2015-02-05 - BIZCN GATE ACTOR CHANGES IP ADDRESS, DOMAIN NAMES, AND URL PATTERN FOR ITS GATE
ASSOCIATED FILES:
- ZIP of the pcap: 2015-02-05-Fiesta-EK-traffic.pcap.zip
- ZIP of the malware: 2015-02-05-Fiesta-EK-malware.zip
NOTES:
- This post concerns the group previously using a gate on 94.242.216.0/24 pointing to Fiesta EK on 205.234.186.0/24.
- I'm calling the group "BizCN gate actor" because the redirect (gate) domains are registered through Chinese registrar www.bizcn.com.
- By February 2015, this group changed the IP address, domain names, and URL pattern for its gate.
- Here's info on previous gate characteristics used by the same BizCN gate actor:
- The new domains were registered late last month, so I expect we'll see more compromised websites moved to these new gate domains.
DOMAINS USED FOR THIS GATE
This month, we started seeing the gate's IP address on 136.243.224.9. The domains were registered on 2015-01-17 and 2015-01-29 (mostly on 2015-01-29). Here's some passive DNS data on the new gate IP address:
- Registrant Name/Organization: Real identity is privacy-protected... Shows up as: Wuxi Yilian LLC
- Registrant country: China
- Registrar: www.bizcn.com
As of today, we found 29 domains hosted on this IP address:
- aflumery.com - registered: 2015-01-29
- atinenom.com - registered: 2015-01-29
- baccosch.com - registered: 2015-01-29
- burdiacs.com - registered: 2015-01-29
- dromacky.com - registered: 2015-01-29
- droureri.com - registered: 2015-01-29
- emptysachy.com - registered: 2015-01-17
- frecrave.com - registered: 2015-01-29
- garglath.com - registered: 2015-01-29
- hrortict.com - registered: 2015-01-29 [used as redirect from: www.gm-trucks.com]
- imetheonhe.com - registered: 2015-01-17
- iopsctlvzs.com - registered: 2015-01-17 [used as redirect from: www.droidrzr.com]
- kroentro.com - registered: 2015-01-29
- malerror.com - registered: 2015-01-29
- molporic.com - registered: 2015-01-29
- mooriarm.com - registered: 2015-01-29 [used as redirect from: www.thezombieinfection.com]
- nealychy.com - registered: 2015-01-29 [used as redirect from: www.iwsti.com]
- omaidett.com - registered: 2015-01-29 [used as redirect from: www.nano-reef.com]
- pangosic.com - registered: 2015-01-29
- pioblern.com - registered: 2015-01-29
- potigole.com - registered: 2015-01-29
- risalerr.com - registered: 2015-01-29
- rotonexy.com - registered: 2015-01-29
- sherymex.com - registered: 2015-01-29
- trobirks.com - registered: 2015-01-29
- treentages.com - registered: 2015-01-17
- unitturt.com - registered: 2015-01-29
- usebitcone.com - registered: 2015-01-17
- wetledal.com - registered: 2015-01-29
URL PATTERNS USED BY THIS GATE
Searching through some web proxy logs, we found the following traffic with that redirect/gate traffic on 136.243.224.9:
- Date/Time: 2015-02-02 23:30 UTC
- Compromised website: www.iwsti.com - GET /forums/built-motor-discussion/217443-forged-pistons-changes-what.html
- Redirect/gate to EK: nealychy.com - GET /J-_Kjlq/Y-iQzk/u-oLmP_jSJYphW-ZQ-Kxi/-w_yMNZqokuJG-X-gsUl-/iXg.js?kNit=e-8ec5aT3-91eh4_em1at6930eQV32
- Date/Time: 2015-02-03 15:30 UTC
- Compromised website: www.gm-trucks.com - GET /forums/topic/55696-what-no-fuel-filter-on-04-tahoe/
- Redirect/gate to EK: hrortict.com - GET /z-I/IZyN-rtv-LwRMmV-n/_-pN.js?M0XZkDVr=5Q9i_6efN2c&s=8f24ck_1fO&vf=c7w3pebZcc&w4Ljc-O=e
- Date/Time: 2015-02-03 18:30 UTC
- Compromised website: www.nano-reef.com - GET /topic/281533-mustard-yellow-algae/
- Redirect/gate to EK: omaidett.com - GET /PVrwRo-kS/JgXjqyrN_Q_---kPu_.php?aR=5f51cY1S&LMh_nci=g21c-474S&l-=1d00e6&RtjC=8146-36i
- Date/Time: 2015-02-04 04:30 UTC
- Compromised website: www.thezombieinfection.com - GET /topic/9315-epoch-or-breaking-point/
- Redirect/gate to EK: mooriarm.com - GET /LSZM-UgznQxoNyrqp_HKki/YOwXl_qHp-RUZM-WP_xm-v/x-ny-v_hNozIksWO-QqGMJHmU.js?O=jf6&KU1=_8l9&_lZvKsd6B=
61&xJ-lFd-=c5&wxBg2nt=M67&SGJmdNZ=7G6&R-42=bcU&Ai-Nn=78l
- Date/Time: 2015-02-04 13:40 UTC
- Compromised website: www.nano-reef.com - GET /topic/267464-why-wont-my-candy-cane-inflate/
- Redirect/gate to EK: omaidett.com - GET /-SvO-Xk_nhptgilUKPLrMs/QGpLwNOPv.php?f-=5mf-51co12P1pc&e=y474U1ds00we6&dGE=l81I4X636-2_3P1o&kx0=3
- Date/Time: 2015-02-05 13:20 UTC
- Compromised website: www.gm-trucks.com - GET /forums/topic/95547-stepper-motor-replacement/
- Redirect/gate to EK: hrortict.com - GET /vXSgHl/XimQPShkZOp-oN.js?3Vrd6vI8_=de2&3Y0-i_4-=2df&oFA-=dH82&-6RVZc=4bSy7&7Dtk=ccnaX&iS=8Q9w6&a2-IA51=9_
- Date/Time: 2015-02-05 14:40 UTC
- Compromised website: www.nano-reef.com - GET /topic/277832-the-truth-on-frogspawn-aggression/
- Redirect/gate to EK: omaidett.com - GET /MXL-jVwyu/pQymTt_s/_QzxnYmwgOp-KjstSJrW_XM.js?cxi8fCmQ=5pf5w1xc&GASg=1Z2x1chR4&-pY7l_c=W741dJ0&zb-thjW=-0e
TRAFFIC FROM AN INFECTED VM
ASSOCIATED DOMAINS:
- 38.113.120.12 - www.droidrzr.com - Compromised website
- 136.243.224.9 - iopsctlvzs.com - Redirect/gate
- 205.234.186.113 - onlovemusic.in - Fiesta EK
COMPROMISED WEBSITE:
- 2015-02-05 16:33:52 UTC - www.droidrzr.com - GET /
REDIRECT/GATE ON 136.243.224.9:
- 2015-02-05 16:34:02 UTC - iopsctlvzs.com - GET /rIu-hMGZHkJUT/YMxgGj-wNK_WpIOHJhik/kOpTWt/XTZ--r-GoU--H_wKtgzNO-.php?_-F8vzUE=-203Y5dv5&
WZRk=0qbp0k1Yqee&fd=f-L01w89n4&8=aq3
FIESTA EK:
- 2015-02-05 16:34:15 UTC - onlovemusic.in - GET /v3_g1okw/kSoNIfMf-YApwN_B7NtP
- 2015-02-05 16:34:17 UTC - onlovemusic.in - GET /v3_g1okw/338d1c711e98f992070a0f5f03580605060a0b5f0501070a06075c5708000655;118800;94
- 2015-02-05 16:34:17 UTC - onlovemusic.in - GET /v3_g1okw/21c08ad39ade24d35b540f0b0a5a55070708500b0c0354080705070301025557
- 2015-02-05 16:34:17 UTC - onlovemusic.in - GET /v3_g1okw/20a3d74e4bada76c415c1708560c0551070952085055045e070405005d540501;4060531
- 2015-02-05 16:34:18 UTC - onlovemusic.in - GET /v3_g1okw/6da72b68b9aa419e5a0d030c0059070c035d520c06000603035005040b01075c;910
- 2015-02-05 16:34:18 UTC - onlovemusic.in - GET /v3_g1okw/48c721456e6c27295748080c000a05010101500c0653040e010c07040b520551;6
- 2015-02-05 16:34:21 UTC - onlovemusic.in - GET /v3_g1okw/48c721456e6c27295748080c000a05010101500c0653040e010c07040b520551;6;1
- 2015-02-05 16:34:22 UTC - onlovemusic.in - GET /v3_g1okw/43ee5b932947e10757430e5e07590807010a565e01000908010701560c010b03;1
- 2015-02-05 16:34:25 UTC - onlovemusic.in - GET /v3_g1okw/71b0d911806246055441090b560200050208510b505b010a020506035d5a0057;4
- 2015-02-05 16:34:26 UTC - onlovemusic.in - GET /v3_g1okw/43ee5b932947e10757430e5e07590807010a565e01000908010701560c010b03;1;1
- 2015-02-05 16:34:28 UTC - onlovemusic.in - GET /v3_g1okw/71b0d911806246055441090b560200050208510b505b010a020506035d5a0057;4;1
- 2015-02-05 16:34:36 UTC - onlovemusic.in - GET /v3_g1okw/67ce1bd36e6c27295547085e03595507030e505e050054080303075608015557;5
- 2015-02-05 16:34:43 UTC - onlovemusic.in - GET /v3_g1okw/67ce1bd36e6c27295547085e03595507030e505e050054080303075608015557;5;1
- 2015-02-05 16:34:44 UTC - onlovemusic.in - GET /v3_g1okw/0700df1db49cf7e05a595c0b565d0050050e030b5004015f050354035d050000
- 2015-02-05 16:34:45 UTC - onlovemusic.in - GET /v3_g1okw/1042ad7fd72b5d7b5e5f5609535f0652040907095506075d0404500158070404
- 2015-02-05 16:34:46 UTC - onlovemusic.in - GET /v3_g1okw/73aa93f6a567188f544b045a0b085702020a525a0d51560d0207055200505752;1;3
- 2015-02-05 16:34:49 UTC - onlovemusic.in - GET /v3_g1okw/73aa93f6a567188f544b045a0b085702020a525a0d51560d0207055200505752;1;3;1
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT:
File name: 2015-02-05-Fiesta-EK-flash-exploit.swf
File size: 10.0 KB ( 10212 bytes )
MD5 hash: c2ea28cb4d520b982e3a02f9655af53b
Detection ratio: 3 / 56
First submission: 2015-02-04 17:39:28 UTC
VirusTotal link: https://www.virustotal.com/en/file/40fe5cdec1ebc23d6864c976ebb43889f6b86619d199f06022283c7a85443805/analysis/
JAVA EXPLOIT:
File name: 2015-02-05-Fiesta-EK-java-exploit.jar
File size: 7.8 KB ( 7999 bytes )
MD5 hash: dfe8961737a28c4be84f93e80641fc08
Detection ratio: 8 / 56
First submission: 2015-02-03 21:12:34 UTC
VirusTotal link: https://www.virustotal.com/en/file/4a8f47b1b78d7ccdb7e5eef18adb4baffd05d902e576721d6d373380633ce16e/analysis/
PDF EXPLOIT:
File name: 2015-02-05-Fiesta-EK-pdf-exploit.pdf
File size: 8.1 KB ( 8301 bytes )
MD5 hash: ac8c44f15af75f517d6f3400e880aee8
Detection ratio: 7 / 56
First submission: 2015-02-05 17:44:35 UTC
VirusTotal link: https://www.virustotal.com/en/file/9c26fb69b19761e2ab78d48eb70e4d80c19f139bc432a9b78aa873d264c45304/analysis/
SILVERLIGHT EXPLOIT:
File name: 2015-02-05-Fiesta-EK-silverlight-exploit.xap
File size: 10.3 KB ( 10499 bytes )
MD5 hash: 03ad60de3dd43ccca44dd112e2835c56
Detection ratio: 6 / 56
First submission: 2015-02-05 17:44:53 UTC
VirusTotal link: https://www.virustotal.com/en/file/5d0e0e150db0bff89f1e5a5f54d0e5dc3d7793a70979803206394d90af22258b/analysis/
MALWARE PAYLOAD:
File name: 2015-02-05-Fiesta-EK-malware-payload.exe
File size: 136.0 KB ( 139264 bytes )
MD5 hash: 1b64a13fac1d55083de54723b3e7b422
Detection ratio: 4 / 56
First submission: 2015-02-05 17:45:21 UTC
VirusTotal link: https://www.virustotal.com/en/file/c160f801d0173a5dd45db19e30dc28e909321cf8e75535ddfe1f29fa81d716bf/analysis/
Malwr link: https://malwr.com/analysis/NmVjZjMxZjg0MzhlNGY3NWJjMGU2ZGZmNDBmNDhhNGI/
SCREENSHOTS FROM THE TRAFFIC
Malicious script in page from compromised website:
Redirect pointing to the exploit kit's landing page URL:
FINAL NOTES
Once again, here are the associated files:
- ZIP of the pcap: 2015-02-05-Fiesta-EK-traffic.pcap.zip
- ZIP of the malware: 2015-02-05-Fiesta-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.