2014-01-08 - NEUTRINO EK

NOTICE:

ASSOCIATED FILES:

 

NOTES:

A quick post on traffic for another VM infected through Neturino EK...

 

INFECTION CHAIN OF EVENTS

ASSOCIATED DOMAINS:

INFECTION CHAIN:

 

PRELIMINARY MALWARE ANALYSIS

Java exploit from 212.83.188[.]39 port 8000 (quohyiin.dikarlos[.]com):

SHA256 hash: f3ccab0af7589ff0018eeb6b7d8d14f84ee8561ae148dc90e4cbf34d95eb53a3

File name:  2014-01-08-java-exploit-from-neutrino-domain.jar
File size:  20,008 bytes
Detection ratio:  7 / 47
First submitted:  2014-01-04 23:05:25 UTC

EXE payload from 212.83.188[.]39 port 8000 (quohyiin.dikarlos[.]com):

SHA256 hash: 7630bc8964eb3dfe40f9402823f319eba57b4c8f29da1a30614aebe0dc399141/a>

File name:  2014-01-08-EXE-payload-from-neutrino-domain.exe
File size:  235,820 bytes
Detection ratio:  11 / 47
First submitted:  2014-01-08 15:09:49 UTC

 

Click here to return to the main page.