2014-09-27 - 32X32 GATE TO ANGLER EK ON 66.172.12[.]231 - ASD.BRANCHIOPODAMERICANGENTIAN[.]US

NOTICE:

ASSOCIATED FILES:

 

NOTES:

 

CHAIN OF EVENTS

ASSOCIATED DOMAINS:

 

COMPROMISED WEBSITE AND REDIRECT:

 

ANGLER EK:

 

POST-INFECTION TRAFFIC:

 

PRELIMINARY MALWARE ANALYSIS

FLASH EXPLOIT:

File name:  2014-09-27-Angler-EK-flash-exploit.swf
File size:  77,062 bytes
MD5 hash:  3bb7e6d79427d1292bbea878dfcd374d
Detection ratio:  1 / 55
First submission:  2014-09-25 07:53:07 UTC
VirusTotal link:  https://www.virustotal.com/en/file/7dd2e7c9ea04c0dfd7630ce063fb1efea55f97b7e5779f22ad165e777b4b3a99/analysis/

 

MALWARE PAYLOAD:

File name:  2014-09-27-Angler-EK-malware-payload.dll
File size:  233,472 bytes
MD5 hash:  372c5589f7b7f2812e06ff06c3fb6b47
Detection ratio:  11 / 54
First submission:  2014-09-27 19:35:51 UTC
VirusTotal link:  https://www.virustotal.com/en/file/cb4812f3928c368c82e4c2de3cf29452d38c06265a617242e0a142fe43502674/analysis/

 

DROPPED MALWARE:

File name:  OaqeqOyogy.dat
File size:  268,144 bytes
MD5 hash:  5c12d31724ff374c75db47fddf5f65ec
Detection ratio:  5 / 55
First submission:  2014-09-27 19:49:11 UTC
VirusTotal link:  https://www.virustotal.com/en/file/c2279d1829fb024a1a2a56bc08b8dbd1adeb358f43c38f7eb14718fdf6635d70/analysis/

 

SNORT EVENTS

Emerging Threats and ETPRO rulesets from Sguil on Security Onion (without ET POLICY, ET INFO events, and DNS-related events):

Sourcefire VRT ruleset from Snort 2.9.6.2 on Ubuntu 14.04 LTS (not including preprocessor events):

 

SCREENSHOTS FROM THE TRAFFIC

Malicious in page from compromised website:

 

Redirect pointing to Angler EK:

 

Angler EK delivers the obfuscated malware payload:

 

Deobfuscate the payload, and you'll find shellcode followed by the malicious binary in the same file:

 

Carve out the binary, and it appears the de-obfuscation worked:

 

An example of callback traffic from the infected VM:

 

Click here to return to the main page.