2016-10-31 - PSEUDO-DARKLEECH RIG-V FROM 64.187.225[.]228 SENDS CERBER RANSOMWARE
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2016-10-31-pseudoDarkleech-RIGv-sends-Cerber-ransomware.pcap.zip 400.0 kB (399,966 bytes)
- 2016-10-31-pseudoDarkleech-RIGv-delivers-Cerber-ransomware.pcap (603,718 bytes)
- 2016-10-31-pseudoDarkleech-RIGv-and-Cerber-ransomware-files.zip 554.5 kB (554,453 bytes)
- 2016-10-31-Cerber-ransomware-decryption-instructions-README.hta (63,083 bytes)
- 2016-10-31-Cerber-ransomware-decryption-instructions.bmp (1,920,054 bytes)
- 2016-10-31-page-from-joellipman_com-with-injected-script-second-run.txt (68,383 bytes)
- 2016-10-31-pseudoDarkleech-RIGv-artifact-MXj6sFosp-second-run.txt (1,137 bytes)
- 2016-10-31-pseudoDarkleech-RIGv-flash-exploit-second-run.swf (51,801 bytes)
- 2016-10-31-pseudoDarkleech-RIGv-landing-page-second-run.txt (5,152 bytes)
- 2016-10-31-pseudoDarkleech-RIGv-payload-Cerber-ransomware.exe (278,568 bytes)
NOTES:
- Saw a different payload from RIG-v used by the pseudoDarkleech campaign earlier today (link).
- That was very unusual (at least for me), but things look back to normal now.
- There are currently at least 2 versions of Rig EK being used by different campaigns.
- One is an updated/evolving "VIP version" version of Rig EK that @kafeine has been calling RIG-v as described here.
- The other version of Rig EK is "regular Rig" that generally looks the same as it has for a while now.
- RIG-v is currently being used by the Afraidgate and pseudoDarkleech campaigns.
- Regular Rig EK is still being used by the EITest campaign.
BACKGROUND ON THE PSEUDO-DARKLEECH CAMPAIGN:
- Something I wrote on exploit kit (EK) fundamentals: link
- 2016-03-22 - PaloAlto Networks Unit 42 blog: Campaign Evolution: Darkleech to Pseudo-Darkleech and Beyond
- 2016-07-02 - SANS ISC diary: Change in patterns for the pseudoDarkleech campaign
- 2016-09-14 - Malware-traffic-analysis.net: The pseudoDarkleech campaign starts using Rig EK instead of Neutrino EK
- 2016-10-03 - Malware-traffic-analysis.net: The pseudoDarkleech campaign stops sending CryptXXX, starts sending Cerber ransomware
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: Injected script from the pseudoDarkleech campaign in a page from the compromised site.
Shown above: Traffic from the infection filtered in Wireshark.
ASSOCIATED DOMAINS:
- joellipman[.]com - Compromised site
- 64.187.225[.]228 port 80 - onlikolyabes56hshop[.]top - RIGv
- 194.165.16[.]0 - 194.165.19[.]255 (194.165.16[.]0/22) port 6892 (UDP) - UDP traffic caused by Cerber ransomware
- 200.63.47[.]104 port 80 - ffoqr3ug7m726zou.hnpee0[.]top - HTTP traffic caused by Cerber ransomware
OTHER DOMAINS FROM THE DECRYPT INSTRUCTIONS:
- ffoqr3ug7m726zou.hclz73[.]top
- ffoqr3ug7m726zou[.]onion[.]to
FILE HASHES
FLASH EXPLOIT:
- SHA256 hash: c8060e6a20fa3d6ef75467c2beec1216a346cf35de863f2533260fb51ecc3cf5
File name: 2016-10-31-pseudoDarkleech-RIGv-flash-exploit-second-run.swf (51,801 bytes)
PAYLOAD (CERBER RANSOMWARE):
- SHA256 hash: a31eb55003834823679085184dbdc0946ffd0037567bd2c088d16e6e95b0d913
File name: C:\Users\[username]\AppData\Local\Temp\rad6848C.tmp.exe (278,568 bytes)
IMAGES
Shown above: Desktop of an infected Windows host after rebooting. Looks like Cerber ransomware is up to version 4.1.1.
Click here to return to the main page.