2017-01-19 - EITEST SUNDOWN EK FROM 93.190.143.82 SENDS CERBER RANSOMWARE

ASSOCIATED FILES:

  • 2017-01-19-EITest-Sundown-EK-1st-run-sends-Cerber-ransomware.pcap   (661,866 bytes)
  • 2017-01-19-EITest-Sundown-EK-2nd-run-sends-Cerber-ransomware.pcap   (851,017 bytes)
  • 2017-01-19-page-from-activaclinics.com-with-injected-EITest-script-1st-run.txt   (59,194 bytes)
  • 2017-01-19-page-from-activaclinics.com-with-injected-EITest-script-2nd-run.txt   (59,177 bytes)
  • 2017-01-19-EITest-Sundown-EK-1st-run-landing-page.txt   (79,238 bytes)
  • 2017-01-19-EITest-Sundown-EK-2nd-run-landing-page.txt   (90,963 bytes)
  • 2017-01-19-EITest-Sundown-EK-1st-run-payload-Cerber-rad74AD1.tmp.exe   (293,240 bytes)
  • 2017-01-19-EITest-Sundown-EK-2nd-run-payload-Cerber-rad5C6B2.tmp.exe   (245,169 bytes)
  • 2017-01-19-EITest-Sundown-EK-1st-run-exploit-bvfhjgejhfrg.png   (52,131 bytes)
  • 2017-01-19-EITest-Sundown-EK-2nd-run-artifact-mfgrehy.tmp.txt   (1,279 bytes)
  • 2017-01-19-EITest-Sundown-EK-2nd-run-artifact-zs3n.tmp.txt   (1,151 bytes)
  • 2017-01-19-EITest-Sundown-EK-both-runs-artifact-OTTYUADAF.txt   (1,137 bytes)
  • 2017-01-19-EITest-Sundown-EK-both-runs-Flash-exploit-1-of-3.swf   (14,088 bytes)
  • 2017-01-19-EITest-Sundown-EK-both-runs-Flash-exploit-2-of-3.swf   (22,872 bytes)
  • 2017-01-19-EITest-Sundown-EK-both-runs-Flash-exploit-3-of-3.swf   (45,026 bytes)
  • 2017-01-19-Cerber_HELP_HELP_HELP_XT5XQY.hta   (75,787 bytes)
  • 2017-01-19-Cerber_HELP_HELP_HELP_XT5XQY.jpg   (238,406 bytes)

BACKGROUND ON SUNDOWN EXPLOIT KIT:

BACKGROUND ON THE EITEST CAMPAIGN:


Shown above:  Flowchart for this infection traffic.

 

TRAFFIC


Shown above:  Injected script from the EITest campaign from the compromised site (1st run).

 


Shown above:  Pcap of the infection traffic filtered in Wireshark (1st run).

 


Shown above:  Injected script from the EITest campaign from the compromised site (2nd run).

 


Shown above:  Pcap of the infection traffic filtered in Wireshark (2nd run).

 

ASSOCIATED DOMAINS:

 

SUNDOWN EK URLS - 1ST RUN:

SUNDOWN EK URLS - 2ND RUN:

 

FILE HASHES

FLASH EXPLOITS:

OTHER EXPLOIT:

PAYLOADS:

 

IMAGES


Shown above:  Desktop of the infected Windows host.

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.