2015-05-07 - ANGLER EK FROM 94.242.255.60 DELIVERS MORE RANSOMWARE
PCAP AND MALWARE:
- PCAP of the traffic: 2015-05-07-Angler-EK-and-ransomware-traffic.pcap.zip
- ZIP file of the malware: 2015-05-07-Angler-EK-and-ransomware-artifacts.zip
NOTES:
- About 2 hours after my last blog post (Angler EK delivering Alpha Crypt), I got a similar CryptoLocker-like sample from a different Angler EK infection.
- Previous Alpha Crypt posts are at 2015-04-30, 2015-05-06, and 2015-05-07 (earlier today).
- I tried all the URLs from the ransomware instructions, so the pcap has all the domains/IP addresses involved.
- Bitcoin address for this sample's ransom payment is: 12Fbfd7mZockQL6NDvNxnBU3PSrA32cQdf
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 5.101.118.147 port 80 - cndqezvmp.servepics.com - Redirect/gate to Angler EK
- 94.242.255.60 port 80 - geloofsywer-sukulumb.globaltechdeals.net - Angler EK
- 52.6.1.107 port 80 - ipinfo.io - IP address check by the malware [not inherently malicious]
- 104.18.63.63 port 80 - 24u4jf7s4regu6hn.dlosrngis35.com - ransomware post-infection traffic
- 104.18.62.63 port 80 - iq3ahijcfeont3xx.dlosrngis35.com - ransomware post-infection traffic
- 104.18.55.35 port 80 - iq3ahijcfeont3xx.anfeua74x36.com - ransomware post-infection traffic
- 192.251.226.206 port 443 - iq3ahijcfeont3xx.tor2web.blutmagie.de - ransomware post-infection traffic
REDIRECT/GATE TO ANGLER EK:
- 2015-05-07 19:23:45 UTC - cndqezvmp.servepics.com - GET /wordpress/?bf7N&utm_source=le
ANGLER EK:
- 2015-05-07 19:23:46 UTC - geloofsywer-sukulumb.globaltechdeals.net - GET /quavers-patrol-comfort-ingress/216044123933311401
- 2015-05-07 19:23:48 UTC - geloofsywer-sukulumb.globaltechdeals.net - GET /0QOXr7VPVyKQLk1u4-3JIFIe2EoL-y3mPYrT2pvLbaH5a7vM
- 2015-05-07 19:23:49 UTC - geloofsywer-sukulumb.globaltechdeals.net - GET /CX6i9DGTd9NRjFaF0cv8RpuGLBFC7L-SOg7xASQtxljWePp6
POST-INFECTION TRAFFIC:
- 2015-05-07 19:23:50 UTC - ipinfo.io - GET /ip
- 2015-05-07 19:23:50 UTC - 24u4jf7s4regu6hn.dlosrngis35.com - GET /ping.php?U3ViamVjdD1QaW5nJmtleT05NDU2ND[long string of characters]
- 2015-05-07 19:24:10 UTC - 24u4jf7s4regu6hn.dlosrngis35.com - GET /ping.php?U3ViamVjdD1DcnlwdGVkJmtleT05ND[long string of characters]
- 2015-05-07 19:24:16 UTC - iq3ahijcfeont3xx.dlosrngis35.com - GET /?enc=12Fbfd7mZockQL6NDvNxnBU3PSrA32cQdf
- 2015-05-07 19:24:18 UTC - iq3ahijcfeont3xx.dlosrngis35.com - GET /check.php
- 2015-05-07 19:24:19 UTC - iq3ahijcfeont3xx.dlosrngis35.com - GET /style.css
- 2015-05-07 19:24:19 UTC - iq3ahijcfeont3xx.dlosrngis35.com - GET /style.css
- 2015-05-07 19:24:20 UTC - iq3ahijcfeont3xx.dlosrngis35.com - GET /img/curr.svg
- 2015-05-07 19:24:20 UTC - iq3ahijcfeont3xx.dlosrngis35.com - GET /img/decrypt.svg
- 2015-05-07 19:24:22 UTC - iq3ahijcfeont3xx.dlosrngis35.com - GET /favicon.ico
- 2015-05-07 19:26:26 UTC - iq3ahijcfeont3xx.dlosrngis35.com - GET /img/curr_hover.svg
- 2015-05-07 19:26:30 UTC - iq3ahijcfeont3xx.dlosrngis35.com - GET /img/curr_hover.svg
- 2015-05-07 19:27:08 UTC - iq3ahijcfeont3xx.anfeua74x36.com - GET /
- 2015-05-07 19:27:09 UTC - iq3ahijcfeont3xx.anfeua74x36.com - GET /style.css
- 2015-05-07 19:27:11 UTC - iq3ahijcfeont3xx.anfeua74x36.com - GET /img/base.svg
- 2015-05-07 19:27:12 UTC - iq3ahijcfeont3xx.anfeua74x36.com - GET /favicon.ico
- 2015-05-07 19:27:30 UTC - iq3ahijcfeont3xx.anfeua74x36.com - GET /index.php?enc=12Fbfd7mZockQL6NDvNxnBU3PSrA32cQdf
- 2015-05-07 19:27:32 UTC - iq3ahijcfeont3xx.anfeua74x36.com - GET /check.php
- 2015-05-07 19:27:33 UTC - iq3ahijcfeont3xx.anfeua74x36.com - GET /img/curr.svg
- 2015-05-07 19:27:33 UTC - iq3ahijcfeont3xx.anfeua74x36.com - GET /img/decrypt.svg
- 2015-05-07 19:27:34 UTC - iq3ahijcfeont3xx.anfeua74x36.com - GET /favicon.ico
- 2015-05-07 19:27:50 UTC - iq3ahijcfeont3xx.tor2web.blutmagie.de - HTTPS traffic
- 2015-05-07 19:27:51 UTC - iq3ahijcfeont3xx.tor2web.blutmagie.de - HTTPS traffic
- 2015-05-07 19:27:51 UTC - iq3ahijcfeont3xx.tor2web.blutmagie.de - HTTPS traffic
- 2015-05-07 19:28:19 UTC - iq3ahijcfeont3xx.tor2web.blutmagie.de - HTTPS traffic
PRELIMINARY MALWARE ANALYSIS
MALWARE PAYLOAD:
File name: 2015-05-07-ransomware-sample.exe
File size: 254.5 KB ( 260608 bytes )
MD5 hash: 17a8119f8a6c17937bc2f9549b7e2e42
Detection ratio: 3 / 36
First submission: 2015-05-07 20:00:25 UTC
VirusTotal link: https://www.virustotal.com/en/file/f8e9e1ee90963ca1f8edba227ba7b80b3d3db581c9145c0c7152a97a35dcd695/analysis/
FINAL NOTES
Once again, here are the associated files:
- PCAP of the traffic: 2015-05-07-Angler-EK-and-ransomware-traffic.pcap.zip
- ZIP file of the malware: 2015-05-07-Angler-EK-and-ransomware-artifacts.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.