2016-04-13 - PSEUDO-DARKLEECH ANGLER EK SENDS TESLACRYPT RANSOMWARE

NOTICE:

ASSOCIATED FILES:

  • 2016-04-13-Malwr-analysis-of-TeslaCrypt-ransomware-sample.pcap   (13,739 bytes)
  • 2016-04-13-pseudo-Darkleech-Angler-EK-sends-TeslaCrypt-ransomware-first-run.pcap   (565,073 bytes)
  • 2016-04-13-pseudo-Darkleech-Angler-EK-sends-TeslaCrypt-ransomware-second-run.pcap   (521,905 bytes)
  • 2016-04-13-page-from-medical-library_net-with-injected-script-first-run.txt   (103,261 bytes)
  • 2016-04-13-page-from-medical-library_net-with-injected-script-second-run.txt   (49,371 bytes)
  • 2016-04-13-pseudo-Darkleech-Angler-EK-flash-exploit-first-run.swf   (66,575 bytes)
  • 2016-04-13-pseudo-Darkleech-Angler-EK-flash-exploit-second-run.swf   (103,261 bytes)
  • 2016-04-13-pseudo-Darkleech-Angler-EK-landing-page-first-run.txt   (149,515 bytes)
  • 2016-04-13-pseudo-Darkleech-Angler-EK-landing-page-second-run.txt   (149,463 bytes)
  • 2016-04-13-pseudo-Darkleech-Angler-EK-payload-TeslaCrypt-ransomware.exe   (229,376 bytes)
  • 2016-04-13-pseudo-Darkleech-script-returned-from-dpvuppocw.hopto_org.txt   (7,261 bytes)
  • 2016-04-13-pseudo-Darkleech-script-returned-from-rbedfqo.hopto_org.txt   (7,531 bytes)

NOTES:

 


Shown above:  Infection traffic filtered in Wireshark - first run.

 


Shown above:  Infection traffic filtered in Wireshark - second run.

 


Shown above:  Pcap from Malwr's analysis of the payload, showing TeslaCrypt ransomware's post-infection traffic.

 

ASSOCIATED DOMAINS:

 

IMAGES


Shown above:  Injected script in page from the compromised website (second run).

 


Shown above:  Start of injected pseudo-Darkleech script returned from the hopto[.]org gate (second run).

 

Click here to return to the main page.