2016-04-07 - EITEST ANGLER EK FROM 185.117.75[.]227

NOTICE:

ASSOCIATED FILES:

  • 2016-04-07-EITest-Angler-EK-first-run-initial-infection.pcap   (619,724 bytes)
  • 2016-04-07-EITest-Angler-EK-first-run-post-infection-traffic-Gootkit.pcap   (5,456,059 bytes)
  • 2016-04-07-EITest-Angler-EK-second-run-with-Ursnif-post-infection.pcap   (852,729 bytes)
  • 2016-04-07-EITest-Angler-EK-extracted-DLL-from-Silverlight-exploit-krmmL1LNhwx.dll   (209,408 bytes)
  • 2016-04-07-EITest-Angler-EK-first-and-second-runs-Silverlight-exploit.xap   (168,662 bytes)
  • 2016-04-07-EITest-Angler-EK-first-run-flash-exploit.swf   (90,318 bytes)
  • 2016-04-07-EITest-Angler-EK-first-run-landing-page.txt   (149,347 bytes)
  • 2016-04-07-EITest-Angler-EK-payload-first-run-Gootkit.exe   (148,480 bytes)
  • 2016-04-07-EITest-Angler-EK-payload-second-run-Ursnif.exe   (407,552 bytes)
  • 2016-04-07-EITest-Angler-EK-second-run-flash-exploit.swf   (37,193 bytes)
  • 2016-04-07-EITest-Angler-EK-second-run-landing-page.txt   (149,355 bytes)
  • 2016-04-07-EITest-gate-flash-file-from-kllog_tk-first-and-second-runs.swf   (2,305 bytes)
  • 2016-04-07-EITest-script-in-page-from-compromised-site-first-run.txt   (1,094 bytes)
  • 2016-04-07-EITest-script-in-page-from-compromised-site-second-run.txt   (1,068 bytes)

NOTES:

 

ASSOCIATED DOMAINS:

 

IMAGES


Shown above:  Injected EItest script in page from the compromised website.

 


Shown above:  Traffic from the first Angler EK traffic filtered in Wireshark.

 


Shown above:  Had to run the malware in a different host to get post-infection traffic.

 


Shown above:  Saw alerts for Gootkit on the post-infection traffic.

 


Shown above:  Traffic from the second Angler EK traffic filtered in Wireshark.  Post-infection traffic in the same pcap.

 


Shown above:  Saw alerts for an Ursnif variant from the second infection.

 

Click here to return to the main page.