2018-10-12 - HOOKADS CAMPAIGN FALLOUT EK (3 EXAMPLES)
ASSOCIATED FILES:
- Traffic: 2018-10-12-Hookads-campaign-Fallout-EK-pcaps.zip 6.8 MB (6,825,646 bytes)
- 2018-10-12-1st-run-Hookads-campaign-Fallout-EK-sends-Minotaur-ransomware.pcap (71,422 bytes)
- 2018-10-12-2nd-run-Hookads-campaign-Fallout-EK-sends-AZORult-and-follow-up-malware.pcap (5,522,466 bytes)
- 2018-10-12-3rd-run-Hookads-campaign-Fallout-EK-sends-AZORult-and-follow-up-malware.pcap (5,913,663 bytes)
- Malware: 2018-10-12-malware-and-artifacts-from-Fallout-EK-infections.zip 511 kB (511,272 bytes)
- 2018-10-12-1st-run-Fallout-EK-landing-page.txt (52,667 bytes)
- 2018-10-12-1st-run-Hookads-campaign-payload-Minotaur-ransomware.exe (11,776 bytes)
- 2018-10-12-1st-run-Minotaur-ransomware-How_To_Decrypt_Files.txt (1,290 bytes)
- 2018-10-12-2nd-run-Fallout-EK-landing-page.txt (576,24 bytes)
- 2018-10-12-2nd-run-Hookads-campaign-payload-AZORult.exe (319,488 bytes)
- 2018-10-12-2nd-run-follow-up-malware-caused-by-AZORult.exe (421,888 bytes)
- 2018-10-12-2nd-run-scheduled-task-for-follow-up-malware-Test_Task17.xml.txt (1,547 bytes)
- 2018-10-12-example-of-traffic-to-removekingonline.pro.txt (6,220 bytes)
NOTES:
- The Hookads campaign uses malvertising that leads to a fake dating website.
- The fake dating website for today's traffic is datingittlive.info, which led to Fallout EK.
- Payload during the first run was Minotaur ransomware, which only encrypted files on a USB key connected to my test host.
- Minotaur ransomware did not encrypt anything on the C:\ drive, and it caused no post-infection traffic.
- Payload during the second and third runs was AZORult, which also caused follow-up malware.
- I could not identify the follow-up malware. It might be a new version of Ramnit, but post-infection activity doesn't match what I last documented for Ramnit in Feburary 2018.
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domains:
- bitdotz[.]top
- datingittlive[.]info
- guarana[.]pw
- marryjane[.]club
- names34[.]top
- removekingonline[.]pro
- safi[.]co[.]za
TRAFFIC
Shown above: Traffic during the first run filtered in Wireshark, where Fallout EK sent Minotaur ransomware.
Shown above: Traffic during the third run filtered in Wireshark, where Fallout EK sent AZORult and follow-up malware.
Shown above: Post-infection TCP traffic from the follow-up malware to names34[.]top (1 of 2).
Shown above: Post-infection TCP traffic from the follow-up malware to names34[.]top (2 of 2).
FIRST RUN (MINOTAUR RANSOMWARE):
- 88.208.3.161 port 80 - datingittlive[.]info - GET /
- 88.208.3.161 port 80 - datingittlive[.]info - GET /wp.php
- 185.56.233.186 port 443 - removekingonline[.]pro - GET /keez/jenkereeg
- 185.243.115.5 port 80 - marryjane[.]club - Fallout EK
- No post-infection traffic for Minotaur ransomware
SECOND AND THIRD RUNS (AZORULT -> FOLLOW-UP MALWARE):
- 88.208.3.161 port 80 - datingittlive[.]info - GET /
- 88.208.3.161 port 80 - datingittlive[.]info - GET /wp.php
- 185.56.233.186 port 443 - removekingonline[.]pro - GET /keez/jenkereeg
- 193.29.58.71 port 80 - guarana[.]pw - Fallout EK
- 5.101.67.143 port 80 - bitdotz[.]top - POST /index.php (AZORult post-infection traffic)
- 5.101.67.143 port 80 - bitdotz[.]top - POST /index.php (AZORult post-infection traffic)
- 197.221.14.10 port 80 - safi[.]co[.]za - GET /winntx.exe (follow-up malware)
- 185.126.200.39 port 4000 - names34[.]top - Encoded/encrypted TCP traffic from follow-up malware
- 185.126.200.39 port 5263 - names34[.]top - Encoded/encrypted TCP traffic from follow-up malware
- NOTE: In the 3rd run, TCP traffic to 185.126.200.39 was on TCP port 4000 and 5279. The destination port for the second TCP stream to 185.126.200.39 was different for each infection.
MALWARE
MALWARE RETRIEVED FROM AN INFECTED WINDOWS HOST:
- SHA256 hash: 26b1811024cc6164e0762dfc9be4412306ddea782f15b1763c1abd4b5fff3e07
File size: 11,776 bytes
File location: C:\Users\[username]\AppData\Local\Temp\[4 random hex characters].tmp
File description: Hookads payload sent by Fallout EK - Minotaur ransomware (Windows EXE file)
- SHA256 hash: a70231d9459c938d409e5334a0a5a41667a85175b9c07b60294eec826ba58f18
File size: 319,488 bytes
File location: C:\Users\[username]\AppData\Local\Temp\[4 random hex characters].tmp
File description: Hookads payload sent by Fallout EK - AZORult (Windows EXE file)
- SHA256 hash: f0b2b5e48230a5ad021890477dba75fd4c781121025bb3bf1a95cb5e948777f0
File size: 421,888 bytes
File location: hxxp://safi[.]co[.]za/winntx.exe
File location: C:\Users\[username]\AppData\Local\Temp\winntx.exe
File location: C:\ProgramData\[random characters]\[random characters].exe
File description: Follow-up malware (Windows EXE file) caused by AZORult.
IMAGES
Shown above: Encrypted files on a USB stick from the Minotaur ransomware infection. And that email address for the ransom... minotaur@420blaze.it Cute.
Shown above: Follow-up malware made persistent on the infected Windows host from the 3rd run (same malware seen during the 2nd run).
FINAL NOTES
Once again, here are the associated files:
- Traffic: 2018-10-12-Hookads-campaign-Fallout-EK-pcaps.zip 6.8 MB (6,825,646 bytes)
- Malware: 2018-10-12-malware-and-artifacts-from-Fallout-EK-infections.zip 511 kB (511,272 bytes)
Zip archives are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.