2019-03-20 - ANOTHER EXAMPLE OF SPELEVO EK

NOTICE:

ASSOCIATED FILES:

  • 2019-03-20-Spelevo-EK-sends-malware.pcap   (11,516,936 bytes)
  • 2019-03-20-Spelevo-EK-HTML-with-iframe-for-flash-exploit.txt   (1,802 bytes)
  • 2019-03-20-Spelevo-EK-decoded-payload-from-infected-host.exe   (2,181,896 bytes)
  • 2019-03-20-Spelevo-EK-encoded-payload-sent-from-server.bin   (2,186,254 bytes)
  • 2019-03-20-Spelevo-EK-flash-exploit.swf   (17,330 bytes)
  • 2019-03-20-Spelevo-EK-landing-page.txt   (28,207 bytes)
  • 2019-03-20-registry-update-to-keep-malware-payload-persistent.txt   (618 bytes)

NOTES:

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 


Shown above:  Alerts from Security Onion using Suricata and the EmergingThreats Pro (ETPRO) ruleset.

 

SPELEVO EK TRAFFIC:

POST-INFECITON TRAFFIC:

 

MALWARE

SPELEVO EK FLASH EXPLOIT:

SPELEVO EK PAYLOAD:

 

IMAGES


Shown above:  Decoded EXE payload extracted from the infected Windows host, caused by Spelevo EK.

 


Shown above:  Digital signature from the payload EXE.

 


Shown above:  Some other artifacts seen on the infected Windows host.

 

Click here to return to the main page.