2015-04-03 - NUCLEAR EK SENDS TESLACRYPT RANSOMWARE

NOTICE:

ASSOCIATED FILES:

 

NOTES:

 

CHAIN OF EVENTS

DATE AND TIME OF THE ACTIVITY:

 

ASSOCIATED DOMAINS:

 

NUCLEAR EK:

 

POST-INFECTION TRAFFIC:

 

ALERTS

Signature hits from the Emerging Threats and ETPRO rulesets using Sguil on Security Onion (without ET POLICY or ET INFO events):

Significant signature hits from the Talos (Sourcefire VRT) ruleset using Snort 2.9.7.2 on Debian 7:

 

PRELIMINARY MALWARE ANALYSIS

FLASH EXPLOIT:

File name:  2015-04-03-Nuclear-EK-Flash-exploit.swf
File size:  8,930 bytes
MD5 hash:  b7ed8635d35845d880d5e98c1568115e
Detection ratio:  0 / 42
First submission to VirusTotal:  2015-04-03 16:17:20 UTC

 

SILVERLIGHT EXPLOIT:

File name:  2015-04-03-Nuclear-EK-Silverlight-exploit.xap
File size:  17,940 bytes
MD5 hash:  2f6b618d8784229ff5911ece667d9320
Detection ratio:  0 / 42
First submission to VirusTotal:  2015-04-03 16:17:32 UTC

 

MALWARE PAYLOAD:

File name:  2015-04-03-Nuclear-EK-malware-payload-TeslaCrypt-ransomware.exe
File size:  285,696 bytes
MD5 hash:  f3b12a197d732cda29d6d9e698ea58bf
Detection ratio:  2 / 57
First submission to VirusTotal:  2015-04-03 16:17:49 UTC

 

SCREENSHOTS FROM THE INFECTED HOST

 

Click here to return to the main page.