2016-05-18 - PSEUDO-DARKLEECH ANGLER EK FROM 188.138.70.181 SENDS CRYPTXXX
ASSOCIATED FILES:
- ZIP archive of the pcap: 2016-05-18-pseudo-Darkleech-Angler-EK-sends-CryptXXX.pcap.zip 1.1 MB (1,108,927 bytes)
- 2016-05-18-pseudo-Darkleech-Angler-EK-sends-CryptXXX.pcap (1,266,617 bytes)
- ZIP archive of the malware and artifacts: 2016-05-18-pseudo-Darkleech-Angler-EK-sends-CryptXXX-malware-and-artifacts.zip 332.6 kB (332,624 bytes)
- 2016-05-18-CryptXXX-decrypt-instructions.bmp (3,686,454 bytes)
- 2016-05-18-CryptXXX-decrypt-instructions.html (14,190 bytes)
- 2016-05-18-CryptXXX-decrypt-instructions.txt (1,755 bytes)
- 2016-05-18-CryptXXX-ransomware.dll (303,104 bytes)
- 2016-05-18-page-from-hooked-on-nails.com-with-injected-pseudo-Darkleech-script.txt (30,069 bytes)
- 2016-05-18-pseudo-Darkleech-Angler-EK-flash-exploit.swf (66,879 bytes)
- 2016-05-18-pseudo-Darkleech-Angler-EK-landing-page.txt (171,358 bytes)
NOTES:
- Background on the pseudo-Darkleech campaign is available here.
- Proofpoint's blog on Angler EK spreading CryptXXX can be found here.
- An ISC diary I wrote about pseudo-Darkleech causing Angler EK/Bedep/CryptXXX infections is located here.
- A follow-up from Proofpoint about CryptXXX is here
- Thanks to @BiebsMalwareGuy for the original tweet on this.
Shown above: Tweet near the end of April 2016 about today's compromised website.
Shown above: Chain of events for today's infection.
TRAFFIC
Shown aboe: Pcap of the traffic on a normal host filtered in Wireshark. http.request or (tcp.port eq 443 and tcp.flags eq 0x0002)
ASSOCIATED DOMAINS:
- 188.138.70.181 port 80 - plotow-familycontract.unishadeverticalsystem.co.uk - Angler EK
- 144.76.82.19 port 443 - post-infection traffic from today's CryptXXX ransomware (custom encoded)
IMAGES
Shown above: Start of injected pseudo-Darkleech script from the compromised website.
Shown above: Infected host after rebooting it to get past the lock screen.
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcap: 2016-05-18-pseudo-Darkleech-Angler-EK-sends-CryptXXX.pcap.zip 1.1 MB (1,108,927 bytes)
- ZIP archive of the malware and artifacts: 2016-05-18-pseudo-Darkleech-Angler-EK-sends-CryptXXX-malware-and-artifacts.zip 332.6 kB (332,624 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.