2014-05-28 - ANGLER EK AND ANOTHER CRYPTOWALL RANSOMWARE SAMPLE

NOTICE:

ASSOCIATED FILES:

NOTES:

 

CHAIN OF EVENTS

ASSOCIATED DOMAINS:

ANGLER EK USES SILVERLIGHT EXPLOIT:

ANGLER EK USES FLASH EXPLOIT (NO INFECTION):

ANGLER EK USES JAVA EXPLOIT:

TRAFFIC FROM MALWR SANDBOX ANALYSIS OF MALWARE PAYLOAD:

CRYPTOWALL TRAFFIC AFTER RUNNING FILE "3.EXE" FROM THE SANDBOX ANALYSIS ON A VM:

 

PRELIMINARY MALWARE ANALYSIS

ALERTS

ALERTS FOR THE INFECTION TRAFFIC (from Sguil on Security Onion)

 

ALERTS FOR THE SANDBOX TRAFFIC (using tcpreplay on Security Onion)

 

HIGHLIGHTS FROM THE TRAFFIC

Example of malicious script in page from compromised website:

 

Example of redirect pointing to Angler EK:

 

CryptoWall in action on the infected VM:


1AkJptnuoiQAD3GmHMFHBSMxZ9H2GKJTkB is the same bitcoin address from another CryptoWall infection in my 2014-05-25 blog entry.

 

Click here to return to the main page.