2016-03-09 - ANGLER EK DATA DUMP
PCAP AND MALWARE:
- ZIP archive of the above 3 pcaps: 2016-03-09-Angler-EK-data-dump-traffic-all-pcaps.zip 1.9 MB (1,900,764 bytes)
- ZIP archive of malware and artifacts: 2016-03-09-Angler-EK-data-dump-malware-and-artifacts.zip 1.2 MB (1,237,145 bytes)
NOTES:
- Today continues to show the new Angler landing URI pattern as reported by Kafeine at: https://twitter.com/kafeine/status/707173851013259264
- For background on the pseudo-Darkleech campaign, see: https://blog.sucuri.net/2015/12/evolution-of-pseudo-darkleech.html
- For background on the "EITest" campaign, see:
DOMAINS
GATES (REDIRECTS):
- 85.93.0.33 port 80 - mvcvideo.tk - "EITest" gate
ANGLER EK:
- 80.78.245.196 port 80 - monniksk.steviebongo.co.uk [pseduo-Darkleech]
- 85.25.106.13 port 80 - locantequipartition.evolvingideas.co.uk [pseduo-Darkleech]
- 185.46.11.66 port 80 - ah.gordonfreasjr.com [EITest]
TELSACRYPT POST-INFECTION TRAFFIC:
- 50.87.28.241 port 80 - www.informaticauno.net - POST /gamma/tmp/wstr.php
- 184.168.47.225 port 80 - ahlanmedicalcentre.com - POST /wp-content/uploads/wstr.php
- 188.40.132.132 port 80 - cam-itour.info - POST /users/28c4fe1/wstr.php
EXPLOITS/MALWARE
FLASH EXPLOITS SENT BY ANGLER EK (READ: MD5, FILE NAME):
- 9516a209e580a903415d156c8effcad1 - 2016-03-09-pseudo-Darkleech-Angler-EK-flash-exploit-after-imasummit.com.swf
- cc5962d711e90def1a47560591ab06b5 - 2016-03-09-EITest-Angler-EK-flash-exploit-after-www.rcp-vision.com.swf
- f114f9d0b41961c0bf70033646eb5c90 - 2016-03-09-pseudo-Darkleech-Angler-EK-flash-exploit-after-deathanddesire.com.swf
TESLACRYPT MALWARE SENT BY ANGLER EK (READ: MD5, FILE NAME):
- 1056a63ddc5e0aa22b0f6186e013e552 - 2016-03-09-pseudo-Darkleech-Angler-EK-payload-TeslaCrypt-after-imasummit.com.exe
- 33440a90f3b851a26bcbcd70f36a4e3d - 2016-03-09-pseudo-Darkleech-Angler-EK-payload-TeslaCrypt-after-deathanddesire.com.exe
- 7a560951712cba7a42c2ba91b9e6c154 - 2016-03-09-EITest-Angler-EK-payload-TeslaCrypt-after-www.rcp-vision.com.exe
IMAGES
Shown above: Traffic from the pcaps filtered in Wireshark.
Shown above: Start of injected pseudo-Darkleech script in page from a compromised web site.
Shown above: Injected script in page from a compromised site pointing to an "EITest" gate.
Shown above: Start of injected pseudo-Darkleech script in page from a compromised web site.
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the above 3 pcaps: 2016-03-09-Angler-EK-data-dump-traffic-all-pcaps.zip 1.9 MB (1,900,764 bytes)
- ZIP archive of malware and artifacts: 2016-03-09-Angler-EK-data-dump-malware-and-artifacts.zip 1.2 MB (1,237,145 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.