2016-04-21 - RIG EK FROM 5.200.35[.]189 SENDS TOFSEE

NOTICE:

ASSOCIATED FILES:

  • 2016-04-21-Rig-EK-sends-Tofsee.pcap   (316,262 bytes)
  • 2016-04-21-Rig-EK-flash-exploit.swf   (13,887 bytes)
  • 2016-04-21-Rig-EK-landing-page.txt   (4,736 bytes)
  • 2016-04-21-Rig-EK-malware-pyaload-Tofsee.exe   (208,896 bytes)
  • 2016-04-21-iframe-returned-from-tobiasdesigns_com-pointing-to-Rig-EK.txt   (332 bytes)
  • 2016-04-21-page-from-doc-italia_com-with-injected-script.txt   (5,972 bytes)
  • ppyymxkk.exe   (4,129,1776 bytes) -- Dropped at C:\Users\[username]\ppyymxkk.exe

 


Shown above:  A flow chart depicting this infection's chain of events.

 

NOTES:

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

ASSOCIATED DOMAINS:

 

IMAGES


Shown above:  The Rig EK payload (Tofsee).

 


Shown above:  The 41+ MB file dropped by Tofsee (the malware copied itself and
added a lot of padding) with one of the registry entries for persistence.

 

Click here to return to the main page.