2016-10-06 - EITEST RIG EK
ASSOCIATED FILES:
- ZIP archive of the pcap: 2016-10-06-EITest-Rig-EK-both-pcaps.zip 181.3 kB (181,258 bytes)
- 2016-10-06-EITest-Rig-EK-first-run.pcap (293,744 bytes)
- 2016-10-06-EITest-Rig-EK-second-run.pcap (142,303 bytes)
- ZIP archive of the malware: 2016-10-06-EITest-Rig-EK-malware-and-artifacts.zip 126.7 kB (126,664 bytes)
- 2016-10-06-CryptFile2-HELP_DECRYPT_YOUR_FILES.TXT (3,345 bytes)
- 2016-10-06-EITest-Rig-EK-flash-exploit-both-runs.swf (25,334 bytes)
- 2016-10-06-EITest-Rig-EK-landing-page-first-run.txt (3,450 bytes)
- 2016-10-06-EITest-Rig-EK-landing-page-second-run.txt (3,534 bytes)
- 2016-10-06-EITest-Rig-EK-payload-first-run.exe (212,992 bytes)
- 2016-10-06-EITest-Rig-EK-payload-second-run-CryptFile2.exe (77,824 bytes)
- 2016-10-06-page-from-datamax.com-with-injected-EITest-script-first-run.txt (20,609 bytes)
- 2016-10-06-page-from-datamax.com-with-injected-EITest-script-second-run.txt (20,745 bytes)
NOTES:
- Today's tipper on the compromised website came from a tweet by @pancak3lullz on 2016-10-04 (link).
- Payload from my first run looks like the same Hancitor/Chanitor loader that @BroadAnalysis reported earlier today on his blog (link).
- I saw similar, but not the same exact callback traffic, though.
BACKGROUND ON THE EITEST CAMPAIGN:
- Something I wrote on exploit kit (EK) fundamentals: link
- 2016-10-03 - Palo Alto Networks Unit 42 blog: EITest Campaign Evolution: From Angler EK to Neutrino and Rig.
- 2016-10-03 - Broadanalysis.com: EITest campaign stopped using a gate (the same day my Palo Alto Networks Unit 42 blog went live).
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: Injected EITest script in a page from the compromised website.
Shown above: Traffic from the first pcap filtered in Wireshark.
Shown above: Traffic from the second pcap filtered in Wireshark.
ASSOCIATED DOMAINS:
- datamax.com - Compromised website (both pcaps)
- 178.32.92.99 port 80 - y76u2o.cunhb.top - Rig EK (first pcap)
- 107.191.46.57 port 80 - asd.arthurmilleremlak.com - Rig EK (second pcap)
- api.ipify.org - IP address check by the infected host (first pcap)
- 1.1.1.1 port 80 - gotevengsorol.ru - Attempted TCP connection, no response from server (first pcap)
- DNS query for: hensoflettoft.com - response: No Such Name (first pcap)
- DNS query for: tontbetleftun.com - response: No Such Name (first pcap)
- DNS query for: roponwithro.com - response: No Such Name (first pcap)
- 37.59.39.53 port 80 - 37.59.39.53 - CryptFile2 post-infection traffic (second pcap)
FILE HASHES
FLASH EXPLOIT:
- SHA256 hash: 7499355f001a6da3a3f0fbeffde0e213416a52498ce4211182e058a62705f4cc
File name: 2016-10-06-EITest-Rig-EK-flash-exploit-both-runs.swf (25,334 bytes)
PAYLOADS:
- SHA256 hash: 697e8783649d8a5b26b0ce69cf624dd46ebc78c84a2e254d8ee98a04b4358463
File name: 2016-10-06-EITest-Rig-EK-payload-first-run.exe (212,992 bytes)
- SHA256 hash: 83f549e4db93384add65c4203bf80d1eb9b7b5272b9636e77532284d8b760928
File name: 2016-10-06-EITest-Rig-EK-payload-second-run-CryptFile2.exe (77,824 bytes)
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcap: 2016-10-06-EITest-Rig-EK-both-pcaps.zip 181.3 kB (181,258 bytes)
- ZIP archive of the malware: 2016-10-06-EITest-Rig-EK-malware-and-artifacts.zip 126.7 kB (126,664 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.