomenatep58highwayroad.biz:8080 - GET /photoLibrary/?user=632c7580bc5383c43738fd96edcbba95&id=5&ver=111&os=498139398&
os2=257&host=0&k=1159559117&type=555 - 2015-01-21 23:42:31 UTC - ipsalomenatep58highwayroad.biz:8080 - POST /photoLibrary/?user=632c7580bc5383c43738fd96edcbba95&id=5&ver=111&os=498139398&
os2=257&host=0&k=1159559117&type=555 - 2015-01-21 23:42:32 UTC - 79.99.6.187:8080 - POST /tbjlqkjsu.php?xvydhmo=YoN8f9DiGsbcNVfj5tPaYhvk1RDfLe8cOHyBmg1BDhdjEvaDV2cwCoWFsZ0WG6t9lxOcZ
IOuqEO5O5A+xzheUNJQu1pEsIyxJWFSv/4fIX4xPCEe948P/BhYyucqrahk - 2015-01-21 23:42:44 UTC - 79.99.6.187:8080 - POST /dakqqj.php?iallpins=jUMl95c61J3zxB73MneaRWCqWDqgoSma0rMWLf63ye3n3CFPS4Gd9+UjTXX4HzsN/Z8VM
QtuxO1hFgetnOhnAbM0ExqNgyO5fUpuu/oQddPQN2TYX21wjpOL56R9+wBsaUPbYoGAfq2XZbYVIS8grS== - 2015-01-21 23:45:12 UTC - asop83uyteramxop.com - GET /ads.php?sid=1917
- 2015-01-21 23:45:27 UTC - asop83uyteramxop.com - GET /r.php?key=b8c06a1ab928f022031c0cd625ae939b
- 2015-01-21 23:45:27 UTC - asop83uyteramxop.com - GET /r.php?key=b8c06a1ab928f022031c0cd625ae939b
- 2015-01-21 23:45:27 UTC - asop83uyteramxop.com - GET /r.php?key=b8c06a1ab928f022031c0cd625ae939b
- 2015-01-21 23:45:28 UTC - asop83uyteramxop.com - GET /r.php?key=b8c06a1ab928f022031c0cd625ae939b
- [The pcap has other traffic, which I believe is click fraud activity.]
ADDITIONAL ATTEMPTS TO INFECT A VM ON 2015-01-22 (NONE WERE SUCCESSFUL):
- 2015-01-22 14:57:01 UTC - www.victorianpoloclub.com.au - GET /
- 2015-01-22 14:57:04 UTC - usa.musicalmanager.com - GET /js/script.js
- 2015-01-22 14:57:08 UTC - dthemacheathkgraham.howisyoursweetspot.com - GET /vqi2jl2gyt.php
- 2015-01-22 15:00:36 UTC - www.victorianpoloclub.com.au - GET /
- 2015-01-22 15:00:39 UTC - usa.musicalmanager.com - GET /js/script.js
- 2015-01-22 15:00:44 UTC - eturnstartsikkanese.innovativeapplicationsblog.com - GET /8p9ofqxt6o.php
- 2015-01-22 15:00:46 UTC - returnstartsikkanese.innovativeapplicationsblog.com - GET /rcimgh
- 2015-01-22 15:27:13 UTC - www.victorianpoloclub.com.au - GET /
- 2015-01-22 15:27:17 UTC - usa.musicalmanager.com - GET /js/script.js
- 2015-01-22 15:27:19 UTC - governat.richdadradio.co.uk - GET /0zbzf7ddvz.php
SNORT EVENTS
Signature hits from the Emerging Threats and ETPRO rulesets using Sguil on Security Onion (without ET POLICY or ET INFO events):
- 207.182.149.13 port 80 - ET CURRENT_EVENTS Angler EK Flash Exploit URI Struct (sid:2019513)
- 207.182.149.13 port 80 - ET CURRENT_EVENTS Angler EK Dec 24 2014 (sid:2020068)
- 188.138.25.107 port 80 - ET TROJAN Fareit/Pony Downloader Checkin 2 (sid:2014411)
- 83.69.233.133 port 8080 - ET TROJAN Ursnif Checkin (sid:2019678)
- 79.99.6.187 port 8080 - ETPRO TROJAN Win32/Injector.BOIK Downloader Checkin (sid:2809167)
- 93.190.143.115 port 443 - ETPRO TROJAN Carberp/Rovnix Proxy Connection (sid:2808448)
- 79.99.6.187 port 8080 - ET TROJAN Win32/PSW.Papras.CK file upload (sid:2019379)
- 209.126.97.209 port 80 - ET TROJAN Bedep Checkin Response (sid:2019952)
- 173.224.126.19 port 80 - ET MALWARE Fun Web Products Spyware User-Agent (FunWebProducts) (sid:2001855)
- 173.224.126.19 port 80 - ET CURRENT_EVENTS Malicious Referer Bulk Traffic Sometimes Leading to EKs (Possible Bedep infection) Dec 16 2014 (sid:2019950)
Significant signature hits from the Talos (Sourcefire VRT) ruleset using Snort 2.9.7.0 on Debian 7:
- 207.182.149.13 port 80 - [1:31902:1] EXPLOIT-KIT Multiple exploit kit flash file download
- 188.138.25.107 port 80 - [1:27919:3] MALWARE-CNC Win.Trojan.Zeus encrypted POST Data exfiltration
- various IPs port 80 - [1:7567:14] PUA-TOOLBARS Win.Adware.MyWebSearch Toolbar funwebproducts variant outbound connection (multiple hits)
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT:
File name: 2015-01-21-Angler-EK-flash-exploit.swf
File size: 43.3 KB ( 44376 bytes )
MD5 hash: 5bb88d63a37f296d6e42245421537fe6
Detection ratio: 2 / 57
First submission: 2015-01-21 10:08:33 UTC
VirusTotal link: https://www.virustotal.com/en/file/04596a3ef7239ee9f1054a578504de80f922d65c3c86df3396f22401266d79e8/analysis/
DROPPED MALWARE FROM THE USER'S APPDATA\LOCAL\TEMP FOLDER:
File name: dfscpnet.dll
File size: 144.4 KB ( 147828 bytes )
MD5 hash: cd509fc9a2a8ae8a07ab2086ec6ad93a
Detection ratio: 28 / 57
First submission: 2015-01-14 23:37:46 UTC
VirusTotal link: https://www.virustotal.com/en/file/5f6e3461702e0eeaabb03bc7e6ee3c99f597102ada48321262f6b44b6ed63749/analysis/
File name: dfscpnet64.dll
File size: 156.0 KB ( 159744 bytes )
MD5 hash: 8aca5883cd15813ac2f05d5ae7db9924
Detection ratio: 9 / 57
First submission: 2015-01-14 23:37:24 UTC
VirusTotal link: https://www.virustotal.com/en/file/26a50199b04361cce4857a253ce4debb5c992fc120f927c2522a35127b9ea4f4/analysis/
SCREENSHOTS
You can easily find the malware payload in Wireshark by exporting HTTP objects and looking through the list.
Unfortunately, the encryption or obfuscation has changed. It doesn't appear to be a strict XOR as we've seen before with Angler EK. I wasn't able to de-obfuscate the payload.
FINAL NOTES
Once again, here are the associated files:
- ZIP of the pcap: 2015-01-21-and-2015-01-22-Angler-EK-pcaps.zip
- ZIP of the malware: 2015-01-21-Angler-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.