2015-08-17 - RIG EK FROM 94.142.139.186 - LIFE.MIRAGE-INC.COM
PCAP AND MALWARE:
- ZIP of the PCAP: 2015-08-17-Rig-EK-traffic.pcap.zip
- ZIP file of the malware: 2015-08-17-Rig-EK-malware.zip
TRAFFIC
ASSOCIATED DOMAINS:
- cottstrings.com - Compromised website
- 79.96.88.187 port 80 - www.miafashion.pl - Redirect (gate)
- 94.142.139.186 port 80 - life.mirage-inc.com - Rig EK
- 136.243.34.28 port 8080 - 136.243.34.28 - post-infection traffic
- 5.9.5.205 port 80 - no domain or IP in HTTP headers - post-infection traffic
- various IP addresses on port 443, 6355 and 7212 - post-infection traffic
- various mail servers IP addresses on port 25 - post-infection traffic
COMPROMISED WEBSITE AND REDIRECT:
- 2015-08-17 17:59:19 UTC - cottstrings.com - GET /
- 2015-08-17 17:59:20 UTC - www.miafashion.pl - GET /cscart/payments/6ynbwf8v.php?id=8713571
RIG EK:
- 2015-08-17 17:59:20 UTC - life.mirage-inc.com - GET /?znePf7KaLx7OAoE=l3SKfPrfJxzFGMSUb-nJDa9BMEXCRQLPh4SGhKrXCJ-ofSih17OIFxzsmTu2KV_
OpqxveN0SZFSOzQfZPVQlyZAdChoB_Oqki0vHjUnH1cmQ9laHYghP7cSSQOJv31z0nuBBdcomwh7Q7GdSnuwZAQ8RtFsTmqqfBKqE
- 2015-08-17 17:59:21 UTC - life.mirage-inc.com - GET /index.php?znePf7KaLx7OAoE=l3SMfPrfJxzFGMSUb-nJDa9BMEXCRQLPh4SGhKrXCJ-ofSih17OIFxzsmTu2KV_
OpqxveN0SZFSOzQfZPVQlyZAdChoB_Oqki0vHjUnH1cmQ9laHYghP7cSSQOJv31z0nuBBdcomwh7Q7GdSnuwZAQ8RtFsTmqqfBKqKp0N6RgBnEB_CbJQlqw-
BF3H6PXl5gv2pHn4oieWX_PB9nJMmmA
- 2015-08-17 17:59:23 UTC - life.mirage-inc.com - GET /index.php?znePf7KaLx7OAoE=l3SMfPrfJxzFGMSUb-nJDa9BMEXCRQLPh4SGhKrXCJ-ofSih17OIFxzsmTu2KV_
OpqxveN0SZFSOzQfZPVQlyZAdChoB_Oqki0vHjUnH1cmQ9laHYghP7cSSQOJv31z0nuBBdcomwh7Q7GdSnuwZAQ8RtFsTmqqfBKqKp0N6RgBnEB_CbJQlqw-
BF3H6PXl5gv2pHn4oieWX_P90nJMmmA
- 2015-08-17 17:59:25 UTC - life.mirage-inc.com - GET /index.php?znePf7KaLx7OAoE=l3SMfPrfJxzFGMSUb-nJDa9BMEXCRQLPh4SGhKrXCJ-ofSih17OIFxzsmTu2KV_
OpqxveN0SZFSOzQfZPVQlyZAdChoB_Oqki0vHjUnH1cmQ9laHYghP7cSSQOJv31z0nuBBdcomwh7Q7GdSnuwZAQ8RtFsTmqqfBKqKp0N6RgBnEB_CbJQlqw-
fECT6PXl5gv2pHn4oieWX_PRzmpMs3lM&dop=0099
POST-INFECTION HTTP TRAFFIC:
- 2015-08-17 18:05:00 UTC - www.google.com - GET /
- 2015-08-17 18:05:04 UTC - www.google.com - GET /
- 2015-08-17 18:06:42 UTC - www.google.com - GET /
- 2015-08-17 18:07:01 UTC - 136.243.34.28 - GET /in_addr.txt
- 2015-08-17 18:07:42 UTC - 136.243.34.28 - GET /in_addr.txt
- 2015-08-17 18:10:22 UTC - 136.243.34.28 - GET /in_addr.txt
- 2015-08-17 18:11:05 UTC - 136.243.34.28 - GET /in_addr.txt
- 2015-08-17 18:13:43 UTC - 136.243.34.28 - GET /in_addr.txt
- 2015-08-17 18:14:27 UTC - 136.243.34.28 - GET /in_addr.txt
- 2015-08-17 18:17:04 UTC - 136.243.34.28 - GET /in_addr.txt
- 2015-08-17 18:17:48 UTC - 136.243.34.28 - GET /in_addr.txt
- 2015-08-17 18:17:56 UTC - 5.9.5.205 - GET / HTTP/1.0
OTHER POST-INFECTION TRAFFIC:
- 2015-08-17 18:00:06 UTC - 43.225.38.217 port 443 - attempted TCP connections
- 2015-08-17 18:04:16 UTC - 111.121.193.242 port 443 - encrypted TCP traffic
- Other TCP attempts/connections include (not a full list, check the pcap for more):
- 2015-08-17 18:04:49 UTC - 103.232.222.57 port 6355
- 2015-08-17 18:04:59 UTC - 103.21.88.25 port 6355
- 2015-08-17 18:04:59 UTC - 103.248.21.83 port 6355
- 2015-08-17 18:04:59 UTC - 185.59.100.8 port 6355
- 2015-08-17 18:04:59 UTC - 93.189.40.187 port 6355
- 2015-08-17 18:04:59 UTC - 178.62.233.35 port 6355
- 2015-08-17 18:04:59 UTC - 212.76.140.209 port 6355
- 2015-08-17 18:04:59 UTC - 217.12.220.224 port 6355
- 2015-08-17 18:05:29 UTC - 109.228.235.233 port 7212
- 2015-08-17 18:04:59 UTC - Start of attempted mail server connections
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT
File name: 2015-08-17-Rig-EK-Flash-exploit.swf
File size: 38.7 KB ( 39,618 bytes )
MD5 hash: 1f620b3df8b4a31bfaf491f60dcb6b05
SHA1 hash: 5bb3752df7af9a02e76549f25a73472e90aac560
SHA256 hash: 53f41b21bf486975707840c24100322f1e7613b5bc4c9ebaf9a846ef2b525b95
Detection ratio: 2 / 56
First submission: 2015-08-16 21:21:59 UTC
VirusTotal link: https://www.virustotal.com/en/file/53f41b21bf486975707840c24100322f1e7613b5bc4c9ebaf9a846ef2b525b95/analysis/
MALWARE PAYLOAD
File name: 2015-08-17-Rig-EK-malware-payload.exe
File size: 168.0 KB ( 172,032 bytes )
MD5 hash: dd17bf5ab2dab1f4a6e8d5a2c37bc830
SHA1 hash: 01761a5432b168a1e29f31de71cd9dcae2d68785
SHA256 hash: fb3fdd2c953721e47a6e122a459b43de05405da2d3e42f54f02d720ef948bce6
Detection ratio: 14 / 56
First submission: 2015-08-17 21:01:36 UTC
VirusTotal link: https://www.virustotal.com/en/file/fb3fdd2c953721e47a6e122a459b43de05405da2d3e42f54f02d720ef948bce6/analysis/
Malwr link: https://malwr.com/analysis/YjhiYWNiYzJjMWZiNDUxZjhmZDZlZGYxMDM1OWIyM2Q/
Hybrid-Analysis link: https://www.hybrid-analysis.com/sample/fb3fdd2c953721e47a6e122a459b43de05405da2d3e42f54f02d720ef948bce6?environmentId=1
![]()
DROPPED MALWARE ON INFECTED HOST
File name: C:\Users\username\qerdycjj.exe
File size: 42.2 MB ( 44,285,952 bytes )
MD5 hash: 9c77fd2e09967c3ae13cdb4dae313ab6
SHA1 hash: 2eeab6b8e572d3a28c72fe8b9bb5d0e3f616a394
SHA256 hash: 3886487fe84636157fe0a8e20dc9b25a5518590093b2536e56fa9e5fd3fe4f25
Detection ratio: 15 / 56
First submission: 2015-08-17 21:04:18 UTC
VirusTotal link: https://www.virustotal.com/en/file/3886487fe84636157fe0a8e20dc9b25a5518590093b2536e56fa9e5fd3fe4f25/analysis/
SNORT EVENTS
Suricata using the Emerging Threats open and ETpro rulesets on Security Onion (not including ET INFO or ET POLICY rules):
- 50.87.248.171 port 80 - ET CURRENT_EVENTS Malicious Redirect 8x8 script tag (sid:2018053)
- 50.87.248.171 port 80 - ET CURRENT_EVENTS Evil Redirector Leading to EK Jul 08 (sid:2021394)
- 94.142.139.186 port 80 - ET CURRENT_EVENTS RIG Exploit URI Struct March 20 2015 (sid:2020721)
- 94.142.139.186 port 80 - ET CURRENT_EVENTS RIG Payload URI Struct March 20 2015 (sid:2020720)
- www.google.com port 80 - ETPRO TROJAN Win32/Tofsee.AX google.com connectivity check (sid:2808012)
Snort 2.9.7.3 using Talos Snort Registered Rules on Debian 7:
- 50.87.248.171 port 80 - [1:32481:1] POLICY-OTHER Remote non-JavaScript file found in script tag src attribute
- 94.142.139.186 port 80 - [1:33906:1] EXPLOIT-KIT Rig exploit kit outbound communication
- 94.142.139.186 port 80 - [1:33905:1] EXPLOIT-KIT Rig exploit kit outbound communication
- 94.142.139.186 port 80 - [1:31902:1] EXPLOIT-KIT Multiple exploit kit flash file download
IMAGES FROM THE TRAFFIC
Gate URL returns iframe pointing to the Rig EK landing page:
HTTP traffic from the pcap:
Wireshark filtered to show some of the post-infection DNS queries and TCP traffic, showing some of the mail server connection attempts:
Wireshark filtered to show some of the post-infection IP addresses and ports (not the HTTP or mail server traffic).
FINAL NOTES
Once again, here are the associated files:
- ZIP of the PCAP: 2015-08-17-Rig-EK-traffic.pcap.zip
- ZIP file of the malware: 2015-08-17-Rig-EK-malware.zip
NOTE: All ZIP archives on this site are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.