Rig EK via Decimal Redirect Drops Smoke Loader.

Summary:

This is the first time i’ve detected a decimal redirect to Rig EK. The mechanism is described by Malwarebytes. The redirect led to a file called “rig.php” which is something I have not seen before. The page then displays a “loading” GIF which makes it appear as if something should be happening. Something is indeed happening – Smoke loader was dropped and I have demonstrated before what happens if you leave it running.

Apologies for an incomplete picture. I bodged it together with Paint as my current tools are not available.

 

Background Information:

  • A few articles on Rig exploit kit and it’s evolution:

https://www.uperesia.com/analyzing-rig-exploit-kit
http://malware.dontneedcoffee.com/2016/10/rig-evolves-neutrino-waves-goodbye.html
http://securityaffairs.co/wordpress/55354/cyber-crime/rig-exploit-kit-cerber.html

  • Article on Decimal Redirects

https://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/

Downloads

(in password protected zip)

Details of infection chain:

(click to enlarge!)

Rigsmoke.png

Decimal Redirect to Rig EK which drops smoke loader.

Full Details:

There is a URL request from the compromised site to “1755118211” which the browser interprets as an IP address (104.156.250.131).  This then 302’s to an IP hosting a PHP file.

DecimalRedirect

This leads to a file amusingly named “rig.php”. This contains an iframe to Rig EK and a GIF file which makes it appear as if the website is “loading”.

iframetorigandgif

35

Rig then dropped Smoke Loader. The only thing that I have not seen before is Rig using a 5th level domain.

Multiple Magnitude EK drops Cerber Ransomware Samples

Summary:

 

I still continue to look at Magnitude now that I have managed to get it to drop a payload. I’m amazed at how different the flows appears to look each time. It is a lot more interesting to witness than Rig EK.

Currently Magnitude is still region locked and “private” however it is still very active in these regions and is certainly a big threat to anyone using an outdated version of Flash, Windows or IE.

Here I have four samples which all dropped the latest version of Cerber Ransomware. I have created a CSV which contains all the URL’s for easier copy pasting for IOC’s.

Background Information

I came across this article which contains very good information about Magnitude and is mostly still relevant.

https://community.rsa.com/community/products/netwitness/blog/2017/02/09/magnitude-exploit-kit-under-the-hood

Some hints as to how to deobfuscate Magnitude:

https://pcsxcetrasupport3.wordpress.com/2017/04/24/a-look-at-the-magnitude-exploit-kit-encoding/

Downloads (in password protected zip)

Note to trigger Magnitude you need certain conditions so I have used a proxy to achive this which may explain odd headers and IP addresses.

Details of infection chain:

(click to enlarge!)

26MagCerber.png

This image shows flows of the latest Magnitude sample. The commands are taken from another sample that is also included in the pcaps.

Mag1

Magnitude EK starting with mymoneybit.com

 

Mag2

Magnitude EK starting with paplauskaja.net

 

 

Mag3

Magnitude EK starting with webinvestfx.com

 

Full Details:

For more information on Magnitude check out my previous posts:

Magnitude EK delivers Cerber

Magnitude EK URL’s from 14-20 April

I have Three samples of Cerber. I have been informed this is the latest version of Cerber. It did not change my background or play an audio. I would copy the hashes for easy copy paste but Cerber is very evasive when it comes to AV detections. The file sizes vary quite significantly between samples.

Cerber still attempts UDP 6893 connections. It also modifies firewall settings which you can see from the main image above. There is also a 5-10 min window in which the ransom ware actually takes effect.

CerberPic

These are the ransom notes .HTA and notepad file.

 

CerberPic

The Cerber Decryptor asks for  a language. There are multiple not show here and the text cycles the languages.

Language

 

It then asks to solve a captcha for a “security” check. I was unable to solve the puzzle so could not continue to the payment part.

CerberPuzzle.png

Lastly this icon appears on the decryptor.

CerberIcon

 

Magnitude EK delivers Cerber

Summary:

Perseverance is the key sometimes. I finally got Magnitude to drop a payload so yes Cerber is back on the EK table after the PseudoDarkleech gate seemed to vanish.

This is a very interesting sample. Aside from the usual scriptlet and sctask I also saw powershell and several new URL’s using a user agent named “contype”. There is lots to review here to determine what exactly happened which I will look into in the future.

For now hope you enjoy digging through the PCAP. Note I used a proxy so the destination IP addresses are not all accurate.

Downloads (in password protected zip)

Malvertising, Gates, Magnitude EK and Cerber Ransomware

xml.adservme.com/click?adv=75697&i=OvbWHBN9LYg_0
zv1.sierra-boa.com/zcvisitor/939a51f8-2621-11e7-881a-120b8a9756d6?campaignid=7b0bac00-9f63-11e6-b67a-0e0b03568723
track.reacheffect.com/click.php?c=6508&key=vapy165k197q98zvu855qijq&campaignid=457715&cid=zv939a51f8262111e7881a120b8a9756d69b3bd7b938ba4b7790b825db592f43420201836c3ce8bc5a47&keyword=1120000&match=&visitor=NON-ADULT&traffic=POPUP&tar=foxtrot-ope-KDUgZ0ei&source=rubiginous-reindeer&long_campaignid=7b0bac00-9f63-11e6-b67a-0e0b03568723
track.reacheffect.com/jump/?jl=5938753
pub.reacheffect.com/go/8740/Ze.6508.5.rubiginous-reindeer?clickid=19859172263webinvestfx.com/?pubid=3324286&clickid=19859172263
a15ab15peq.namehes.com/1187p984x1224p1280x1194p0x1233p24x864p96x867p96x2271ptruex700p1024x1237p96x1236p96x1234p24x799p96x798p96x741p1280x28p90fale420490h.yetsix.men/
28p90fale420490h.yetsix.men/47lec9w1l269cc5jeo
28p90fale420490h.yetsix.men/9bke7o63bl4fm73sf
28p90fale420490h.yetsix.men/9bke7o63bl4fm73sf
28p90fale420490h.yetsix.men/6a1bf2f35r49rc4n
28p90fale420490h.yetsix.men/59l8x35td53g4256
28p90fale420490h.yetsix.men/59l8x35td53g4256
28p90fale420490h.yetsix.men/6aafe41330492e3c6a44d22b804f1626.sct
/b9aaf93c8cd1cec06cf9906abcdc9759
28p90fale420490h.yetsix.men/59l8x35td53g4256
217.182.227.102/0fe67cf41bf78e5e8563ab7ac8ad673d
217.182.227.102/6a301484f548a191f7c5290f267f8ef6
/6a301484f548a191f7c5290f267f8ef6

UDP 6893 Len=14 – 94.21.172.0-31, 94.23.173.0-255, 94.22.172.0-31, 94.23.174.0-255, 94.23.172.0-255, 94.23.175.0-255

api.blockcypher.com/v1/btc/main/addrs/1HTDy9SkfhwaNCXFA8wFCvN53f3iGpm8kb?_=1492731591851

api.blockcypher.com/v1/btc/main/txs/d6a8ed5e1aab504c79ac86bb79b7c129826ad03774f3181780aaafb70a998f9e?_=1492731598192

Details of infection chain:

(click to enlarge!)

MagnitudeEKCerber.png

Magnitude drops Cerber. A lot is going on here including some powershell.

Full Details:

Please refer to this post for more details on magnitude Magnitude EK URL’s from 14-20 April. I will describe in brief some notable changes. Other than these changes, I still witnessed the scriptlet and the scheduled tasks as well as multiple failed payloads.

First I noticed the Flash file called a URL. In past examples I have looked at this was not seen. The URL uses an IP instead of the host name the rest of the EK is on. This then downloads the payload.FlashToPayload

After this small payload runs it calls another URL which is an executable (Cerber)PayloadExecutes

Other than this there is notable differences:

  • Different obfuscation on the second landing page. There may even be new code here.
  • I also noticed powershell was running though did not capture what was run.
  • The user agent “contype” was used for the new URL’s.
  • The payload was called “a.exe”.

There is lots to review and I will take a deeper dive into it in the future.

If you don’t know about Cerber Ransomware then where have you been! Probably the one of the most mature ransomwares, Cerber encrypts files and requests bitcoin in order to decrypt them. This sample encrypted files with the .ba89 extension.

CerberPic

SHA256: 01d934d41965248241ab941ef3a8b75314637e0aa50ce506cc76b67f506be901
File name: a.exe
Detection ratio: 14 / 61
TrendMicro-HouseCall Ransom_HPCERBER.SMONT3

Here are the VirusTotal report on the Flash exploit 59l8x35td53g4256.swf. Magnitude’s Flash exploits always have a very low detection rate. I’m surprised to see McAfee is the only one to detect this.

SHA256: feff4b90fd5cf172c5422f63ecafcecc71877931038708ef745e205e7c763f2a
File name: 59l8x35td53g4256.swf
Detection ratio: 1 / 56
McAfee-GW-Edition BehavesLike.Flash.Exploit.zl

Magnitude EK URL’s from 14-20 April

Summary:

 

I’ve been keeping track of Magnitude EK lately and have observed it changing a fair bit however the payload still fails to download. I decided to collect a number of flows from 14-20 April and display them below. You may argue that this EK does not seem to drop a payload anymore and is only active in a specific region of the world and so the threat is low but I have seen it change so it is still actively being developed. For as long as it is being developed it could post a serious threat if a new exploits are discovered.

The URL’s may be useful for regex detections however the landing page for the latest sample has no URL pattern. I have also seen a .pw domain used which is a bit different as many of the previous use TLD’s which spell words such as “.space”.

Also of note is that Magnitude drops a file in Temp which is used to download the payload and create a scheduled task which then runs it. At the same time it also requests a scriptlet which attempts to download and execute a payload. This meant a single flow was creating  5+ payloads.

I also began to attempt to deobfuscate the landing page to attempt to figure out what all the URL’s mean. Some appear to give a 404 error. It is likely these are payload requests but there is no payload to download hence the 404.

Anyway I hope the URL’s are interesting. I have included the latest PCAP as well. Overall I was hoping to do a lot more with Magnitude but I have not got round to it. I hope this article explains this rarer EK a bit more.

Downloads (in password protected zip)

 Magnitude EK URL’s Newest to Oldest (14-20 April with referrer):

fx4you.net/
f4u7aa1c8785l4.funsego.com/632y1024t1134y0t932y96t1040y96t935y96t1127y984t1041y96t987y96t2075yt986y96t1045y32t545y1280t1036y1280t1481y0t
8f474sb7j313gfc6.hoverun.website/
8f474sb7j313gfc6.hoverun.website/7o3uf4dblbta
8f474sb7j313gfc6.hoverun.website/f2f3549cz47r
8f474sb7j313gfc6.hoverun.website/7o3uf4dblbta
8f474sb7j313gfc6.hoverun.website/WIN%209,0,277,0
/406c4bd7662ebd8a0727dda99e47c0ea
8f474sb7j313gfc6.hoverun.website/favicon.ico
8f474sb7j313gfc6.hoverun.website/dea357bd720abedb5fe7cb2b5986715e.sct
/5ccc5b059d7cac9d4ad397e01cd6d8e8
gp-1.net/
c88p68ba763o096y.pinkadu.com/647t1024p1169t0p859t96p1263t96p856t96p1176t984p1262t96p804t96p2276tp805t96p1258t32p734t1280p1267t1280p1334t0p
bc30bp534of2.worksit.date/113661420853&2307572
bc30bp534of2.worksit.date/c4c10e899724dd
bc30bp534of2.worksit.date/a51m89eub2k
bc30bp534of2.worksit.date/c4c10e899724dd
bc30bp534of2.worksit.date/WIN%209,0,277,0
bc30bp534of2.worksit.date/51ea0c632c7e5ca4a8bf9d312b1de12f.sct
/1aa3663dfeda890ed22c8e4d335ecfb9
/9726cb96a02698d8b0d1d15ea5c8155e
your-xxtube.com/?pubid=brunneous-chimpanzee
79dd1c88v68b.pinkadu.com/647b1024s1169b0s859b96s1263b96s856b96s1176b984s1262b96s804b96s2276bs805b96s1258b32s734b1280s1267b1280s1334b0s
3bbzd3cj3au526zc.thisfix.website/192633352752&1330952
3bbzd3cj3au526zc.thisfix.website/cd295xfbcif19a
3bbzd3cj3au526zc.thisfix.website/89x9724dd0t26d
/444938c6ed845c3ee99a8ceca263af11
3bbzd3cj3au526zc.thisfix.website/WIN%209,0,277,0
3bbzd3cj3au526zc.thisfix.website/c6bd1bf891812cfdbf554e657a433089.sct
/b0f7f8b9a750ad0b32dc49edeed70c6b
fx4you.net/?pubid=cardinal-jellyfish
9dod1zc8m86x8ban.pinkadu.com/647h1024b1169h0b859h96b1263h96b856h96b1176h984b1262h96b804h96b2276hb805h96b1258h32b734h1280b1267h1280b1334h0b
f7tcfm659ifa68z.thisfix.website/173424982168&5338823
f7tcfm659ifa68z.thisfix.website/e899724dd026d2
f7tcfm659ifa68z.thisfix.website/cf19av5189
/9f098f15f5627dfea2d820ca4a730255
f7tcfm659ifa68z.thisfix.website/WIN%209,0,277,0
f7tcfm659ifa68z.thisfix.website/9f4bb1c46d2df8f5ac454ada158bddb5.sct
/9c03d2d1f30ccc83e263df6f6d34ac55
fx4you.net/?pubid=cerulean-herring
1h99dbt44v18q.fulbper.com/698o1024y1196o0y870o96y1234o96y869o96y1189o984y1235o96y793o96y2265oy792o96y1239o32y739o1280y1230o1280y1291o0y
cke078d8t8j.showjob.pw/1839973331637430303&13068
cke078d8t8j.showjob.pw/fubcf1k9a51k89jebu
cke078d8t8j.showjob.pw/e899z7t24dd0j
/a3993e2a22b7c2b5659d0091e66b5c8f
cke078d8t8j.showjob.pw/WIN%209,0,277,0
cke078d8t8j.showjob.pw/1c859f349523ba2a80157179e59d5216.sct
cke078d8t8j.showjob.pw/89lebg2m345i
cke078d8t8j.showjob.pw/ec19uc4cj1
cke078d8t8j.showjob.pw/1c859f349523ba2a80157179e59d5216.sct
/c05049395cf90c5e7daa5389a53d9815
/a3993e2a22b7c2b5659d0091e66b5c8f
fx4you.net/?pubid=solferino-zebra
ah2907a8v587e6f6p.mastkod.com/711x1024u1233x0u795x96u1199x96u792x96u1240x984u1198x96u868x96u2212xu869x96u1194x32u670x1280u1203x1280u1398x0u
a41xbepb25g9855cs.hatelow.trade/
a41xbepb25g9855cs.hatelow.trade/a4563i3b5c1
a41xbepb25g9855cs.hatelow.trade/4xfl4s435l54eud95cd
/9980fd3529e752392fe07d5c76be9ee6
a41xbepb25g9855cs.hatelow.trade/WIN%209,0,277,0
a41xbepb25g9855cs.hatelow.trade/82214390f6686faeabe0dfec2a6a9636.sct
/b95c37d4505ccfc7ad488edc71d9dec3
lookatbit.com/?pubid=4217600&clickid=19612411123
68s0dez64675591zeh.sevatch.com/647p1024t1169p0t859p96t1263p96t856p96t1176p984t1262p96t804p96t2276pt805p96t1258p32t734p1280t1267p1280t1334p0t
e4xc8bi551ea50xfck.putown.review/132130273201&0340431
e4xc8bi551ea50xfck.putown.review/17nc0crd295ifbx
e4xc8bi551ea50xfck.putown.review/c10ve8997h2j
e4xc8bi551ea50xfck.putown.review/WIN%209,0,277,0
e4xc8bi551ea50xfck.putown.review/favicon.ico
e4xc8bi551ea50xfck.putown.review/466fc3080ea0f1f51d80c233ddcf8d79.sct
fx4you.net/?pubid=cerulean-herring
be3zcc7babh56h.slipyes.com/698t1024r1196t0r870t96r1234t96r869t96r1189t984r1235t96r793t96r2265tr792t96r1239t32r739t1280r1230t1280r1291t0r
c0a591ae54y6.usplans.review/1839973331637430303&732201
c0a591ae54y6.usplans.review/c19c4xc10ye89
c0a591ae54y6.usplans.review/0pcd29w5fbcu
c0a591ae54y6.usplans.review/WIN%209,0,277,0
c0a591ae54y6.usplans.review/2dd6c725484852cfd0bc85438f4206b3.sct
lookatbit.com/?pubid=3323456&clickid=19604598049
de6w46h75p59x1encs.sevatch.com/644o1024t1170o0t856o96t1260o96t859o96t1179o984t1261o96t807o96t2279ot806o96t1257o32t733o1280t1264o1280t1333o0t
f7g4061175s1ca.warcome.space/123469898425&9225521
f7g4061175s1ca.warcome.space/f19ham5189eb2l
f7g4061175s1ca.warcome.space/e2vecr19xcn4c1g0le8i9q
f7g4061175s1ca.warcome.space/WIN%209,0,277,0
f7g4061175s1ca.warcome.space/abe56b28a4aede383807d15cd479bc96.sct
/aeada41a75ae107706b649c7ce992647
lookatbit.com/?pubid=3481388&clickid=19602663841
8b1i9b680de.sevatch.com/698m1024i1196m0i870m96i1234m96i869m96i1189m984i1235m96i793m96i2265mi792m96i1239m32i739m1280i1230m1280i1291m0i
736jd7edq952d6r.opencut.review/153595736818&9225521
736jd7edq952d6r.opencut.review/95qfbcxfx19a518i9el
736jd7edq952d6r.opencut.review/24ddk0q2v6d2cr
736jd7edq952d6r.opencut.review/WIN%209,0,277,0
736jd7edq952d6r.opencut.review/775d37aaae43d6daf4b17afdbee144a9.sct
fx4you.net/?pubid=cerulean-herring
128by19mb68t0kde6.sevatch.com/644u1024r1170u0r856u96r1260u96r859u96r1179u984r1261u96r807u96r2279ur806u96r1257u32r733u1280r1264u1280r1333u0r
952md64a0a7.opencut.review/133146814116&2329151
952md64a0a7.opencut.review/f19ha518m9ebh234
952md64a0a7.opencut.review/997p24dd026m
952md64a0a7.opencut.review/WIN%209,0,277,0
952md64a0a7.opencut.review/4bfc7f67db29ec42d06e04f37fc4fafe.sct

Details of infection chain:

(click to enlarge!)

200417MagnitudeEK.png

Magnitude EK As of 20 April does not appear to have a landing page URL pattern.

 

Full Details:

  • Magnitude begins from a JavaScript gate on a compromised website. The script will only present itself in an East Asian geo location. The script uses a number of parameters including screen size to create a URL to the Magnitude Gate.ScriptToGate
  • The Magnitude gate is very similar to that on the compromised website. So far it has only led to Magnitude and an unknown EKGateToEK.PNG
  • The landing page URL does not have a URL pattern in the latest sample. The script at the top calls the Flash exploit. The rest of the page is obfuscated. Each letter calls an array and it is all then concatenated together. By printing the contents of the array then substituting  the values, almost all obfuscation of the VBscript section is removed. The landing page actually contains a lot of junk code.LandingPAge
  • This is a deobfuscated page of another Magnitude flow. I began to decode and realised I had done the wrong sample.. For illustration purposes though you can see the junk variables interlaced with legitimate variables and the Godmode exploit.
  • Deobfuscated
  • Magnitude EK has a second page of exploits which is requested at the end of the first landing page. It also uses an array however this one is different. In fact all samples I have seen have a different array.2ndLanding
  • Below is a section of the deobfuscated page showing CVE-2014-6332. LandingPage2
  • This is the Flash exploit. The resulting URL returned 404. It is likely it would have downloaded a payload.MagnitudeFlash
  • Magnitude EK creates a file in Temp with a “rad” naming theme. The script downloads the payload and creates a scheduled task which then executes it. The payloads always fail on my host (they are 0kb)
  • payloadpic
  • This is a deobfuscated scriplet (.sct) which also attempts to download and execute the payload and also fails.scriplet

Here are the VirusTotal report on the Flash exploit 7o3uf4dblbta.swf. Magnitude’s Flash exploits always have a very low detection rate. I’m surprised to see McAfee is the only one to detect this.

SHA256: 0f85edce11cd66989adc3cc9f1a78531811b00500b91fda6794486877ebefba8
File name: 7o3uf4dblbta.swf
Detection ratio: 1 / 56
McAfee-GW-Edition BehavesLike.Flash.Exploit.zl

Terror EK via Malvertising drops Smoke Loader

Summary:

My last source of Terror appeared to dry up and other security researchers such as @jeromesegura have reported changes in Terror EK. I initially looked at the referrers provided in the article and saw the same patterns. 

However today I found a fresh Terror EK from malvertising and it appears to be “complete” in the sense that it now includes 4 Flash exploits (one of which had not been uploaded to VT for 5 months) and Silverlight exploit was not hosted on another domain. The only thing Terror EK has not done is a proper obfuscation of its code but I guess these are well known exploits and there is no requirement.

Overall it is clear Terror EK is in development by whomever controls it now. This version appears to look more like a main stream EK. All it needs is some strong obfuscation to slow down researchers especially if a new exploit is discovered.

Background Information:

  • An article on Terror exploit kit showing changes in the patterns:

https://blog.malwarebytes.com/threat-analysis/2017/04/sundown-ek-gone-missing-terror-ek-flavours-seen-in-active-drive-by-campaigns/

  • Some Exploits used by this version of Terror EK:

http://malware.dontneedcoffee.com/2013/11/cve-2013-0074-silverlight-integrates.html

http://malware.dontneedcoffee.com/2014/11/cve-2014-6332.html

http://malware.dontneedcoffee.com/2013/11/cve-2013-2551-and-exploit-kits.html

Downloads (in password protected zip)

Notable Details:

  • Payload was zoskoezb.exe-> VirusTotal (4cd37ab66af60b7a709c3b17fb3692ae784b3897e442f7bff4a9374ea5719110)
  • I had left Smoke Loader running creating a mess of a PCAP so here is the Hybrid Analysis Report – Here

 Malvertising Chain

latency.ttrraacckkrr.com/pst/56da2f8ee4e7d000_1492110949267 ref.ppcmate.com/log?key=pop-up-6a32b466-a80b-4820-bd60-e17cddc1bf9caction=clickstrategy=75552pub=36148ts=1492110949269 vicals.pw/Xqhy3c

Terror EK – (185.82.202.40)

185.82.202.40/LAbpAWqyf9GPWG1gqbPqnoDq/4yx7tT9s13xL.php 185.82.202.40/LAbpAWqyf9GPWG1gqbPqnoDq/HYTfYKQf2iRC/Fg8tXmcGuYEq.html/LAbpAWqyf9GPWG1gqbPqnoDq/GSn7W4Aanses.php 185.82.202.40/LAbpAWqyf9GPWG1gqbPqnoDq/HYTfYKQf2iRC/GvySSRjYjNW5.swf 185.82.202.40/LAbpAWqyf9GPWG1gqbPqnoDq/HYTfYKQf2iRC/9AJ1ib4oMs7f.swf 185.82.202.40/LAbpAWqyf9GPWG1gqbPqnoDq/HYTfYKQf2iRC/IWVvF0eNPyto.swf 185.82.202.40/LAbpAWqyf9GPWG1gqbPqnoDq/HYTfYKQf2iRC/Ag3jtQf2n1nt.swf 185.82.202.40/LAbpAWqyf9GPWG1gqbPqnoDq/HYTfYKQf2iRC/Nr3aa05aWzAG.xap

Details of infection chain:

(click to enlarge!)

130417-TerrorEK.png

Terror EK using 4 Flash Exploits and Silverlight as well as the usual IE exploits drops Smoke Loader.

For comparison here was my last Terror EK detection:

TerrorEKZeuSVMKINS.png

Terror EK delivers K.I.N.S

  • Post infection was Smoke Loader. It downloaded a variety of malwares but I have not included this in the PCAP. The samples however I have uploaded here.

    SmokeParty

    Aftermath of Smoke Loader infection.

Full Details:

  • The chain starts with malvertising. It appears odd in that the referrer on the landing page shows it to be the “latency” website. However clearly on “vicals.pw” you can see the 302 redirect to the landing page.PWPW2
  • The landing page contains a single iframe that loads multiple Flash exploits and a Silverlight. This has changed from multiple iframes. After this comes the usual landing page exploits. Nothing appeared to be obfuscated beyond some URL encoding. At the end of the script is a call to the payload.iframepayloadcall
  • The iframe from the landing page redirects to a page that contains 4 Flash exploits and one Silverlight. One of the Flash exploits had not been uploaded to VT in 5 months. CalltoFlash.PNG
  • Payload is dropped. This time without mentioning which CVE it had exploited.payload

Here are the VirusTotal reports note  9AJ1ib4oMs7f.swf is the “newer” Flash exploit:

SHA256: 4cd37ab66af60b7a709c3b17fb3692ae784b3897e442f7bff4a9374ea5719110
File name: zoskoezb.exe.bin
Detection ratio: 23 / 62
SHA256: 88cdbf79aba30f553a949fc281baaa5d2e5f887d6c3f05b617c4712a709d47a9
File name: Nr3aa05aWzAG.xap
Detection ratio: 40 / 58
SHA256: 4888cc96a390e2970015c9c1d0206011a6fd8e452063863e5e054b3776deae02
File name: IWVvF0eNPyto.swf
Detection ratio: 31 / 56
SHA256: 890f8756e6ab3bd62a2c3fbd098471e17db56808b19018119c0ad4a26ed7060f
File name: GvySSRjYjNW5.swf
Detection ratio: 17 / 56
SHA256: 97f107853c99b0de95a3e5b84ad1435e31cb42bd05d495d585e18f81a59a362d
File name: Ag3jtQf2n1nt.swf
Detection ratio: 18 / 55
SHA256: ce3c0da64772f3beaf7c0f25a85459d7b82e199eddb56f737c823b2dc51f310d
File name: 9AJ1ib4oMs7f.swf
Detection ratio: 33 / 56

Unknown EK from Magnitude EK Gate drops Loader.

Summary:

Whilst hunting for Magnitude EK I cam across an “unknown EK” from the Magnitude Gate. It’s hard to say if it is an EK as it only appeared to use one exploit however it;s similarities to Magnitude were close. The gate returned 404 many times until one day it delivered. Magnitude currently has two gates. The first is on the compromised website which crafts a URL using random numbers, screen size and the referrer (a thanks to @Ledtech3 for deobfuscation).

At first I hit Magnitude EK which filled my screen and processes with scheduled tasks and ultimately failed to download a payload. I’m not sure if this was my hosts problem or a malfunction with Magnitude EK. After PseudoDarkleech gate has seemingly disappeared which always delivered Cerber ransomware then it is possible that Cerber is no longer delivered by Magnitude and that they may be making changes.

The unknown EK I witnessed appeared to be in a testing phase. My first run showed that it had a very easy to read landing page and lots of logging. The 2nd run it was obfuscated a little and did not log. Both times a 1kb executable was dropped which may act as a loader for more malware.

It is possible this EK is testing being performed by the Magnitude EK threat actors. By the fact that it did successfully drop a payload and execute it and that Magnitude seem to fail suggests there could be problems with the EK. I have not enough visibility of Magnitude to report on payloads that it has been dropping as of the last 5 days.

Anyway, it’s always interesting to see something different. Hope you enjoy the pcaps and pictures.

Background Information:

  • A few articles and samples on Magnitude exploit kit:

https://community.rsa.com/community/products/netwitness/blog/2017/02/09/magnitude-exploit-kit-under-the-hood

http://www.broadanalysis.com/2016/06/27/magnitude-exploit-kit-sends-cerber-ransomware-via-malvertising/

http://www.malware-traffic-analysis.net/2016/08/10/index.html

https://www.zscaler.com/blogs/research/top-exploit-kit-activity-roundup-winter-2017

Downloads

(in password protected zip)

Details of infection chain:

(click to enlarge!)

UnknownLoader

Unknown EK creates a file in Documents and runs a scheduled task which downloads a 1kb loader.

MagnitudeEK.png

Magnitude EK creates a file in temp which contains a command that creates a scheduled task and downloads a payload. In this case the payload failed to download.

Full Details:

  • Magnitude is found via malvertising chains exclusively in the Southeast Asia region. I came across another EK using Magnitude’s gate. It may be tricky to call it an EK since it only appeared to exploit CVE-2016-0189. However it appeared to be in test phase as it was logging information and was not obfuscated on first run.
  • The compromised sites contain a JavaScript gate which uses the URL, screen resolution and random numbers to create a unique request to the Magnitude Gate.
    Gate1
  • The second gate is similar however for the Unknown EK it simply did a 302 redirect. For a Magnitude redirect the gate is similar however “KASPERSKY.IEVIRTUALKEYBOARDPLUGIN.JAVASCRIPTAPI” is called which checks for Kaspersky AV or at least some components of it.Gate2
  • After this we see the usual Magnitude landing page. However instead of dropping a payload directly, Magnitude places a files in appdata/local/temp. This 2kb file with the usual “rad” named theming contains a command that creates a scheduled task that attempts to download a payload. In my tests multiple scheduled tasks were created and no actual payload was delivered. See the screenshots belowmaggieC8ztWINXcAA5Dim
  • Once again only one AV detected Magnitude’s Flash exploit:
  • SHA256: 733dd2aa5b3b6f315ea076134cd21797b2feb6c81bbf047ff0c2345f71ccac07
    File name: MagnitudeFlash
    Detection ratio: 1 / 56
    AhnLab-V3 SWF/Magnitude
  • Right now to the Unknown EK. As said above instead of JavaScript, a simple 302 redirect was observed after the initial gate.Gate3
  • This EK seemed to only use CVE-2016-0189. The exploit seemed very similar to a Metasploit version here.exploit1
  • What I observed was the EK dropped a file in Documents instead of Temp and then downloaded and execute a 1kb payload. This payload has a URL within it and may act as a loader. However it did not appear to do anything. The EK traffic also contained a lot of what appeared to be logging.

document

executing

  • SHA256: a5e0767171ee9556dea9e2985a25f1a8b338e59d6d0ebc1486f3609956786a01
    File name: loader0.exe
    Detection ratio: 30 / 61
  • I attempted the EK again on a second run a day or so after and the landing page was now obfuscated and no “logging” was observed. The actions however were slightly different. A file was dropped in temp which created a scheduled task which downloaded the loader.C8ztWECXsAAkU25
  • Now I may have got some parts of this analysis muddled up. Unfortunately I deleted the VM before I could look at the exact flow of traffic. I had hit so many Magnitude flows that my VM was infested with processes. I eventually tired and figured I could understand it all from the pcaps anyway.

Rig EK via Malvertising delivers Bunitu

Summary:

I have been tracking a Rig EK campaign that drops Bunitu. It appears to be cycling domains often. I originally found it via my usual malvertising chain (Popads). Every site always has an iframe to another domain usually on the same IP which then leads to Rig EK. I believe the gate requires a correct referrer in order to appear. I’m not sure if this gate exists anywhere else in the wild or whether it is unique to the threat actors behind Bunitu.

I noticed some DNS traffic everytime a client connected to the infected host that did not trigger an ET signatures but I’m fairly sure it is Bunitu.

Background Information:

  • A few articles on Rig exploit kit and it’s evolution:

https://www.uperesia.com/analyzing-rig-exploit-kit
http://malware.dontneedcoffee.com/2016/10/rig-evolves-neutrino-waves-goodbye.html
http://securityaffairs.co/wordpress/55354/cyber-crime/rig-exploit-kit-cerber.html

  • Article on Bunitu Trojan:

https://blog.malwarebytes.com/threat-analysis/2015/07/revisiting-the-bunitu-trojan/

Downloads

(in password protected zip)

Notable Details:

  • 206.54.163.50 – onclkds.com – 302 Malvertising
  • 174.137.133.18 – xml.mediacpc.com  – 302 Malvertising
  • 78.46.232.211– lifeerotic011.info – Compromised Site
  • 78.46.232.211 – llifesdfgdhfjgkhlj.info – Compromised Site
  • 46.173.219.21 – admin.lauraducharme.com – Rig EK
  • 200.43.39.88 – u.dreamlifedust.net – Bunitu DNS Lookup 
  • 200.43.39.88 – z.dreamlifedust.net – Bunitu DNS Lookup
  • Payload was 2p8uomsp.exe -> VirusTotal
  • Payload created noxiubc.dll -> VirusTotal

Details of infection chain:

(click to enlarge!)

100417-RigBunitu.png

Malvertising leads to Rig EK which delivers Bunitu proxy trojan. Bots can be seen connecting.

Full Details:

  • A malvertising chain leads to Rig EK which delivers Bunitu. The website contains an iframe which leads to another domain on the same IP which contains an iframe to Rig EK.
  • The payload was 2p8uomsp.exe
  • SHA256: 032d620e3229f62622a4bf0f150bf00876c7ea08bc4c004f16ac1cc2d5fac6ee
    File name: 2p8uomsp.exe
    Detection ratio: 7 / 61
  • Bunitu uses a DLL called noxiubc.dll.
    SHA256: f6ff9029fe8193563a9804313b39b2f8f16f6c640cfaa33373a2d2b84a52e05c
    File name: noxiubc.dll
    Detection ratio: 27 / 61
  • Bunitu opens random ports by changing firewall settings and allows the host to become a remote proxy.
  • Three bots can be seen using the proxy. According to forum posts such as this “clients.your-server.de” is suspected to be bot traffic:
  • qv-in-f100.1e100.net
    static.114.34.40.188.clients.your-server.de
    static.87.34.40.188.clients.your-server.de
  • Everytime a client connects, Bunitu issues a DNS request. Although these did not trigger any ET signatures I am sure they are initiated by Bunitu.

Terror EK delivers K.I.N.S.

Summary:

Often i revisit old websites that I’ve looked at before to look for any changes. This particular domain I investigated around the 8th March whereby it dropped August stealer via Rig EK. The site was also reported by @St3f4nMZ as it appeared to host different Sundown EK strings. This actually turned out to be Nebula EK. So far this domain appears to have hosted at least 3 different EK’s and dropping interesting malware.

This Terror version used 2 Flash exploits and requested the Silverlight exploit from the same host as my last Terror EK blog. Other than that, nothing else struck out as unusual.

The payload was identified with the help of @Antelox  as K.I.N.S. (Kasper Internet Non-Security). This is a ZeuS variant which uses steganography to fetch a configuration. It has the usual web injects and data exfiltration via POST request. It was very interesting to observe.

Background Information:

  • An article on Terror exploit kit:

https://www.trustwave.com/Resources/SpiderLabs-Blog/Terror-Exploit-Kit–More-like-Error-Exploit-Kit/

  • Some Exploits used by this version of Terror EK:

http://malware.dontneedcoffee.com/2013/11/cve-2013-0074-silverlight-integrates.html

http://malware.dontneedcoffee.com/2014/11/cve-2014-6332.html

http://malware.dontneedcoffee.com/2013/11/cve-2013-2551-and-exploit-kits.html

  • Great article on K.I.N.S

https://www.arbornetworks.com/blog/asert/wp-content/uploads/2015/08/ZeusVM_Bits_and_Pieces.pdf

Downloads (in password protected zip)

Notable Details:

  • 188.215.92.104 – hurtmehard.net:443 – Compromised Site using HTTPS
  • 162.243.119.23Terror EK Traffic
  • 159.203.185.4 – Silverlight exploit from another Terror EK host
  • 185.100.87.161 – badlywantyou.top – K.I.N.S. config via stegonography and exfiltration.
  • 86.106.131.137 – badboys.net.in – Extra run K.I.N.S CNC
  • Payload was rad0FEB3.tmp.exe-> VirusTotal (89572e8e0a2e96c655356939777da05ee47f5ffe7e9305b7c251446d61a558c6)

Details of infection chain:

(click to enlarge!)

TerrorEKZeuSVMKINS.png

Terror EK delivers K.I.N.S

  • I did an extra run where you can see two payloads were dropped that were actually the same file. This was Smoke Loader which downloaded K.I.N.S. I have not included a PCAP/Files for this though if you want to see it contact me on Twitter or the about page.

TerrorEKKins

Full Details:

  • The payload was sat in processes for around 10+ minutes before any CnC occurred.
SHA256: 89572e8e0a2e96c655356939777da05ee47f5ffe7e9305b7c251446d61a558c6
File name: rad0FEB3.tmp.exe
Detection ratio: 17 / 61
ESET-NOD32 Win32/Spy.Zbot.ABV
  • Along with a file called “Bookworm”, a DLL was created.
SHA256: 538ac74c3459fe052b18f4ff6fd28fde5d852d252e9135464c6a6e68e8fcd905
File name: ponticello.dll
Detection ratio: 8 / 61
ESET-NOD32 a variant of Win32/Injector.DNII
  • After a while another binary was created. After a short time the malware cleaned up by deleting itself and then injected itself into another process. This is when CnC began.
SHA256: 5d680f3948ed54612bc0cc812b2d287e85e2bb432267b295d37132e8077d85a2
File name: uceno.exe
Detection ratio: 14 / 61
ESET-NOD32 NSIS/Injector.VP
  • K.I.N.S. performs GET requests for a jpg file (badlywantyou[.]top/smk/config.jpg). The picture appears harmless but the malware is using stegonography to fetch the config.
  • Data exfiltration occurs using POST requests to the same domain.
  • Much similar to my previous blog on Terror EK there was no obfuscation of the landing page. This version used 2 Flash exploits and 1 Silverlight. It requested the same Silverlight exploit from Terror EK host from my previous blog:

Terror EK delivers BitCoin Miner

  • The initial landing page appears to be a pre-landing. It makes checks for plugins then performs a POST request to the actual landing page.

TerrorPost

  • The actual landing page calls several iframes which contain calls for the Flash and SilverLight exploits.

Iframes

Terror EK delivers BitCoin Miner

Summary:

After having found the previous Terror EK I went searching for it again a few days later. I found what I initially thought was Terror EK but did not get any ET signatures for the landing page. I then saw it did not appear to resemble my last analysis as in there were no Flash exploits. Instead there was a SilverLight exploit.

I decided to tweet it out to the wider community of a few EK hunters I know:

https://twitter.com/Zerophage1337/status/847225885610491905

It was confirmed by all to be Terror EK. Infact I had missed a Snort rule which said it was Terror EK. Often Snort rules don’t seem to pick up landing pages so I had thought not to look there. I shall from now on! Several people got involved so many thanks to them especially for identifying the payload.

For this sample I dug a bit further into the landing page code which you can see later on.

Background Information:

  • An article on Terror exploit kit and my previous detection for comparison:

https://www.trustwave.com/Resources/SpiderLabs-Blog/Terror-Exploit-Kit–More-like-Error-Exploit-Kit/

https://zerophagemalware.com/2017/03/24/terror-ek-delivers-tofsee-spambot/

  • Article about Terror EK dropping coin miner:

https://blog.malwarebytes.com/cybercrime/2017/01/the-curious-case-of-a-sundown-ek-variant-dropping-a-cryptocurrency-miner/

  • Exploits used by this version of Terror EK:

http://malware.dontneedcoffee.com/2013/11/cve-2013-0074-silverlight-integrates.html

http://malware.dontneedcoffee.com/2014/11/cve-2014-6332.html

http://malware.dontneedcoffee.com/2013/11/cve-2013-2551-and-exploit-kits.html

 

Downloads (in password protected zip)

Notable Details:

  • 173.208.245.114 – sexyvideos.club – 302 redirect
  • 159.203.185.4 – Terror EK traffic
  • 69.65.17.35 – a.pomf.cat – Miner CnC (from Hybrid Analysis)
  • Payload was rad5DA27.tmp.dll-> VirusTotal (71ea85fd9a93949b4a22ed0ac43caebf991f9c046318bf6a490fe1ecb95537fe
  • It was submitted to Hybrid Analysis.

Details of infection chain:

(click to enlarge!)

 

290317TerrorEK.png

Terror EK, absent of Flash exploits drops a BitCoin miner.

Full Details:

  • The payload claims to be a Steam DLL.
  • This payload was dropped however did not run on my environment. Possibly it did not meet the requirements.

Steam.PNG

SHA256: 71ea85fd9a93949b4a22ed0ac43caebf991f9c046318bf6a490fe1ecb95537fe
File name: rad5DA27.tmp.dll
Detection ratio: 6 / 61
  • This is the final executable after being unzipped.
SHA256: 8c9bcc0ec7c7555919c2bac77bcac146321a5cbe2ee7fd4ed4d431225b3e4cc7
File name: minerd.exe
Detection ratio: 36 / 62
ESET-NOD32 a variant of Win64/BitCoinMiner.U potentially unsafe
  •  The payload downloads a filed called “miner.zip” and uses 7zip is unzip it.

hybridprocess.PNG

minerd

 

  • This variant of Terror EK did not use any Flash exploits. It appeared to use 3 other exploits.
  • The initial landing page seemed to contain tracking and adverts which could a sort of pre-landing page. I could not locate any exploits within it. It however creates a POST request to the “real” landing page where the exploits are contained.
  • On the landing page is an iframe leading to a metasploit SilverLight exploit.

20130074.PNG

SHA256: 88cdbf79aba30f553a949fc281baaa5d2e5f887d6c3f05b617c4712a709d47a9
File name: SilverApp1.xap
Detection ratio: 39 / 58
ESET-NOD32 a variant of Win32/Exploit.CVE-2013-0074.O
SHA256: 06f1aaba68a23d85601ad069dd5ff9cff03ef4bd9500a4ee1d4edcd290b521e8
File name: SilverApp1.dll
Detection ratio: 41 / 62
ESET-NOD32 a variant of Win32/Exploit.CVE-2013-0074.O
  • This is part of CVE-2014-6332 AKA Godmode. Note the payload URL contains the CVE number.

20146332.PNG

  • And finally CVE-2013-2551 which is exploit that compromised my endpoint if you look at the URL on the main picture.

2013-2551