2016-10-20 - EITEST RIG EK DATA DUMP
ASSOCIATED FILES:
- ZIP archive of the pcaps: 2016-10-20-EITest-Rig-EK-all-8-pcaps.zip 11.1 MB (11,124,357 bytes)
- 2016-10-20-EITest-Rig-EK-1st-run.pcap (3,532,390 bytes)
- 2016-10-20-EITest-Rig-EK-2nd-run.pcap (215,287 bytes)
- 2016-10-20-EITest-Rig-EK-3rd-run.pcap (1,727,403 bytes)
- 2016-10-20-EITest-Rig-EK-4th-run.pcap (1,655,781 bytes)
- 2016-10-20-EITest-Rig-EK-5th-run.pcap (3,860,545 bytes)
- 2016-10-20-EITest-Rig-EK-6th-run.pcap (339,632 bytes)
- 2016-10-20-EITest-Rig-EK-7th-run.pcap (379,469 bytes)
- 2016-10-20-EITest-Rig-EK-8th-run.pcap (758,051 bytes)
- ZIP archive of the malware: 2016-10-20-EITest-Rig-EK-malware-and-artifacts.zip 1.7 MB (1,674,018 bytes)
- 2016-10-20-EITest-Rig-EK-flash-exploit-1st-run.swf (77,131 bytes)
- 2016-10-20-EITest-Rig-EK-flash-exploit-2nd-run.swf (77,131 bytes)
- 2016-10-20-EITest-Rig-EK-flash-exploit-3rd-run.swf (77,131 bytes)
- 2016-10-20-EITest-Rig-EK-flash-exploit-4th-run.swf (77,131 bytes)
- 2016-10-20-EITest-Rig-EK-flash-exploit-5th-run.swf (77,131 bytes)
- 2016-10-20-EITest-Rig-EK-flash-exploit-6th-run.swf (77,131 bytes)
- 2016-10-20-EITest-Rig-EK-flash-exploit-7th-run.swf (77,131 bytes)
- 2016-10-20-EITest-Rig-EK-flash-exploit-8th-run.swf (77,131 bytes)
- 2016-10-20-EITest-Rig-EK-landing-page-1st-run.txt (3,444 bytes)
- 2016-10-20-EITest-Rig-EK-landing-page-2nd-run.txt (3,518 bytes)
- 2016-10-20-EITest-Rig-EK-landing-page-3rd-run.txt (3,453 bytes)
- 2016-10-20-EITest-Rig-EK-landing-page-4th-run.txt (3,465 bytes)
- 2016-10-20-EITest-Rig-EK-landing-page-5th-run.txt (3,467 bytes)
- 2016-10-20-EITest-Rig-EK-landing-page-6th-run.txt (3,455 bytes)
- 2016-10-20-EITest-Rig-EK-landing-page-7th-run.txt (3,440 bytes)
- 2016-10-20-EITest-Rig-EK-landing-page-8th-run.txt (3,457 bytes)
- 2016-10-20-EITest-Rig-EK-payload-1st-run.exe (174,418 bytes)
- 2016-10-20-EITest-Rig-EK-payload-2nd-run.exe (79,872 bytes)
- 2016-10-20-EITest-Rig-EK-payload-3rd-run.exe (192,512 bytes)
- 2016-10-20-EITest-Rig-EK-payload-4th-run.exe (192,512 bytes)
- 2016-10-20-EITest-Rig-EK-payload-5th-run.exe (216,064 bytes)
- 2016-10-20-EITest-Rig-EK-payload-6th-run.exe (216,064 bytes)
- 2016-10-20-EITest-Rig-EK-payload-7th-run.exe (260,096 bytes)
- 2016-10-20-EITest-Rig-EK-payload-8th-run.exe (163,840 bytes)
- 2016-10-20-page-from-shapeoko.com-with-injected-script-1st-run.txt (47,221 bytes)
- 2016-10-20-page-from-shapeoko.com-with-injected-script-2nd-run.txt (47,218 bytes)
- 2016-10-20-page-from-shapeoko.com-with-injected-script-3rd-run.txt (47,429 bytes)
- 2016-10-20-page-from-shapeoko.com-with-injected-script-4th-run.txt (46,360 bytes)
- 2016-10-20-page-from-shapeoko.com-with-injected-script-5th-run.txt (47,265 bytes)
- 2016-10-20-page-from-shapeoko.com-with-injected-script-6th-run.txt (47,296 bytes)
- 2016-10-20-page-from-shapeoko.com-with-injected-script-7th-run.txt (47,390 bytes)
- 016-10-20-page-from-shapeoko.com-with-injected-script-8th-run.txt (47,057 bytes)
NOTES:
- Thanks to Baber for providing me info on the compromised site used for this blgo entry.
BACKGROUND ON THE EITEST CAMPAIGN:
- Something I wrote on exploit kit (EK) fundamentals: link
- 2016-10-03 - Palo Alto Networks Unit 42 blog: EITest Campaign Evolution: From Angler EK to Neutrino and Rig.
- 2016-10-03 - Broadanalysis.com: EITest campaign stopped using a gate.
- 2016-10-15 - Broadanalysis.com: EITest campaing stops using obfuscation for injected script in pages from compromised websites.
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: Example of injected script from the EITest campaign in a page from the compromised site.
Shown above: Traffic from the 1st infection filtered in Wireshark.
Shown above: Traffic from the 2nd infection filtered in Wireshark.
Shown above: Traffic from the 3rd infection filtered in Wireshark.
Shown above: Traffic from the 4th infection filtered in Wireshark.
Shown above: Traffic from the 5th infection filtered in Wireshark.
Shown above: Traffic from the 6th infection filtered in Wireshark.
Shown above: Traffic from the 7th infection filtered in Wireshark.
Shown above: Traffic from the 8th infection filtered in Wireshark.
ASSOCIATED DOMAINS:
- www.shapeoko.com - Compromised site
- 185.45.193.56 port 80 - s5kl59.ptn3r.top - Rig EK, 1st infection
- 195.133.201.148 port 80 - new.casinodebinary.com - Rig EK, 2nd infection
- 185.45.193.56 port 80 - xs41rv.ptn3r.top - Rig EK, 3rd infection
- 185.45.193.56 port 80 - upc4t7z.sw5e8jo.top - Rig EK, 4th infection
- 185.45.193.56 port 80 - m3lge.di235kqdf.top - Rig EK, 5th infection
- 185.45.193.57 port 80 - l9q4n7.xvr3z8.top - Rig EK, 6th infection
- 185.45.193.57 port 80 - dvge.agk04.top - Rig EK, 7th infection
- 185.45.193.57 port 80 - npm9m.emp7885.top - Rig EK, 8th infection
- 108.61.174.115 port 443 - static.toolstresw.com - post-infection HTTPS/SSL/TLS traffic, 1st infection
- 213.251.184.66 port 80 - 213.251.184.66 - post-infection HTTP traffic, 2nd infection
- 195.123.209.74 port 80 - miligratonylaonella.com - post-infection HTTP traffic, 3rd and 4th infections
- 178.33.176.230 port 80 - 178.33.176.230 - post-infection HTTP traffic, 5th and 6th infections
- 43.239.221.51 port 80 - monosewi.com - post-infection HTTPS/SSL/TLS traffic over TCP port 80, 8th infection
FILE HASHES
FLASH EXPLOITS:
- SHA256 hash: 00351c20222f82a931cbedc33bc142ed6549b998282baf775f2810545ce8e322
File name: 2016-10-20-EITest-Rig-EK-flash-exploit-1st-run.swf (77,131 bytes)
File name: 2016-10-20-EITest-Rig-EK-flash-exploit-2nd-run.swf (77,131 bytes)
File name: 2016-10-20-EITest-Rig-EK-flash-exploit-3rd-run.swf (77,131 bytes)
File name: 2016-10-20-EITest-Rig-EK-flash-exploit-4th-run.swf (77,131 bytes)
File name: 2016-10-20-EITest-Rig-EK-flash-exploit-5th-run.swf (77,131 bytes)
File name: 2016-10-20-EITest-Rig-EK-flash-exploit-6th-run.swf (77,131 bytes)
File name: 2016-10-20-EITest-Rig-EK-flash-exploit-7th-run.swf (77,131 bytes)
File name: 2016-10-20-EITest-Rig-EK-flash-exploit-8th-run.swf (77,131 bytes)
PAYLOADS:
- SHA256 hash: 5a57832ed8e2dc8f76f797aee6e5706fe365d52fc6a9a73cb496f8f6b156d8da
File name: 2016-10-20-EITest-Rig-EK-payload-1st-run.exe (174,418 bytes)
- SHA256 hash: b51a5c6e70441a9765e170f055805f8f415648c8221b00cce8201e421b8b3d0a
File name: 2016-10-20-EITest-Rig-EK-payload-2nd-run.exe (79,872 bytes)
- SHA256 hash: 6990c903b908cf1ccd322ffa617d11af83ad4a719a43d4bb381bd73b8f1a7001
File name: 2016-10-20-EITest-Rig-EK-payload-3rd-run.exe (192,512 bytes)
File name: 2016-10-20-EITest-Rig-EK-payload-4th-run.exe (192,512 bytes)
- SHA256 hash: 76edeb9a5a1ea9baaebfef55c4a67fcfbe7e3eef42144cb47d9885e9bc6b3312
File name: 2016-10-20-EITest-Rig-EK-payload-5th-run.exe (216,064 bytes)
File name: 2016-10-20-EITest-Rig-EK-payload-6th-run.exe (216,064 bytes)
- SHA256 hash: c9c3c6223d430ac1e36347a0fc0e2122c51cf0e3c59b929d9be3b1ea7d725048
File name: 2016-10-20-EITest-Rig-EK-payload-7th-run.exe (260,096 bytes)
- SHA256 hash: 49d02b2fa986ddd5d3b54a3b3d517ce19e8da6c8873c67345c09b6915840fe7a
File name: 2016-10-20-EITest-Rig-EK-payload-8th-run.exe (163,840 bytes)
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcaps: 2016-10-20-EITest-Rig-EK-all-8-pcaps.zip 11.1 MB (11,124,357 bytes)
- ZIP archive of the malware: 2016-10-20-EITest-Rig-EK-malware-and-artifacts.zip 1.7 MB (1,674,018 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.