2016-11-02 - EITEST RIG EK FROM 185.141.26.17
ASSOCIATED FILES:
- ZIP archive of the pcap: 2016-11-02-EITest-Rig-EK-all-3-pcaps.zip 3.4 MB (3,366,330 bytes)
- 2016-11-02-first-run-EITest-Rig-EK-sends-Terdot-Zloader.pcap (2,862,170 bytes)
- 2016-11-02-second-run-EITest-Rig-EK-sends-Zeprox.pcap (238,041 bytes)
- 2016-11-02-third-run-EITest-Rig-EK-sends-Kronos.pcap (631,997 bytes)
- ZIP archive of the malware: 2016-11-02-EITest-Rig-EK-malware-and-artifacts.zip 569 kB (568,820 bytes)
- 2016-11-02-all-3-runs-EITest-Rig-EK-flash-exploit.swf (52,582 bytes)
- 2016-11-02-first-run-EITest-Rig-EK-landing-page.txt (3,295 bytes)
- 2016-11-02-first-run-EITest-Rig-EK-payload-Terdot-Zloader.exe (102,400 bytes)
- 2016-11-02-first-run-page-from-cavallinomotorsport.com-with-injected-EITest-script.txt (18,597 bytes)
- 2016-11-02-second-run-EITest-Rig-EK-landing-page.txt (3,292 bytes)
- 2016-11-02-second-run-EITest-Rig-EK-payload-Zeprox.exe (141,328 bytes)
- 2016-11-02-second-run-page-from-xorbin.com-with-injected-EITest-script.txt (21,828 bytes)
- 2016-11-02-third-run-EITest-Rig-EK-landing-page.txt (3,294 bytes)
- 2016-11-02-third-run-EITest-Rig-EK-payload-Kronos.exe (450,560 bytes)
- 2016-11-02-third-run-page-from-xorbin.com-with-injected-EITest-script.txt (21,827 bytes)
NOTES:
- There are currently at least 2 versions of Rig EK being used in the wild by different campaigns.
- One is an updated/evolving "VIP version" version of Rig EK that @kafeine has described as RIG-v here.
- The other version of Rig EK is "regular Rig" that generally looks the same as it has for a while now.
- RIG-v is currently being used by the Afraidgate and pseudoDarkleech campaigns.
- Regular Rig EK is still being used by the EITest campaign.
BACKGROUND ON THE EITEST CAMPAIGN:
- Something I wrote on exploit kit (EK) fundamentals: link
- 2016-10-03 - Palo Alto Networks Unit 42 blog: EITest Campaign Evolution: From Angler EK to Neutrino and Rig.
- 2016-10-03 - Broadanalysis.com: EITest campaign stopped using a gate.
- 2016-10-15 - Broadanalysis.com: EITest campaing stops using obfuscation for injected script in pages from compromised websites.
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: Injected script from the EITest campaign in a page from the compromised site (first run).
Shown above: Traffic from the infection filtered in Wireshark (first run).
Shown above: Injected script from the EITest campaign in a page from the compromised site (second run).
Shown above: Traffic from the infection filtered in Wireshark. (second run)
Shown above: Injected script from the EITest campaign in a page from the compromised site (third run).
Shown above: Traffic from the infection filtered in Wireshark. (third run)
ASSOCIATED DOMAINS:
- cavallinomotorsport.com - Compromised site, first run
- 185.141.26.17 port 80 - tfbgk.g20ji8auc.top - Rig EK, first run
- 178.137.16.14 port 80 - kontomnetu.bid - Post-infection traffic, Terdot.A/Zloader checkin
- www.xorbin.com - Compromised second, first run
- 185.141.26.17 port 80 - wgcgu.g20ji8auc.top - Rig EK, second run
- 194.58.108.203 port 80 - 194.58.108.203 - Post-infection traffic, Zeprox.B checkin
- www.xorbin.com - Compromised site, third run
- 185.141.26.17 port 80 - wgcgu.g20ji8auc.top - Rig EK, third run
- 216.126.225.196 port 80 - 2mynameins3344.net - Post-infection traffic, Kronos checkin
FILE HASHES
FLASH EXPLOITS:
- SHA256 hash: 1613acd34bfb85121bef0cd7a5cc572967912f9f674eefd7175f42ad2099e3d1
File name: 2016-11-02-all-3-runs-EITest-Rig-EK-flash-exploit.swf (52,582 bytes)
PAYLOADS:
- SHA256 hash: 158a6fde1ff14aa2d833445547da59353226732041f129f7f5f6275eb2be22f4
File name: 2016-11-02-first-run-EITest-Rig-EK-payload-Terdot-Zloader.exe (102,400 bytes)
- SHA256 hash: d9c49283e3e13a99782427ebd5e373bfd47293bbc89cb6a5f4ca675c9563ec4c
File name: 2016-11-02-second-run-EITest-Rig-EK-payload-Zeprox.exe (141,328 bytes)
- SHA256 hash: cf228b5e3c4febfee5321cf8311836a76f186144e2848bc9acdb06f25a9f05d6
File name: 2016-11-02-third-run-EITest-Rig-EK-payload-Kronos.exe (450,560 bytes)
IMAGES
Shown above: Alerts using tcpreplay on the first pcap with the Emerging Threats Pro (ETPRO) ruleset from Sguil on Security Onion.
Shown above: Alerts after reading the first pcap with Snort 2.9.8.3 on Debian 7.1.1 using the Snort Subscription ruleset.
Shown above: Alerts using tcpreplay on the second pcap with the Emerging Threats Pro (ETPRO) ruleset from Sguil on Security Onion.
Shown above: Alerts after reading the second pcap with Snort 2.9.8.3 on Debian 7.1.1 using the Snort Subscription ruleset (part 1 of 2).
Shown above: Alerts after reading the second pcap with Snort 2.9.8.3 on Debian 7.1.1 using the Snort Subscription ruleset (part 2 of 2).
Shown above: Alerts using tcpreplay on the third pcap with the Emerging Threats Pro (ETPRO) ruleset from Sguil on Security Onion.
Shown above: Alerts after reading the third pcap with Snort 2.9.8.3 on Debian 7.1.1 using the Snort Subscription ruleset.
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcap: 2016-11-02-EITest-Rig-EK-all-3-pcaps.zip 3.4 MB (3,366,330 bytes)
- ZIP archive of the malware: 2016-11-02-EITest-Rig-EK-malware-and-artifacts.zip 569 kB (568,820 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.