2015-10-30 - NUCLEAR EK FROM 188.166.65[.]14
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSSOCIATED FILES:
- 2015-10-30-Nuclear-EK-traffic.pcap.zip 2.0 MB (1,982,829 bytes)
 - 2015-10-30-Nuclear-EK-malware-and-artifacts.zip 1.4 MB (1,404,626 bytes)
 
CHAIN OF EVENTS

Shown above:  Results in Security Onion after using tcpreplay on the pcap.
ASSOCIATED DOMAINS:
- 104.28.28[.]185 port 80 - gasfiliera[.]it - Compromised website
 - 188.166.65[.]14 port 80 - yjlvh61dby62cvao5[.]ml - Nuclear EK
 - 77.122.234[.]122 port 80 - 77.122.234[.]122 - Post-infection traffic - GET /harsh02.exe
 - 188.2.225[.]220 port 80 - 188.2.225[.]220 - Post-infection traffic - GET /welcome.htm - GET /home.htm
 - 130.180.212[.]70 port 80 - 130.180.212[.]70 - Post-infection traffic - GET /online.htm
 - 106.242.117[.]85 port 80 - 106.242.117[.]85 - Post-infection traffic - GET /setup.htm
 - 46.118.178[.]14 port 80 - 46.118.178[.]14 - Post-infection traffic - GET /file.htm - GET /install.htm
 - 186.115.146[.]227 port 80 - 186.115.146[.]227 - Post-infection traffic - GET /index.htm - GET /file.htm
 
IMAGES FROM THE TRAFFIC

Shown above:  Injected script in page from the compromised website.

Shown above:  HTTP requests during the traffic.

Shown above:  Filtering the traffic in Wireshark, you'll find more than 150 IP addresses the infected host reached out to.

Shown above:  Post-infection traffic also shows DNS queries to unusual IP addresses.
Click here to return to the main page.
