2016-10-27 - EITEST RIG EK FROM 93.115.38.143 SENDS CHTHONIC BANKING TROJAN
ASSOCIATED FILES:
- ZIP archive of the pcap: 2016-10-27-EITest-Rig-EK-sends-chthonic.pcap.zip 1.1 MB (1,119,379 bytes)
- 2016-10-27-EITest-Rig-EK-sends-chthonic.pcap (1,425,976 bytes)
- ZIP archive of the malware: 2016-10-27-EITest-Rig-EK-sends-Chthonic-malware-and-artifacts.zip 192 kB (192,273 bytes)
- 2016-10-27-EITest-Rig-EK-flash-exploit.swf (52,575 bytes)
- 2016-10-27-EITest-Rig-EK-landing-page.txt (3,261 bytes)
- 2016-10-27-EITest-Rig-EK-page-from-sunelec.com-with-injected-EITest-script.txt (137,024 bytes)
- 2016-10-27-EITest-Rig-EK-payload-Chthonic.exe (181,760 bytes)
NOTES:
- There are currently at least 2 versions of Rig EK being used in the wild by different campaigns.
- One is an updated/evolving "VIP version" version of Rig EK that @kafeine has described as RIG-v here.
- The other version of Rig EK is "regular Rig" that generally looks the same as it has for a while now.
- RIG-v is currently being used by the Afraidgate and pseudoDarkleech campaigns.
- Regular Rig EK is still being used by the EITest campaign.
- Thanks to @killamjr for his tweet about the compromised site used in this blog entry.
BACKGROUND ON THE EITEST CAMPAIGN:
- Something I wrote on exploit kit (EK) fundamentals: link
- 2016-10-03 - Palo Alto Networks Unit 42 blog: EITest Campaign Evolution: From Angler EK to Neutrino and Rig.
- 2016-10-03 - Broadanalysis.com: EITest campaign stopped using a gate.
- 2016-10-15 - Broadanalysis.com: EITest campaing stops using obfuscation for injected script in pages from compromised websites.
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: Injected script from the EITest campaign in a page from the compromised site.
Shown above: Traffic from the infection filtered in Wireshark.
ASSOCIATED DOMAINS:
- sunelec.com - Compromised site
- 93.115.38.143 port 80 - ws78.p51qx.top - Rig EK
- 195.123.209.74 port 80 - helotemafoganefog.com - Chthonic post-infection callback
- 195.123.209.74 port 80 - miligratonylaonella.com - Chthonic post-infection callback
FILE HASHES
FLASH EXPLOIT:
- SHA256 hash: 6b3da198f6adf7bee429fac2cfd826106911cb5e8b93a2126ce644a395d6f0fd
File name: 2016-10-27-EITest-Rig-EK-flash-exploit.swf (52,575 bytes)
PAYLOAD:
- SHA256 hash: d5af74a928ced1af1a5334ee4116f3de9b811f2e0738b438e602e49dcd7fa485
File name: C:\Users\[username]\AppData\Local\Temp\115A.tmp (181,760 bytes)
IMAGES
Shown above: Regsitry entries made for malware persistence.
Shown above: Alerts on the pcap from the Emerging Threats Pro (ETPRO) ruleset using Sguil on Security Onion. Alerts for Chthonic are noted.
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcap: 2016-10-27-EITest-Rig-EK-sends-chthonic.pcap.zip 1.1 MB (1,119,379 bytes)
- ZIP archive of the malware: 2016-10-27-EITest-Rig-EK-sends-Chthonic-malware-and-artifacts.zip 192 kB (192,273 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.