2016-04-07 - EITEST ANGLER EK FROM 185.117.75.227
PCAP AND MALWARE:
- ZIP archive of the pcap: 2016-04-07-EITest-Angler-EK-pcaps.zip (5.8 MB)
- 2016-04-07-EITest-Angler-EK-first-run-initial-infection.pcap (619,724 bytes)
- 2016-04-07-EITest-Angler-EK-first-run-post-infection-traffic-gootkit.pcap (5,456,059 bytes)
- 2016-04-07-EITest-Angler-EK-second-run-with-ursnif-post-infection.pcap (852,729 bytes)
- ZIP archive of the malware and artifacts: 2016-04-07-EITest-Angler-EK-malware-and-artifacts.zip (1.1 MB)
- 2016-04-07-EITest-Angler-EK-extracted-DLL-from-silverlight-exploit-krmmL1LNhwx.dll (209,408 bytes)
- 2016-04-07-EITest-Angler-EK-first-and-second-runs-silverlight-exploit.xap (168,662 bytes)
- 2016-04-07-EITest-Angler-EK-first-run-flash-exploit.swf (90,318 bytes)
- 2016-04-07-EITest-Angler-EK-first-run-landing-page.txt (149,347 bytes)
- 2016-04-07-EITest-Angler-EK-payload-first-run-gootkit.exe (148,480 bytes)
- 2016-04-07-EITest-Angler-EK-payload-second-run-ursnif.exe (407,552 bytes)
- 2016-04-07-EITest-Angler-EK-second-run-flash-exploit.swf (37,193 bytes)
- 2016-04-07-EITest-Angler-EK-second-run-landing-page.txt (149,355 bytes)
- 2016-04-07-EITest-gate-flash-file-from-kllog.tk-first-and-second-runs.swf (2,305 bytes)
- 2016-04-07-EITest-script-in-page-from-compromised-site-first-run.txt (1,094 bytes)
- 2016-04-07-EITest-script-in-page-from-compromised-site-second-run.txt (1,068 bytes)
NOTES:
- Today's post has two different Angler EK infections delivered by the EITest campaign.
- These two examples happened 16 minutes apart (one at 13:42 and the next at 13:58 UTC).
- The same Angler EK domain delivered a different payload each time. First was Gootkit, and the second was Ursnif.
- Background on the EITest campaign can be found here.
ASSOCIATED DOMAINS:
- 85.93.0.68 port 80 - kllog.tk - EITest gate (first and second run)
- 185.117.75.227 port 80 - eiptk.me3gqjodev.top - Angler EK (first and second run)
- 209.58.184.213 port 80 - lstumfsuxhs.com - Gootkit TLS traffic (first run)
- 209.58.184.213 port 80 - lstumfsuxhssxyen.com - Gootkit TLS traffic (first run)
- 209.58.184.213 port 443 - Gootkit TLS traffic (first run)
- 37.115.25.16 port 80 - linkplan.at - Ursnif traffic (second run)
- 198.105.244.228 port 80 - hunucted.at and disppowhscarcely.su - Ursnif traffic (second run)
IMAGES
Shown above: Injected EItest script in page from the compromised website.
Shown above: Pcap of the first Angler EK traffic filtered in Wireshark.
Shown above: Had to run the malware in a different host to get post-infection traffic.
Shown above: Saw alerts for Gootkit on the post-infection traffic.
Shown above: Pcap of the second Angler EK traffic filtered in Wireshark. Post-infection traffic in the same pcap.
Shown above: Saw alerts for an Ursnif variant from the second infection.
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcap: 2016-04-07-EITest-Angler-EK-pcaps.zip (5.8 MB)
- ZIP archive of the malware and artifacts: 2016-04-07-EITest-Angler-EK-malware-and-artifacts.zip (1.1 MB)
The ZIP files are password-protected with the standard password. If you don't know it, email me at admin@malware-traffic-analysis.net and ask.
Click here to return to the main page.