2018-05-27 - SLYIP CAMPAIGN USES GRANDSOFT EK TO PUSH URSNIF
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- Zip archive with pcaps of the traffic: 2018-05-27-SlyIP-Grandsoft-EK-pcaps.zip 24.9 MB (24,862,201 bytes)
 
- 2018-05-27-1st-run-SlyIP-Grandsoft-EK-with-post-infection-traffic.pcap (10,428,474 bytes)
 - 2018-05-27-2nd-run-SlyIP-Grandsoft-EK-with-post-infection-traffic.pcap (16,254,665 bytes)
 
- Zip archive of the malware and artifacts: 2018-05-27-SlyIP-Grandsoft-EK-malware-and-artifacts.zip 830 kB (830,461 bytes)
 
- 2018-05-27-1st-run-SlyIP-Grandsoft-EK-payload-Ursnif.exe (558,592 bytes)
 - 2018-05-27-2nd-run-SlyIP-Grandsoft-EK-payload-Ursnif.exe (522,240 bytes)
 - 2018-05-27-both-runs-Grandsoft-EK-CVE-2016-0189.txt (25,393 bytes)
 - 2018-05-27-both-runs-Grandsoft-EK-dwie.hta.txt (2,031 bytes)
 - 2018-05-27-both-runs-Grandsoft-EK-fake-DLL-from-VBscript-in-CVE-2016-0189.dll (4,429 bytes)
 - 2018-05-27-both-runs-Grandsoft-EK-landing-page.txt (530 bytes)
 
NOTES:
- Since 2018-05-11, @nao_sec has been documenting an exploit kit (EK) campaign called "SlyIP" at traffic.moe.
 - It's called the SlyIP campaign, because the URL redirecting to the EK has a domain ending with "slyip[.]com" or "slyip[.]net".
 - Original reference in this tweet, and more examples are available at traffic.moe.
 - These SlyIP URLs have led to Grandsoft EK or Rig EK, and this campaign has been documented pushing Ursnif malware or Gandcrab ransomware.
 - Today's SlyIP example has Grandsoft EK pushing Ursnif.
 - I recorded two infection runs to show the minor differences in Grandsoft EK domains (from .xyz to .tk) and the post-infection traffic.
 
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domains and URLs:
- fasthosting.slyip[.]com
 - fasthosting.slyip[.]net
 - vzdnprediction.project-x-adminko-test[.]tk
 - owkhdharshness.ebxseoccupationeclr[.]xyz
 - hxxp[:]//www.dalmo[.]cz/files/AZE.bin
 - hxxp[:]//5.64.157[.]228/a3.sign
 - u55.evama[.]at
 - work.a-poster[.]info
 
TRAFFIC

Shown above:  Some of the HTTP requests from an infection filtered in Wireshark.

Shown above:  Some of the Tor traffic with the HTTP requests from an infection filtered in Wireshark.

Shown above:  More filtering in Wireshark to for a better idea of the SMTP traffic and HTTP traffic on non-standard ports.

Shown above:  One of the HTTP POST requests related to work.a-poster.info.

Shown above:  Another one of the HTTP POST requests related to work.a-poster.info.
GRANDSOFT EK TRAFFIC:
- 185.17.122[.]212 port 80 - owkhdharshness.ebxseoccupationeclr[.]xyz - Grandsoft EK (1st run)
 - 185.17.122[.]212 port 80 - vzdnprediction.project-x-adminko-test[.]tk - Grandsoft EK (2nd run)
 
POST-INFECTION TRAFFIC CAUSED BY THE URSNIF MALWARE:
- 185.17.122[.]212 port 80 - owkhdharshness.ebxseoccupationeclr[.]xyz - Grandsoft EK (1st run)
 - 185.17.122[.]212 port 80 - vzdnprediction.project-x-adminko-test[.]tk - Grandsoft EK (2nd run)
 - 93.185.104[.]14 port 80 - dalmo[.]cz - GET /files/AZE.bin (legitimate domain, bad URL)
 - 93.185.104[.]14 port 80 - www.dalmo[.]cz - GET /files/AZE.bin (legitimate domain, bad URL)
 - 5.63.157[.]228 port 80 - 5.63.157[.]228 - GET /a3.sign (from 1st run post-infection traffic)
 - 45.113.71[.]16 port 80 - u55.evama[.]at - GET wpapi/[long string of characters] (from 2nd run post-infection traffic)
 - 176.9.118[.]142 port 7834 - [from my infected Windows host] - POST hxxp[:]//work.a-poster.info:25000/
 - 37.1.206[.]139 port 25000 - work.a-poster[.]info - POST /
 - 81.19.77[.]166 port 465 - smtp.rambler[.]ru - Encrypted SSL/TLS traffic, not inherently malicious
 - 94.100.180[.]104 port 25 - mxs.mail[.]ru - SMTP traffic, not inherently malicious
 
FILE HASHES
GRANDSOFT EK LANDING PAGE:
- SHA256 hash:  01bc0fb55ee9a0fbf4f40960cbac630fc24635e9879c46c2ba32262570065152
File size: 530 bytes 
WEB PAGE WITH CVE-2016-0189 VBSCRIPT EXPLOIT FROM GRANDSOFT EK:
- SHA256 hash:  679d55e794db279b6d61a8aa8dec4faf8bc75a1a560d9644e1cbbb07516441f9
File size: 25,393 bytes 
FAKE DLL FROM CVE-2016-0189 VBSCRIPT EXPLOIT:
- SHA256 hash:  eaaec1a4c62b2124f4109da5e630f08c114ff75637b06db8970935da9fbfb860
File size: 4,429 bytes 
DWIE.HTA FILE SENT BY GRANDSOFT EK:
- SHA256 hash:  c19a5be261a51ef22c76eea90242128904a66801557d313df012417c202baa62
File size: 2,031 bytes 
SLYIP GRANDSOFT EK PAYLOAD (URSNIF) - 1ST RUN:
- SHA256 hash:  52dc47e8c5a0028bbf9ea24fdadb9bf343a74ab4ee4d306282292ed36ca2d803
File size: 558,592 bytes 
SLYIP GRANDSOFT EK PAYLOAD (URSNIF) - 2ND RUN:
- SHA256 hash:  c00e775af8ec1fb973bbfed3d68753b13f2d3e0254daa9454ed27a075c0203a9
File size: 522,240 bytes 
Click here to return to the main page.
