2014-09-04 - SWEET ORANGE EK FROM 38.84.134[.]208 - CDN.LIVISTRO[.]COM:17982  &  CDN5.MARCHEPOULET[.]COM:17982

NOTICE:

ASSOCIATED FILES:

 

NOTES:

 

ASSOCIATED DOMAINS:

 

COMPROMISED WEBSITE AND REDIRECT CHAIN:

 

SWEET ORANGE EK:

NOTE: All requests for the .jar files returned: 502 Bad Gateway

 

PRELIMINARY MALWARE ANALYSIS

FLASH EXPLOIT - CVE-2014-0515:

File name:  2014-09-04-Sweet-Orange-EK-flash-exploit.swf
File size:  5,156 bytes
MD5 hash:  543632124be9b7488f53167db1cb197c
Detection ratio:  2 / 55
First submission:  2014-09-04 13:54:55 UTC
VirusTotal link:  https://www.virustotal.com/en/file/5fdaa4db0c66fe58c44dc66606c0db4271990bc3c5d6375d3b4476000cb22d6b/analysis/

 

MALWARE PAYLOAD:

File name:  2014-09-04-Sweet-Orange-EK-malware-payload.exe
File size:  262,144 bytes
MD5 hash:  ccc315550bc34b35c1b87fc4934952ba
Detection ratio:  31 / 52
First submission:  2014-09-02 09:23:42 UTC
VirusTotal link:  https://www.virustotal.com/en/file/a3214d74f0a7cd021627e05abeb6bca15ad4e4a46b0dc60d35ad17414a3a76f7/analysis/

 

ALERTS

Emerging Threats and ETPRO rulesets from Sguil on Security Onion (not including INFO, POLICY or WEB_CLIENT rules):

Sourcefire VRT ruleset from Snort 2.9.6.2 on Debian 7:

 

HIGHLIGHTS FROM THE TRAFFIC

From the compromised website: malicious javascript containing the jquery_datepicker function and obfurscated URL for the redirect:

From the malicious javascript, take this string:  \u0068ttp:\u002f\u002f\u0063dn.stringbas\u0073\u006d\u0075\u0073ic.\u0063o\u006d\u002fk?t\u003d

Remove the "\u00" to better see the hexadecimal:  68ttp:2f2f63dn.stringbas736d7573ic.63o6d2fk?t3d

Translate the hexadecimal to ASCII, and the string is:  cdn.stringbassmusic[.]com/k?t=

 

Redirect pointing to Sweet Orange EK:

 

Click here to return to the main page.