2016-09-15 - TWO EXAMPLES OF EITEST RIG EK
ASSOCIATED FILES:
- ZIP archive of the pcaps: 2016-09-15-EITest-Rig-EK-both-pcaps.zip 4.3 MB (4,330,374 bytes)
- 2016-09-15-EITest-Rig-EK-first-example.pcap (460,433 bytes)
- 2016-09-15-EITest-Rig-EK-second-example.pcap (4,662,219 bytes)
- ZIP archive of the malware: 2016-09-15-EITest-Rig-EK-malware-and-artifacts.zip 3.1 MB (3,103,527 bytes)
- 2016-09-15-EITest-Rig-EK-flash-exploit-first-run.swf (49,000 bytes)
- 2016-09-15-EITest-Rig-EK-flash-exploit-second-run.swf (49,000 bytes)
- 2016-09-15-EITest-Rig-EK-landing-page-first-run.txt (3,422 bytes)
- 2016-09-15-EITest-Rig-EK-landing-page-second-run.txt (3,421 bytes)
- 2016-09-15-EITest-Rig-EK-payload-first-run.exe (61,952 bytes)
- 2016-09-15-EITest-Rig-EK-payload-second-run.exe (219,648 bytes)
- 2016-09-15-EITest-flash-redirect-from-allaboutbelgaum.top.swf (4,101 bytes)
- 2016-09-15-EITest-flash-redirect-from-kikuxxx.top.swf (4,101 bytes)
- 2016-09-15-additional-malware-dropped-1-of-2-first-run.dll (179,200 bytes)
- 2016-09-15-additional-malware-dropped-1-of-2-second-run.dll (1,313,280 bytes)
- 2016-09-15-additional-malware-dropped-2-of-2-first-run.dll (179,200 bytes)
- 2016-09-15-additional-malware-dropped-2-of-2-second-run.dll (1,316,864 bytes)
- 2016-09-15-page-from-hydrogengroup.com-with-injected-EITest-script-first-run.txt (52,406 bytes)
- 2016-09-15-page-from-hydrogengroup.com-with-injected-EITest-script-second-run.txt (51,856 bytes)
BACKGROUND ON THE EITEST CAMPAIGN:
- Something I wrote on exploit kit (EK) fundamentals: link
- 2016-03-31 - Palo Alto Networks Unit 42 blog: How the EITest Campaign's Path to Angler EK Evolved Over Time.
- 2016-06-08 - SANS ISC diary: Neutrino EK and CryptXXX (campaigns using Angler EK switch to Neutrino EK)
- 2016-08-18 - SANS ISC diary: 1 compromised site - 2 campaigns (EITest campaign switched to Rig EK)
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: An example of injected script in a page from the compromised site pointing to an EITest gate.
Shown above: Traffic from the first example filtered in Wireshark.
Shown above: Traffic from the first example filtered in Wireshark.
FIRST EXAMPLE:
- www.hydrogengroup.com - Compromised site
- 31.184.192.188 port 80 - kikuxxx.top - EITest gate
- 185.117.73.174 port 80 - nvfd0.iuuo764.top - Rig EK
- 31.184.234.117 port 80 - siri5.ml - Post-infection traffic, possible Tilon/SpyEye2 activity
SECOND EXAMPLE:
- www.hydrogengroup.com - Compromised site
- 31.184.192.188 port 80 - allaboutbelgaum.top - EITest gate
- 185.117.73.175 port 80 - aqir4.hmh9ow4.top - Rig EK
- 185.118.67.195 port 80 - 185.118.67.195 - Post-infection traffic, possible Miuref/Boaxxe activity
- various IP addresses - Post-infection probable click-fraud traffic
FILE HASHES
FLASH FILES:
- SHA256 hash: d2c9c429a864c70a660b8eb1343953e53f98aa7f369533afc4ba3e7e642ca519
File name: 2016-09-15-EITest-flash-redirect-from-kikuxxx.top.swf
File name: 2016-09-15-EITest-flash-redirect-from-allaboutbelgaum.top.swf
- SHA256 hash: e20fc49d11d8232b51ec3ce2fa24d3081c3d48db4cb66a31e2bc2c07b43e27b8
File name: 2016-09-15-EITest-Rig-EK-flash-exploit-first-run.swf
File name: 2016-09-15-EITest-Rig-EK-flash-exploit-second-run.swf
PAYLOADS:
- SHA256 hash: 164222d29856cba2d913e48ee36ef0d7b2fde943d7369437106317e4252f124c
File name: 2016-09-15-EITest-Rig-EK-payload-first-run.exe (possible Tilon/SpyEye2)
File name: C:\ProgramData\xrsfnw.exe
- SHA256 hash: 8451890ea0a66901d1145161ed92c4f45e2655af0419cd0b431555da45b2cb1e
File name: 2016-09-15-EITest-Rig-EK-payload-second-run.exe (possible Miuref/Boaxxe)
File name: C:\Users\[username]\AppData\Local\Temp\6A77.exe
File name: C:\Users\[username]\AppData\Local\AQworks\6A77.exe
ARTIFACTS:
- SHA256 hash: 9e992258e31f81eaaba824ac4a1e80f045d0c1fa707a8b89b0735e617ab6fe12
File name: 2016-09-15-additional-malware-dropped-1-of-2-first-run.dll
File name: C:\Users\[username]\AppData\Local\Temp\8f01207
- SHA256 hash: 6118c8d89695dd1f45a5de6f86db25b422d18206ea916eff159fd7c4c2c52456
File name: 2016-09-15-additional-malware-dropped-2-of-2-first-run.dll
File name: C:\Users\[username]\AppData\Local\Temp\5b75e9dc
- SHA256 hash: 89aeaa25ae395286a2911f997ee368d021ef795afa82497bee2e0b8ab66693f8
File name: 2016-09-15-additional-malware-dropped-1-of-2-second-run.dll
File name: C:\Users\[username]\AppData\Local\AQworks\kwxtedmr.dll
- SHA256 hash: 996a7f0d40c8883c752f6035ddab23212553169aec90a7660839767f4023afb2
File name: 2016-09-15-additional-malware-dropped-2-of-2-second-run.dll
File name: C:\Users\[username]\AppData\Local\Extion\sjcximrq.dll
IMAGES FROM THE FIRST EXAMPLE
Shown above: Registry key(s) that made the malware from the first example persistent.
Shown above: Alerts on the first example traffic in Security Onion using Suricata and the ET Pro ruleset.
Shown above: Some alerts on the first example using Snort 2.9.7.3 with the Snort/Talos subscriber set.
IMAGES FROM THE SECOND EXAMPLE
Shown above: Registry key(s) that made the malware from the second example persistent.
Shown above: Alerts on the second example traffic in Security Onion using Suricata and the ET Pro ruleset.
Shown above: Some alerts on the second example using Snort 2.9.7.3 with the Snort/Talos subscriber set.
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcaps: 2016-09-15-EITest-Rig-EK-both-pcaps.zip 4.3 MB (4,330,374 bytes)
- ZIP archive of the malware: 2016-09-15-EITest-Rig-EK-malware-and-artifacts.zip 3.1 MB (3,103,527 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.