2016-10-03 - PSEUDO-DARKLEECH RIG EK FROM 194.87.145.238 SENDS CERBER RANSOMWARE
ASSOCIATED FILES:
- ZIP archive of the pcap: 2016-10-03-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware-both-pcaps.zip 726.0 kB (725,960 bytes)
- 2016-10-03-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware-first-run.pcap (475,700 bytes)
- 2016-10-03-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware-second-run.pcap (488,897 bytes)
- ZIP archive of the malware: 2016-10-03-pseudoDarkleech-Rig-EK-sends-Cerber-malware-and-artifacts.zip 2.4 MB (2,384,868 bytes)
- 2016-10-03-Cerber-Decryptor-bootstrap.min.css (121,215 bytes)
- 2016-10-03-Cerber-Decryptor-style.css (2,807 bytes)
- 2016-10-03-Cerber-Decryptor.html (11,966 bytes)
- 2016-10-03-Cerber-decrypt-instructions-README-first-run.hta (63,059 bytes)
- 2016-10-03-Cerber-decrypt-instructions-README-second-run.hta (63,059 bytes)
- 2016-10-03-Cerber-decryption-instructions-first-run.bmp (1,920,054 bytes)
- 2016-10-03-Cerber-decryption-instructions-second-run.bmp (1,920,054 bytes)
- 2016-10-03-page-from-joellipman.com-with-injected-script.txt (68,286 bytes)
- 2016-10-03-page-from-whatsongreece.com-with-injected-script.txt (56,005 bytes)
- 2016-10-03-pseudoDarkleech-Rig-EK-flash-exploit-both-runs.swf (25,671 bytes)
- 2016-10-03-pseudoDarkleech-Rig-EK-landing-page-first-run.txt (30,056 bytes)
- 2016-10-03-pseudoDarkleech-Rig-EK-landing-page-second-run.txt (30,077 bytes)
- 2016-10-03-pseudoDarkleech-Rig-EK-payload-Cerber-first-run.exe (290,980 bytes)
- 2016-10-03-pseudoDarkleech-Rig-EK-payload-Cerber-second-run.exe (290,980 bytes)
BACKGROUND ON THE PSEUDO-DARKLEECH CAMPAIGN:
- Something I wrote on exploit kit (EK) fundamentals: link
- 2016-03-22 - PaloAlto Networks Unit 42 blog: Campaign Evolution: Darkleech to Pseudo-Darkleech and Beyond
- 2016-07-02 - SANS ISC diary: Change in patterns for the pseudoDarkleech campaign
- 2016-09-14 - Malware-traffic-analysis.net: The pseudoDarkleech campaign starts using Rig EK instead of Neutrino EK
- 2016-10-03 - Malware-traffic-analysis.net: The pseudoDarkleech campaign sends Cerber ransomware instead of CryptXXX (this blog post)
- Thanks to @killamjr for information on the compromised website.
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: Injected script from the pseudoDarkleech campaign in page from the first compromised site.
Shown above: Injected script from the pseudoDarkleech campaign in page from the second compromised site.
Shown above: Traffic from the first pcap filtered in Wireshark.
Shown above: Traffic from the second pcap filtered in Wireshark.
ASSOCIATED DOMAINS:
- www.whatsongreece.com - Compromised website (first infection)
- joellipman.com - Compromised website (second infection)
- 194.87.145.238 port 80 - art.powersavasana.com - Rig EK
- 31.184.234.0 - 31.184.235.255 port 6892 (UDP) - UDP traffic caused by Cerber
- 45.59.114.125 port 80 - ffoqr3ug7m726zou.8dlgyg.bid - Cerber traffic (first infection)
- 173.254.231.111 port 80 - ffoqr3ug7m726zou.eujvrw.bid - Cerber traffic (second infection)
DOMAINS FROM THE DECRYPT INSTRUCTIONS:
- ffoqr3ug7m726zou.17zafg.top
- ffoqr3ug7m726zou.m54tkp.bid
- ffoqr3ug7m726zou.onion.to
- ffoqr3ug7m726zou.oxmffh.bid
FILE HASHES
FLASH EXPLOIT:
- SHA256 hash: a08069b7cfdb1b63974bb5661de5cb440b1c52321b8fd60148f9124c9e461e5c
File name: 2016-10-03-pseudoDarkleech-Rig-EK-flash-exploit-both-runs.swf
PAYLOADS:
- SHA256 hash: aa55b9cc5853ecbe7c8aba74d1fb3ae5c226f9de9f60616e769b12a0358e49ef
File name: 2016-10-03-pseudoDarkleech-Rig-EK-payload-Cerber-first-run.exe
- SHA256 hash: 67af5ffb5815451e1c3a372c33bd73cae39afd0b1efb36bce05b25de70fdc74e
File name: 2016-10-03-pseudoDarkleech-Rig-EK-payload-Cerber-second-run.exe
IMAGES
Shown above: Desktop of an infected host after rebooting.
Shown above: Cerber Decryptor (image 1 of 4).
Shown above: Cerber Decryptor (image 2 of 4).
Shown above: Cerber Decryptor (image 3 of 4).
Shown above: Cerber Decryptor (image 4 of 4).
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcap: 2016-10-03-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware-both-pcaps.zip 726.0 kB (725,960 bytes)
- ZIP archive of the malware: 2016-10-03-pseudoDarkleech-Rig-EK-sends-Cerber-malware-and-artifacts.zip 2.4 MB (2,384,868 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.