2016-04-29 - ANGLER AND NEUTRINO EK DATA DUMP
ASSOCIATED FILES:
- ZIP archive of all 8 pcaps: 2016-04-29-EK-data-dump-all-pcaps.zip 13.5 MB (13,525,984 bytes)
- ZIP archive of the malware and artifacts: 2016-04-29-EK-data-dump-malware-and-artifacts.zip 3.2 MB (3,220,822 bytes)
NOTES:
There's too much to write about in detail for each of the pcaps. Today's post has four pcaps with EITest Angler EK (a different payload each time), two pcaps with pseudo-Darkleech Angler EK sending Bedep/CryptXXX, and two pcaps with Neutrino EK sending something else. You'll have to review the pcaps for details.
- Background on the EITest campaign can be found here.
- Background on the pseudo-Darkleech campaign is available here.
- Proofpoint's blog on Angler EK spreading CryptXXX can be found here.
- An ISC diary I wrote about pseudo-Darkleech causing Angler EK/Bedep/CryptXXX infections is located here.
Two other items...
ITEM 1: The past day or two, I've seen a few examples of injected pseudo-Darkleech script point to .eu domains, but they don't go anywhere. Why?  Because the domain is not resolved in DNS. Here's an example:
Whenever I've seen pseudo-Darkleech script generate a URL with an .eu domain, it never works. And the URLs using those .eu domains look a little like Neutrino EK. I can't say if they actually are Neutrino EK, though. I suppose I'll figure it out if those domains ever start resolving.
ITEM 2: In today's two Angler EK/Bedep/CryptXXX infections, svchost.exe was dropped in the same folder with the CryptXXX .dll. For example:
- C:\Users\[username]\AppData\Local\Temp\{89699C55-6CDA-4C22-A60F-5DB51EE71726}\api-ms-win-system-bthci-l1-1-0.dll
- C:\Users\[username]\AppData\Local\Temp\{89699C55-6CDA-4C22-A60F-5DB51EE71726}\svchost.exe
That svchost.exe is actually rundll32.exe. It's a legitimate Windows file (VirusTotal link). But in this case, it's being used to load the CryptXXX .dll file. I got an error during today's first CryptXXX infection on a 64-bit Windows host. I didn't see an error during the second infection on a 32-bit host.
In both cases, the CryptXXX .dll file wasn't deleted like it normally is. Except for TCP port 443 callback traffic associated with CryptXXX, I didn't find any other signs of CryptXXX on the two infected hosts. The click-fraud traffic normally seen after Bedep still seemed normal, though.
CONTENTS OF TODAY'S ZIP ARCHIVES
EIGHT PCAPS IN THE PCAP ARCHIVE:
- 2016-04-28-EITest-Angler-EK-first-run.pcap (997,009 bytes)
- 2016-04-28-EITest-Angler-EK-second-run.pcap (951,877 bytes)
- 2016-04-28-EITest-Angler-EK-third-run.pcap (4,225,141 bytes)
- 2016-04-29-EITest-Angler-EK.pcap (1,006,368 bytes)
- 2016-04-29-Neutrino-EK-first-run.pcap (1,890,676 bytes)
- 2016-04-29-Neutrino-EK-second-run.pcap (844,973 bytes)
- 2016-04-29-pseudo-Darkleech-Angler-EK-first-run.pcap (3,091,933 bytes)
- 2016-04-29-pseudo-Darkleech-Angler-EK-second-run.pcap (3,069,963 bytes)
ITEMS IN THE MALWARE AND ARTIFACTS ZIP ARCHIVE:
- 2016-04-28-EITest-Angler-EK-flash-exploit.swf (54,445 bytes)
- 2016-04-28-EITest-Angler-EK-landing-page-first-run.txt (69,668 bytes)
- 2016-04-28-EITest-Angler-EK-landing-page-second-run.txt (91,196 bytes)
- 2016-04-28-EITest-Angler-EK-landing-page-third-run.txt (91,222 bytes)
- 2016-04-28-EITest-Angler-EK-payload-first-run.dll (167,936 bytes)
- 2016-04-28-EITest-Angler-EK-payload-second-run.exe (266,449 bytes)
- 2016-04-28-EITest-Angler-EK-payload-third-run.exe (155,648 bytes)
- 2016-04-28-EITest-flash-file-used-in-gate-traffic-also-seen-on-2016-04-29.swf (15,596 bytes)
- 2016-04-28-and-29-EITest-Angler-EK-extracted-DLL-from-silverlight-exploit.dll (209,408 bytes)
- 2016-04-28-and-29-EITest-Angler-EK-silverlight-exploit.xap (169,132 bytes)
- 2016-04-29-EITest-Angler-EK-flash-exploit.swf (54,495 bytes)
- 2016-04-29-EITest-Angler-EK-landing-page.txt (91,226 bytes)
- 2016-04-29-EITest-Angler-EK-payload.exe (295,688 bytes)
- 2016-04-29-Neutrino-EK-flash-exploit-first-run.swf (72,211 bytes)
- 2016-04-29-Neutrino-EK-flash-exploit-second-run-1-of-2.swf (71,161 bytes)
- 2016-04-29-Neutrino-EK-flash-exploit-second-run-2-of-2.swf (71,161 bytes)
- 2016-04-29-Neutrino-EK-landing-page-first-run.txt (1,038 bytes)
- 2016-04-29-Neutrino-EK-landing-page-second-run.txt (972 bytes)
- 2016-04-29-Neutrino-EK-payload-both-runs.exe (300,544 bytes)
- 2016-04-29-page-from-mamaok.pl-with-injected-pseudo-Darkleech-script.txt (646,564 bytes)
- 2016-04-29-page-from-yoursdental.in-with-injected-pseudo-Darkleech-script.txt (40,232 bytes)
- 2016-04-29-pseudo-Darkleech-Angler-EK-CryptXXX-ransomware-first-run.dll (619,520 bytes)
- 2016-04-29-pseudo-Darkleech-Angler-EK-CryptXXX-rasomware-run.dll (338,944 bytes)
- 2016-04-29-pseudo-Darkleech-Angler-EK-click-fraud-malware-first-run.dll (421,536 bytes)
- 2016-04-29-pseudo-Darkleech-Angler-EK-click-fraud-malware-second-run.dll (311,296 bytes)
- 2016-04-29-pseudo-Darkleech-Angler-EK-flash-exploit-both-runs.swf (66,918 bytes)
- 2016-04-29-pseudo-Darkleech-Angler-EK-landing-page-first-run.txt (91,228 bytes)
- 2016-04-29-pseudo-Darkleech-Angler-EK-landing-page-second-run.txt (91,234 bytes)
TRAFFIC
ASSOCIATED DOMAINS:
- 85.93.0.68 port 80 - bexythy.tk - EITest gate on 2016-04-28
- 85.93.0.68 port 80 - biinee.tk - EITest gate on 2016-04-29
- 185.141.25.161 port 80 - vln0z.t54grp0l.top - Angler EK [EITest]
- 185.117.73.114 port 80 - mnqt.ba1qc2jiu.top - Angler EK [EITest]
- 185.117.73.116 port 80 - u2j.gm7pi4x.top and bry8ei.uagd6ekm.top - Angler EK [EITest]
- 85.25.107.219 port 80 - deskevichescotty.cubabarrelshipping.com - Angler EK [pseudo-Darkleech]
- 188.138.57.69 port 80 - csfcunreturningly.cubashipping.net - Angler EK [pseudo-Darkleech]
- 45.32.156.88 port - rtuqmdjr.afthis.top and drejzeyok.afthis.top - Neutrino EK [first time]
- 45.32.156.88 port - hfqmww.afthis.top and jolouc.afthis.top - Neutrino EK [second time]
- Various IP addresses and domains for the callback traffic. Review the pcaps for details.
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of all 8 pcaps: 2016-04-29-EK-data-dump-all-pcaps.zip 13.5 MB (13,525,984 bytes)
- ZIP archive of the malware and artifacts: 2016-04-29-EK-data-dump-malware-and-artifacts.zip 3.2 MB (3,220,822 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.