2017-05-26 - EITEST CAMPAIGN PUSHING TECH SUPPORT SCAMS, RIG EK, HOEFLERTEXT POPUS

NOTICE:

ASSOCIATED FILES:

  • 2017-05-26-EITest-HoeflerText-popup-after-naturalhealthonline_com.pcap   (96,925 bytes)
  • 2017-05-26-EITest-Rig-EK-sends-Cerber-ransomware-after-intothebluefishing_com.pcap   (619,346 bytes)
  • 2017-05-26-EITest-tech-support-scam-after-intothebluefishing_com-UK-based-traffic.pcap   (327,029 bytes)
  • 2017-05-26-EITest-tech-support-scam-after-intothebluefishing_com-US-based-traffic.pcap   (621,442 bytes)
  • 2017-05-25-page-from-naturalhealthonline_com-with-injected-EITest-script-leading-to-HoeflerText-popup.txt   (85,460 bytes)
  • 2017-05-26-Cerber-ransomware-desktop-background.bmp   (3,145,782 bytes)
  • 2017-05-26-Cerber-ransomware-R_E_A_D___T_H_I_S___6EL4PI3M_.hta   (77,493 bytes)
  • 2017-05-26-Cerber-ransomware-R_E_A_D___T_H_I_S___AQRJ_.txt   (1,360 bytes)
  • 2017-05-26-EITest-Rig-EK-payload-Cerber-ransomware.exe   (278,528 bytes)
  • 2017-05-26-Rig-EK-artifact-o32.tmp.txt   (1,141 bytes)
  • 2017-05-26-Rig-EK-flash-exploit.swf   (15,512 bytes)
  • 2017-05-26-Rig-EK-landing-page.txt   (5,094 bytes)
  • 2017-05-26-page-from-intothebluefishing_com-with-injected-EITest-script-for-Rig-EK.txt   (82,068 bytes)
  • 2017-05-26-page-from-intothebluefishing_com-with-injected-EITest-script-for-tech-support-scam-UK.txt   (84,019 bytes)
  • 2017-05-26-page-from-intothebluefishing_com-with-injected-EITest-script-for-tech-support-scam-US.txt   (84,080 bytes)
  • 2017-05-26-page-from-naturalhealthonline_com-with-injected-EITest-script-for-HoeflerText-popup.txt   (85,459 bytes)
  • 2017-05-26-tech-support-scam-audio-UK.mp3   (164,773 bytes)
  • 2017-05-26-tech-support-scam-audio-US.mp3   (589,824 bytes)
  • 2017-05-26-tech-support-scam-page-UK.txt   (45,831 bytes)
  • 2017-05-26-tech-support-scam-page-US.txt   (4,978 bytes)

 


Shown above:  Now that EITest Rig EK is sending Cerber ransomware instead of Mole ransomware...

 

CHECKING AN EITEST-COMPROMISED SITE FROM A LOCATION IN THE UNITED STATES (US)


Shown above:  Injected script in a page from the compromised website.  The highlighted URL leads to a tech support scam page.

 


Shown above:  Traffic filtered in Wireshark.  NOTE: I had to manually copy and paste the URL into a browser.  It did not happen automatically.

 


Shown above:  Screenshot of the tech support scam page with the notification pop-up (US style).

 

CHECKING AN EITEST-COMPROMISED SITE FROM A LOCATION IN THE UNITED KINGDOM (UK)


Shown above:  Injected script in a page from the compromised website.  The highlighted URL leads to a tech support scam page.

 


Shown above:  Traffic filtered in Wireshark.  NOTE: As before, I had to manually copy and paste the gio.aquastring[.]bid
URL into a browser.  It did not happen automatically.

 


Shown above:  The gio.aquastring[.]bid URL redirects to an HTTPS URL.

 


Shown above:  Screenshot of the tech support scam page with the notification pop-up (UK style).

 

CHECKING AN EITEST-COMPROMISED SITE FROM A LOCATION IN JAPAN


Shown above:  Injected script in a page from the compromised site leading to Rig EK.

 


Shown above:  Traffic from the infection filtered in Wireshark.

 


Shown above:  Desktop of an infected Windows host.

 

INDICATORS

The following are indicators associated with this activity.

 

BONUS PICS


Shown above:  HoeflerText popup on site compromised by the EITest campaign.

 


Shown above:  Spora ransomware URL (returns file named "Font_Chrome.exe") from the injected EIText HoflerText script.  The URL never returned anything for me, but it
should have been SHA256 hash 90c171442cb73f258e26b79c026e9e7479457647d1431d5a181be1152195559f.

 

Click here to return to the main page.