2016-04-18 - EITEST AND PSEUDO-DARKLEECH ANGLER EK
ASSOCIATED FILES:
- ZIP archive of the pcaps: 2016-04-18-Angler-EK-both-pcaps.zip 5.2 MB (5,198,378 bytes)
- 2016-04-18-EITest-Angler-EK-sends-Panda-banker.pcap (1,034,895 bytes)
- 2016-04-18-pseudo-Darkleech-Angler-EK-sends-Bedep-and-ransomware.pcap (4,867,166 bytes)
- ZIP archive of the malware and artifacts: 2016-04-18-Angler-EK-malware-and-artifacts.zip 1.4 MB (1,448,810 bytes)
- 2016-04-18-injected-EITest-script-in-page-from-compromised-site.txt (1,096 bytes)
- 2016-04-18-EITest-flash-file-from-caddea.tk.swf (15,528 bytes)
- 2016-04-18-EITest-Angler-EK-landing-page.txt (174,243 bytes)
- 2016-04-18-EITest-Angler-EK-flash-exploit.swf (31,688 bytes)
- 2016-04-18-EITest-Angler-EK-silverlight-exploit.xap (169,132 bytes)
- 2016-04-18-EITest-Angler-EK-extracted-DLL-from-silverlight-exploit-GrmBL2Lnhwx.dll (209,408 bytes)
- 2016-04-18-EITest-Angler-EK-payload-Panda-banker.exe (161,792 bytes)
- 2016-04-18-page-with-injected-pseudo-Darkleech-script-from-altanticeyephysicians.com.txt (40,138 bytes)
- 2016-04-18-pseudo-Darkleech-Angler-EK-landing-page.txt (174,289 bytes)
- 2016-04-18-pseudo-Darkleech-Angler-EK-flash-exploit.swf (40,376 bytes)
- 2016-04-18-C-Users-username-AppData-Local-Temp-15BA39EC-8171-4EBE-837B-3EDA6605A12-api-ms-win-system-rasadhlp-l1-1-0.dll (299,008 bytes)
- 2016-04-18-C-Users-username-AppData-Local-Temp-9D920166-42D4-4F1C-87BD-3353F7993691-api-ms-win-system-recovery-l1-1-0.dll (299,008 bytes)
- 2016-04-18-C-ProgramData-9A88E103-A20A-4EA5-8636-C73B709A5BF8-thawbrkr.dll (358,536 bytes)
- de_crypt_readme.bmp (232,6734 bytes)
- de_crypt_readme.html (3,315 bytes)
- de_crypt_readme.txt (1,641 bytes)
NOTES:
- Background on the pseudo-Darkleech campaign can be found here.
- Background on the EITest campaign can be found here.
- Identification of the EITest Angler EK payload is based on EmergingThreats alerts for post-infection traffic.
- Today's example of pseudo-Darkleech Angler EK delivered Bedep and followed up with some sort of ransomware. (Note: It's CryptXXX ransomwware. See next line.)
- 2016-04-20 update: The 2 DLLs listed above under the user's AppData\Local\Temp directory are CryptXXX ransomware. See Proofpoint's blog post about it for more details.
- @Kafeine has an excellent blog post on malware.dontneedcoffee.com explaining how Bedep has evolved to avoid security researchers using virtual machines.
TRAFFIC
Shown above: Pcap of the EITest Angler EK infection traffic filtered in Wireshark.
Shown above: Pcap of the pseudo-Darkleech Angler EK infection traffic filtered in Wireshark.
ASSOCIATED DOMAINS:
- 85.93.0.68 port 80 - caddea.tk - EITest gate
- 185.141.25.63 port 80 - kjs5s.libec9pm1.top - Angler EK caused by the EITest campaign
- yandex.ru - Panda banker connectivity check
- 37.25.38.14 port 80 - secpressnetwork.com - Panda banker post-infection traffic
- 88.202.230.78 port 80 - szeakbagili-conmebol.teachersofvision.org - Angler EK caused by pseudo-Darkleech campaign
- www.ecb.europa.eu - GET /stats/eurofxref/eurofxref-hist-90d.xml - Bedep connectivity check, info for DGA C2 domains
- 82.141.230.141 port 80 - bgbixqxbneszihbum.com - Bedep post-infection traffic
- 162.244.32.123 port 80 - eiwtljjjzxiy7k.com - Bedep post-infection traffic
- 146.0.42.68 port 443 - CryptXXX callback traffic
- 89.163.241.90 port 80 - jimmymorisonguitars.com - GET /ads.php?sid=1957 - Click fraud begins
- 104.193.252.234 port 80 - lovelyroomsforday.com - GET /ads.php?sid=1957 - Click fraud begins
- 89.163.240.118 port 80 - kjnoa9sdi3mrlsdnfi.com - GET /ads.php?sid=1957 - Click fraud begins
- 207.182.148.92 port 80 - allofuslikesforums.com - GET /ads.php?sid=1957 - Click fraud begins
- 162.244.32.122 port 80 - daytonamagik.com - GET /ads.php?sid=1957 - Click fraud begins
- 162.244.32.121 port 80 - bookersmartest.xyz - GET /ads.php?sid=1957 - Click fraud begins
IMAGES
Shown above: Using the EmergingThreats ruleset, I saw alerts for Panda banker malware from the EITest Angler EK traffic.
Shown above: Panda banker malware made persistent on the infected Windows host after the EITest Angler EK traffic.
Shown above: Desktop of the infected Windows host with CryptXXX artifacts after pseudo-Darkleech Angler EK caused the Bedep infection.
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcaps: 2016-04-18-Angler-EK-both-pcaps.zip 5.2 MB (5,198,378 bytes)
- ZIP archive of the malware and artifacts: 2016-04-18-Angler-EK-malware-and-artifacts.zip 1.4 MB (1,448,810 bytes)
ZIP files are password-protected with the standard password. If you don't know it, see the "about" page of this website, or email me and ask.
Click here to return to the main page.