2015-12-29 - ANGLER EK FROM 185.86.77.52 SENDS BEDEP
ASSOCIATED FILES:
- ZIP archive of the pcap: 2015-12-29-Angler-EK-sends-Bedep-traffic.pcap.zip 829.2 kB (829,188 bytes)
- ZIP archive of the artifacts: 2015-12-29-Angler-EK-sends-Bedep-artifacts.zip 569.0 kB (568,997 bytes)
NOTES:
- The comrpomised website has shown signs of compromise for the past 2 or 3 months (probably much longer). I previously documented it on 2015-10-12.
Shown above: Injected script in page from the compromised website.
CHAIN OF EVENTS
ASSOCIATED DOMAINS:
- 70.32.77.194 port 80 - www.balloonaloft.com - Compromised website
- 185.86.77.52 port 80 - superagency.arpeggiostaffing.net - Angler EK
- 23.195.10.138 port 80 - www.ecb.europa.eu - Connectivity check by the infected host
- 195.22.28.196 port 80 - blinfegjpnoa.com - Post-infection traffic caused by Bedep
- 195.22.28.222 port 80 - sso.anbtr.com - Post-infection traffic caused by Bedep
- 195.22.28.196 port 80 - xsso.blinfegjpnoa.com - Post-infection traffic caused by Bedep
- 208.100.26.234 port 80 - elqbzhkwptcunbjl.com - Post-infection traffic caused by Bedep
- 95.211.205.229 port 80 - bysxkmhxikr2.com - Post-infection traffic caused by Bedep
- 188.138.71.111 port 80 - close.stockmartin.com - Post-infection traffic caused by Bedep
Shown above: Today's pcap filtered in Wireshark.
COMRPOMISED WEBSITE:
- 2015-12-29 16:12:11 UTC - www.balloonaloft.com - GET /
ANGLER EK:
- 2015-12-29 16:12:15 UTC - superagency.arpeggiostaffing.net - GET /civis/search.php?keywords=1k6&fid0=160os7h5v3.lhg403
- 2015-12-29 16:12:19 UTC - superagency.arpeggiostaffing.net - GET /white.php?reach=ct1VoQtdGQ&smile=lOKrzxIC&normal=ErEFms0NUF&mark=5yU2&street=
HyPFHX&out=b2wIUpL1kX
- 2015-12-29 16:12:19 UTC - superagency.arpeggiostaffing.net - POST /civis/situation.zul?war=R_m8n0zDYO&actually=u4kaSd7jJ&station=VPouvGI&supply=
cnnePRw&method=lNpl8k2y&radio=1qtY&maintain=Lf1
- 2015-12-29 16:12:19 UTC - superagency.arpeggiostaffing.net - GET /white.php?reach=ct1VoQtdGQ&smile=lOKrzxIC&normal=ErEFms0NUF&mark=5yU2&street=
HyPFHX&out=b2wIUpL1kX
- 2015-12-29 16:12:25 UTC - superagency.arpeggiostaffing.net - GET /friend.dhtml?corner=&front=VAV-n&select=&fear=hXhiUgKRx®ion=&action=4xdgC3fWZ2&case=
&condition=SO8QArR1&until=LrxI-YTiB&kill=XTXOEpu
POST-INFECTION TRAFFIC:
- 2015-12-29 16:12:56 UTC - www.ecb.europa.eu - GET /stats/eurofxref/eurofxref-hist-90d.xml?2c30d83e0ae1cfbf441759d44e9ecb84
- 2015-12-29 16:12:59 UTC - blinfegjpnoa.com - POST /index.php?qOG=ACqq
- 2015-12-29 16:13:00 UTC - sso.anbtr.com - GET /domain/blinfegjpnoa.com
- 2015-12-29 16:13:00 UTC - xsso.blinfegjpnoa.com - GET /2e66dd4c8a4c5a946310a6d81cc2029b
- 2015-12-29 16:13:02 UTC - elqbzhkwptcunbjl.com - POST /index.php?ioYY=
- 2015-12-29 16:13:04 UTC - bysxkmhxikr2.com - POST /include/database_error_message.html?U4a8S=gM6O
- 2015-12-29 16:13:04 UTC - bysxkmhxikr2.com - POST /widget.php?YyK=oYcKAU
- 2015-12-29 16:13:05 UTC - bysxkmhxikr2.com - POST /album.php?oUIu=mas2
- 2015-12-29 16:13:20 UTC - close.stockmartin.com - POST /news.php
- 2015-12-29 16:13:31 UTC - bysxkmhxikr2.com - POST /include/functions_bigthree.php?K=WyM0wG
- 2015-12-29 16:14:13 UTC - bysxkmhxikr2.com - POST /forum.php?wguC=kySS
MALWARE
ANGLER EK FLASH EXPLOIT:
File name: 2015-12-29-Angler-EK-flash-exploit.swf
File size: 144.4 KB (147,899 bytes)
MD5 hash: 80d2ac3a04575ae1a82efa696b8cf63c
SHA1 hash: e53e9b0569a191dc44acf62589ffaf032d61e718
SHA256 hash: d098b9d43822fb91e3637245c601deb5048e272f4b1cfba64e4e232cbe46204c
Detection ratio: 2 / 55
First submission: 2015-12-29 18:09:00 UTC
VirusTotal link: https://www.virustotal.com/fr/file/d098b9d43822fb91e3637245c601deb5048e272f4b1cfba64e4e232cbe46204c/analysis/
MALWARE RETRIEVED FROM THE INFECTED HOST:
File name: C:\Users\[username]\AppData\Local\Temp\Low\{7D555416-3C46-47C6-B36F-EED7F0E3A14E}\mpr10.dll
File size: 158.5 KB (162,304 bytes)
MD5 hash: 26dfaca0c70c6eee983b56aaed834181
SHA1 hash: 2d04bf688b74507732822184c80cd4133e5fb753
SHA256 hash: 443cfadafc5708e1a5554a29074911c31c814c4b2723275cb043834f8ceb4506
Detection ratio: 1 / 53
First submission: 2015-12-29 18:08:12 UTC
VirusTotal link: https://www.virustotal.com/fr/file/443cfadafc5708e1a5554a29074911c31c814c4b2723275cb043834f8ceb4506/analysis/
File name: C:\ProgramData\{D9E629DC-CB1C-4A97-9900-81922B4EFFD4}\umpo.dll
File size: 384.0 KB (393,216 bytes)
MD5 hash: 1edd87181f176f0566f5007360d07623
SHA1 hash: 5e8454ae24804bcceb80667ac6b76c7e826e67ca
SHA256 hash: 04b76e4f909a96de2a64266f18996422c24294d8767156067d62a991cc965ff5
Detection ratio: 4 / 55
First submission: 2015-12-29 18:08:35 UTC
VirusTotal link: https://www.virustotal.com/fr/file/04b76e4f909a96de2a64266f18996422c24294d8767156067d62a991cc965ff5/analysis/
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcap: 2015-12-29-Angler-EK-sends-Bedep-traffic.pcap.zip 829.2 kB (829,188 bytes)
- ZIP archive of the artifacts: 2015-12-29-Angler-EK-sends-Bedep-artifacts.zip 569.0 kB (568,997 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.