2015-02-23 - SWEET ORANGE EK FROM 95.183.8.177 - H.ROCKYHILLREALTOR.COM:8085
ASSOCIATED FILES:
- ZIP - pcap of Sweet Orange EK traffic: 2015-02-23-Sweet-Orange-EK-traffic.pcap.zip
- ZIP - pcap of post-infection traffic: 2015-02-23-Sweet-Orange-EK-post-infection-traffic.pcap.zip
- ZIP - associated malware: 2015-02-23-Sweet-Orange-EK-malware.zip
NOTES:
- This traffic is extremely similar to the Sweet Orange EK traffic seen on 2015-02-09 (link).
- The gate domain leading to Sweet Orange EK is using the same IP address (50.87.151.146) seen previously on 2015-02-09.
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 50.87.151.146 - static.platinumweddingplanner.com - Gate to Sweet Orange EK
- 95.183.8.177 - h.rockyhillrealtor.com:8085 and k.rockyhillrealtor.com:8085 - Sweet Orange EK
- 66.240.194.139 port 80 - mqaqyrcqzltddqx.org and xfniqbczwzrwv.net - Post-infection traffic
- 69.89.31.157 port 80 - wxhlloterlldxa.biz - Post-infection traffic
- 74.50.25.220 port 80 - tgfuzlqdfqzuzascrnbhe.com and iporooljeteuckhibfmxs.org - Post-infection traffic
- 216.227.216.66 port 80 - qdpgrzesnnodsgrafecklaxpb.biz and uvxhzlybcacnbvg.org - Post-infection traffic
- 216.227.214.85 port 80 - scfcgysgeouqvcjp.info and mvxpehjudkxezuazkt.net - Post-infection traffic
- 181.224.138.240 port 21 and 34630 - no domain name - FTP server used by the malware in post-infection traffic
- 85.25.210.196 port 65400 - no domain name - TCP callback traffic caused by the malware
INFECTION TRAFFIC:
- 2015-02-23 16:00:08 UTC - static.platinumweddingplanner.com - GET /k?tstmp=918016303
- 2015-02-23 16:00:15 UTC - h.rockyhillrealtor.com:8085 - GET /1/lines.php?norway=3
- 2015-02-23 16:00:22 UTC - h.rockyhillrealtor.com:8085 - GET /1/Cv1ixRU47ltFEg
- 2015-02-23 16:00:26 UTC - k.rockyhillrealtor.com:8085 - GET /cars.php?soma=2776&humor=316&timeline=4&jobs=171&image=171&nomic=2517&anal=1390&urepair=errfix
- 2015-02-23 16:00:49 UTC - k.rockyhillrealtor.com:8085 - GET /cars.php?soma=2776&humor=316&timeline=4&jobs=171&image=171&nomic=2517&anal=1390
POST-INFECTION TRAFFIC:
- 2015-02-23 16:43:47 UTC - google.com - GET /
- 2015-02-23 16:43:48 UTC - tgfuzlqdfqzuzascrnbhe.com - POST /sq2gMsSwSdT7Ko9xe05BRJHg.php
- 2015-02-23 16:43:48 UTC - sanjose.speedtest.comcast.net - GET /speedtest/random750x750.jpg?x=32408&y=1
- 2015-02-23 16:43:48 UTC - www.godaddy.com - GET /
- 2015-02-23 16:43:48 UTC - www.ip-adress.com - GET /
- 2015-02-23 16:43:49 UTC - boston.speedtest.comcast.net - GET /speedtest/random750x750.jpg?x=16179&y=1
- 2015-02-23 16:43:50 UTC - www.download.windowsupdate.com - GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab
- 2015-02-23 16:43:51 UTC - ocsp.godaddy.com - GET //MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTk[long string of characters]
- 2015-02-23 16:43:51 UTC - jacksonville.speedtest.comcast.net - GET /speedtest/random750x750.jpg?x=24239&y=1
- 2015-02-23 16:43:51 UTC - ocsp.godaddy.com - GET //MEIwQDA%2BMDwwOjAJBgUrDgMCGgUABBQ[long string of characters]
- 2015-02-23 16:43:52 UTC - ocsp.godaddy.com - GET //MEgwRjBEMEIwQDAJBgUrDgMCGgUABBS2[long string of characters]
- 2015-02-23 16:43:53 UTC - 181.224.138.240 - [FTP traffic]
- 2015-02-23 16:43:52 UTC - houston.speedtest.comcast.net - GET /speedtest/random750x750.jpg?x=19907&y=1
- 2015-02-23 16:43:53 UTC - scfcgysgeouqvcjp.info - POST /sq2gMsSwSdT7Ko9xe05BRJHg.php
- 2015-02-23 16:43:53 UTC - www.godaddy.com - GET /
- 2015-02-23 16:43:53 UTC - 85.25.210.196 - [TCP traffic]
- 2015-02-23 16:43:55 UTC - wxhlloterlldxa.biz - POST /sq2gMsSwSdT7Ko9xe05BRJHg.php
- 2015-02-23 16:43:55 UTC - wxhlloterlldxa.biz - POST /sq2gMsSwSdT7Ko9xe05BRJHg.php
- 2015-02-23 16:43:55 UTC - www.godaddy.com - GET /
- 2015-02-23 16:43:56 UTC - qdpgrzesnnodsgrafecklaxpb.biz - POST /sq2gMsSwSdT7Ko9xe05BRJHg.php
- 2015-02-23 16:43:56 UTC - mqaqyrcqzltddqx.org - POST /sq2gMsSwSdT7Ko9xe05BRJHg.php
- 2015-02-23 16:43:57 UTC - uvxhzlybcacnbvg.org - POST /sq2gMsSwSdT7Ko9xe05BRJHg.php
- 2015-02-23 16:43:57 UTC - iporooljeteuckhibfmxs.org - POST /sq2gMsSwSdT7Ko9xe05BRJHg.php
- 2015-02-23 16:43:57 UTC - mvxpehjudkxezuazkt.net - POST /sq2gMsSwSdT7Ko9xe05BRJHg.php
- 2015-02-23 16:43:57 UTC - xfniqbczwzrwv.net - POST /sq2gMsSwSdT7Ko9xe05BRJHg.php
SNORT EVENTS
Signature hits from the Emerging Threats and ETPRO rulesets using Sguil on Security Onion (without ET POLICY or ET INFO events):
- 50.87.151.146 port 80 - ET CURRENT_EVENTS Sweet Orange CDN Gate Sept 09 2014 Method 2 (sid:2019146)
- 95.183.8.177 port 8085 - ET CURRENT_EVENTS Possible Sweet Orange CVE-2014-6332 Payload Request (sid:2019752)
- 95.183.8.177 port 8085 - ET CURRENT_EVENTS WinHttpRequest Downloading EXE (sid:2019822)
- 95.183.8.177 port 8085 - ET CURRENT_EVENTS WinHttpRequest Downloading EXE Non-Port 80 (Likely Exploit Kit) (sid:2019823)
- 64.34.169.244 port 80 (www.ip-adress.com) - ETPRO TROJAN Common Downloader Header Pattern UHCa (sid:2803270)
- 69.89.31.157 port 80 - ETPRO TROJAN Win32.SpyEyes.atjw Checkin (sid:2809522)
- 74.50.25.220 port 80 - ETPRO TROJAN Win32.SpyEyes.atjw Checkin (sid:2809522)
- 216.227.216.66 port 80 - ETPRO TROJAN Win32.SpyEyes.atjw Checkin (sid:2809522)
- 216.227.214.85 port 80 - ETPRO TROJAN Win32.SpyEyes.atjw Checkin (sid:2809522)
- DNS queries for several different domains - ET DNS Excessive NXDOMAIN responses - Possible DNS Backscatter or Domain Generation Algorithm Lookups (sid:2008470)
- DNS responses for different domains - ET TROJAN Zeus GameOver Possible DGA NXDOMAIN Responses (sid:2018316)
Notable signature hits from the Talos (Sourcefire VRT) ruleset using Snort 2.9.7.0 on Debian 7:
- 95.183.8.177 port 8085 - [1:32638:1] EXPLOIT-KIT Sweet Orange exploit kit Adobe Flash exploit on defined port
- 95.183.8.177 port 8085 - [1:11192:16] FILE-EXECUTABLE download of executable content (x2)
- 95.183.8.177 port 8085 - [1:15306:18] FILE-EXECUTABLE Portable Executable binary file magic detected (x2)
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT:
File name: 2015-02-23-Sweet-Orange-EK-flash-exploit.swf
File size: 8.1 KB ( 8272 bytes )
MD5 hash: 270533e84d9dc5b978699892d37313d3
Detection ratio: 1 / 56
First submission: 2015-02-17 08:08:22 UTC
VirusTotal link: https://www.virustotal.com/en/file/1e45ccf263a43971cb2a6d86271d0773ad997a387ffbc1dab4b3bfa8f952e561/analysis/
MALWARE PAYLOAD:
File name: 2015-02-23-Sweet-Orange-EK-malware-payload.exe
File size: 243.0 KB ( 248880 bytes )
MD5 hash: 616f8966d03a3a6f00891d40a17b00c5
Detection ratio: 25 / 57
First submission: 2015-02-23 00:05:44 UTC
VirusTotal link: https://www.virustotal.com/en/file/d2025e0d2adb28d51debe5f64387bf238503434dc76c9666e3c09fbc0c6951f2/analysis/
Malwr link: https://malwr.com/analysis/Y2Q2ZWM5ZTMxOWE5NDk0YmJjZDEwNzAwNjhjODBhMzI/
FINAL NOTES
Once again, here are the associated files:
- ZIP - pcap of Sweet Orange EK traffic: 2015-02-23-Sweet-Orange-EK-traffic.pcap.zip
- ZIP - pcap of post-infection traffic: 2015-02-23-Sweet-Orange-EK-post-infection-traffic.pcap.zip
- ZIP - associated malware: 2015-02-23-Sweet-Orange-EK-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.