2015-10-18 - BIZCN GATE NUCLEAR EK FROM 5.175.148[.]193 SENDS CRYPTOWALL 3.0 RANSOMWARE
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSSOCIATED FILES:
- 2015-10-18-BizCN-gate-actor-Nuclear-EK-traffic.pcap.zip 653.3 kB (653,252 bytes)
 - 2015-10-18-BizCN-gate-actor-Nuclear-EK-malware-and-artifacts.zip 357.8 kB (357,785 bytes)
 
NOTES:
- Bitcoin address I got for this CryptoWall 3.0 ransomware sample's ransom payment was: 178ddNoCFnznwqGbNdMs7ngursdf8rLFno
 
Shown above: User checking one of the decryption instructions web pages.
CHAIN OF EVENTS

Shown above:  Results in Security Onion after using tcpreplay on the pcap.
ASSOCIATED DOMAINS:
- forums.macnn[.]com - Compromised website
 - 136.243.224[.]10 port 80 - kroentro[.]com - BizCN-registered gate
 - 5.175.148[.]193 port 80 - jostuwatko[.]xyz - Nuclear EK
 
- ip-addr[.]es - CryptoWall 3.0 ransomware check for IP address
 - 64.99.80[.]30 port 80 - homopop[.]com - CryptoWall 3.0 ransomware post-infection traffic
 - 104.28.12[.]104 port 80 - javlab[.]org - CryptoWall 3.0 ransomware post-infection traffic
 - 173.254.28[.]37 port 80 - goatsinacoat[.]com - CryptoWall 3.0 ransomware post-infection traffic
 - 93.93.200[.]150 port 80 - eliosbatterie[.]com - CryptoWall 3.0 ransomware post-infection traffic
 - 192.185.114[.]225 port 80 - dorothygilstrap[.]com - CryptoWall 3.0 ransomware post-infection traffic
 - 192.185.193[.]221 port 80 - hanecaklaw[.]com - CryptoWall 3.0 ransomware post-infection traffic
 - 192.185.41[.]182 port 80 - floworldonline[.]com - CryptoWall 3.0 ransomware post-infection traffic
 - 199.83.129[.]236 port 80 - contrasttraining[.]com - CryptoWall 3.0 ransomware post-infection traffic
 - 108.167.182[.]248 port 80 - colinplatt[.]com - CryptoWall 3.0 ransomware post-infection traffic
 
- ayh2m57ruxjtwyd5.speralreaopio[.]com - Domain for one of the decrypt instruction pages - didn't resolve in DNS
 - 95.128.181[.]13 port 80 - ayh2m57ruxjtwyd5.vremlreafpa[.]com - Domain for one of the decrypt instruction pages
 - 95.128.181[.]13 port 80 - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - Domain for one of the decrypt instruction pages
 - 109.70.26[.]37 port 80 - ayh2m57ruxjtwyd5.askhoreasption[.]com - Domain for one of the decrypt instruction pages - went to Russian site saying domain was unavailable
 
COMRPOMISED WEBSITE AND REDIRECT/GATE:

Shown above:  Injected script in page from the compromised website.
- 2015-10-18 01:40:15 UTC - forums.macnn[.]com - GET /
 - 2015-10-18 01:40:16 UTC - kroentro[.]com - GET /h/J/kwPJWK-RxqHL-XhtzjN.php?pjwkv7l=4Nd1-7V43&vLD7qC=333mL2u1d&grC-k=_2q6Z5n3la_e&fOXN=m7ebPf27&
c=eK4Q 
NUCLEAR EK:
- 2015-10-18 01:40:17 UTC - jostuwatko[.]xyz - GET /search?oe=utf-8&ei=DV5UVE1LDFxaAwJVGAFMW1pEEEVHUEFcCx5ISE8.&q=vzjgamr+dtsj+rd+na&qws_rd=fr&ie=utf-8
 
- 2015-10-18 01:40:18 UTC - jostuwatko[.]xyz - GET /document.html?miwr=dAwEGU0xWXQY.&zlijpt=cEHBBsGXQBMAAEDUQED&muwz=36670b3&jwh=
aAUhATV1bDgIHU0k&jdhg=9046d82ca3&jes=bGGAEHTV9YF0RFRlRDD18eSUxNGAYFHwQPSg 
- 2015-10-18 01:40:19 UTC - jostuwatko[.]xyz - GET /build.aspx?bkw=19c8fa0&vpqzd=fmR-WXx4GAE.&blqql=bdC0NEREJWEFtfH01OHkwGBBsGXB4B&lnp=
aAllcVElfCFoCBldLVUwBBkl&bfd=cBgAZVQkATQQDUA&arevgdc=6a76c47b&ilvg=elWJ&jmfse=dUBAgcDVQdMBk 
POST-INFECTION TRAFFIC:
- 2015-10-18 01:40:36 UTC - ip-addr[.]es - GET /
 - 2015-10-18 01:40:36 UTC - homopop[.]com - POST /1.php?p=9h7sfkr25eyfg
 - 2015-10-18 01:40:37 UTC - javlab[.]org - POST /1.php?b=9h7sfkr25eyfg
 - 2015-10-18 01:40:39 UTC - homopop[.]com - POST /1.php?z=4wzlsduwyfzed6
 - 2015-10-18 01:40:40 UTC - javlab[.]org - POST /1.php?u=4wzlsduwyfzed6
 - 2015-10-18 01:40:43 UTC - homopop[.]com - POST /1.php?k=78ysreh4qb8
 - 2015-10-18 01:40:43 UTC - javlab[.]org - POST /1.php?f=78ysreh4qb8
 - 2015-10-18 01:40:46 UTC - goatsinacoat[.]com - POST /1.php?r=78ysreh4qb8
 - 2015-10-18 01:40:46 UTC - eliosbatterie[.]com - POST /1.php?v=78ysreh4qb8
 - 2015-10-18 01:40:47 UTC - dorothygilstrap[.]com - POST /4.php?x=78ysreh4qb8
 - 2015-10-18 01:40:47 UTC - dorothygilstrap[.]com - GET /cgi-sys/suspendedpage.cgi?x=78ysreh4qb8
 - 2015-10-18 01:40:47 UTC - hanecaklaw[.]com - POST /4.php?a=78ysreh4qb8
 - 2015-10-18 01:40:50 UTC - floworldonline[.]com - POST /4.php?q=78ysreh4qb8
 - 2015-10-18 01:40:52 UTC - contrasttraining[.]com - POST /4.php?i=78ysreh4qb8
 - 2015-10-18 01:40:53 UTC - colinplatt[.]com - POST /5.php?k=78ysreh4qb8
 - 2015-10-18 01:40:57 UTC - homopop[.]com - POST /1.php?c=vob9xevd95ej
 - 2015-10-18 01:40:57 UTC - javlab[.]org - POST /1.php?j=vob9xevd95ej
 
USER CHECKING THE DECRYPTION INSTRUCTION WEB PAGES:
- 2015-10-18 01:41:30 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /[info removed]
 - 2015-10-18 01:41:31 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/style.css
 - 2015-10-18 01:41:31 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/flags/us.png
 - 2015-10-18 01:41:31 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/flags/fr.png
 - 2015-10-18 01:41:31 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/flags/es.png
 - 2015-10-18 01:41:31 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/flags/it.png
 - 2015-10-18 01:41:31 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/flags/de.png
 - 2015-10-18 01:41:32 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /picture.php?k=18l8xrs&c25e12beca24c3ed1a166239086a988b
 - 2015-10-18 01:41:33 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/lt.png
 - 2015-10-18 01:41:33 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/rt.png
 - 2015-10-18 01:41:33 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/lb.png
 - 2015-10-18 01:41:33 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/rb.png
 - 2015-10-18 01:41:35 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /favicon.ico
 - 2015-10-18 01:41:40 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - POST /[info removed]
 - 2015-10-18 01:41:42 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/bitcoin.png
 - 2015-10-18 01:41:42 UTC - ayh2m57ruxjtwyd5.vremlreafpa[.]com - GET /img/button_pay.png
 - 2015-10-18 01:56:56 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /[info removed]
 - 2015-10-18 01:56:58 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/style.css
 - 2015-10-18 01:56:58 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/flags/us.png
 - 2015-10-18 01:56:58 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/flags/es.png
 - 2015-10-18 01:56:58 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/flags/fr.png
 - 2015-10-18 01:56:58 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/flags/de.png
 - 2015-10-18 01:56:58 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/flags/it.png
 - 2015-10-18 01:56:58 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /picture.php?k=18l8xrs&796bb64f09a6497bfafb463b4cd0a362
 - 2015-10-18 01:56:59 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/lt.png
 - 2015-10-18 01:56:59 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/rt.png
 - 2015-10-18 01:57:00 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/lb.png
 - 2015-10-18 01:57:00 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/rb.png
 - 2015-10-18 01:57:02 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /favicon.ico
 - 2015-10-18 01:57:08 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - POST /[info removed]
 - 2015-10-18 01:57:10 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/bitcoin.png
 - 2015-10-18 01:57:10 UTC - ayh2m57ruxjtwyd5.wolfwallsreaetpay[.]com - GET /img/button_pay.png
 - 2015-10-18 01:57:19 UTC - ayh2m57ruxjtwyd5.askhoreasption[.]com - GET /[info removed]
 - 2015-10-18 01:57:19 UTC - ayh2m57ruxjtwyd5.askhoreasption[.]com - GET /img/logo_rc.png
 - 2015-10-18 01:57:19 UTC - ayh2m57ruxjtwyd5.askhoreasption[.]com - GET /img/roundb.png
 - 2015-10-18 01:57:19 UTC - ayh2m57ruxjtwyd5.askhoreasption[.]com - GET /img/bg.jpg
 - 2015-10-18 01:57:19 UTC - ayh2m57ruxjtwyd5.askhoreasption[.]com - GET /img/gline.png
 - 2015-10-18 01:57:19 UTC - ayh2m57ruxjtwyd5.askhoreasption[.]com - GET /img/arrow.png
 - 2015-10-18 01:57:21 UTC - ayh2m57ruxjtwyd5.askhoreasption[.]com - GET /favicon.ico
 
PRELIMINARY MALWARE ANALYSIS
FLASH EXPLOIT:
File name: 2015-10-18-BizCN-gate-actor-Nuclear-EK-flash-exploit.swf
File size: 61,116 bytes
MD5 hash: 95278a4debde40fea520a1895d200f8f
SHA1 hash: e0c2d4d4663bd8aaf05518004a947596e4806af8
SHA256 hash: d8883383dcbc71f75ab855f84d292697474b8bbebdaee109698e0d68f4a4194b
Detection ratio: 4 / 56
First submission: 2015-10-20 15:29:14 UTC
VirusTotal link: https://www.virustotal.com/en/file/d8883383dcbc71f75ab855f84d292697474b8bbebdaee109698e0d68f4a4194b/analysis/
MALWARE PAYLOAD:
File name: 2015-10-18-BizCN-gate-actor-Nuclear-EK-payload-CryptoWall-3.0.exe
File size: 155,146 bytes
MD5 hash: 2d814564ff4574bd423496bdd6105c24
SHA1 hash: 235d0914151a37b46178279f4793fc52acad2cfb
SHA256 hash: ac24889f515b094fdf81f3d0144fb97357484a5b01bd65ac3e4b68c34b7c28c2
Detection ratio: 30 / 56
First submission: 2015-10-18 03:29:34 UTC
VirusTotal link: https://www.virustotal.com/en/file/ac24889f515b094fdf81f3d0144fb97357484a5b01bd65ac3e4b68c34b7c28c2/analysis/
Click here to return to the main page.

