2015-01-31 KAIXIN EK FROM 103.251.38[.]20:802 - EK PAYLOAD FROM 210.109.101[.]13 - WWW.MYRSVP[.]CO[.]KR

NOTICE:

ASSOCIATED FILES:

  • 2015-01-31-KaiXin-EK-traffic.pcap   (1,728,572 bytes)
  • dou.exe   (355,840 bytes)
  • WsLzLo.jar   (6,910 bytes)

NOTES:

 

CHAIN OF EVENTS

ASSOCIATED DOMAINS:

 

COMPROMISED WEBSITE AND CHAIN OF EVENTS TO THE EXPLOIT KIT (EK):

 

KAIXIN EK:

 

POST-INFECTION TRAFFIC:

 

ALERTS

Signature hits from the Emerging Threats and ETPRO rulesets using Sguil on Security Onion:

Significant signature hits from the Talos (Sourcefire VRT) ruleset using Snort 2.9.7.0 on Debian 7:

 

PRELIMINARY MALWARE ANALYSIS

MALWARE PAYLOAD:

File name:  dou.exe
File size:  355,840 bytes
MD5 hash:  8421f430cafac253263b3d1d93e0a3f3
Detection ratio:  23 / 57
First submission to VirusTotal:  2015-01-31 11:09:10 UTC

 

JAVA EXPLOIT (SENT AFTER MALWARE PAYLOAD):

File name:  WsLzLo.jar
File size:  6,910 bytes
MD5 hash:  bf4705cedd537bfb2a81eb397df3dbe4
Detection ratio:  12 / 57
First submission to VirusTotal:  2015-02-01 03:19:06 UTC

 

Click here to return to the main page.