2015-01-28 - AD TRAFFIC FROM LAX1.IB.ADNXS[.]COM KICKS OFF CHAIN OF EVENTS TO ANGLER EK

NOTICE:

ASSOCIATED FILES:

 

SUMMARY

Since yesterday, I've seen two examples ad traffic from lax1.ib.adnxs[.]com that generated a chain of events for the Angler exploit kit (EK).  I saw an HTTP POST to 216.246.41[.]184 return HTML pointing to the Angler EK landing page.

NOTE:  I haven't been able to recreate the chain of events, and I don't have a pcap to share.

 

TRAFFIC DETAILS

ASSOCIATED DOMAINS:

TRAFFIC:

 

SCREENSHOTS

Malicious script from online-marketing-maven[.]com.  Note the variable marked near the bottom of the image:


The full script above is available in this blog entry's zip file.

 

HTTP POST to domain on 216.246.41[.]184 returns HTML directing the host to an Angler EK landing page:

 

Angler EK landing page:

 

Angler EK sends Flash exploit:


No further traffic...  The host was running the most current version of Flash, and the exploit was not successful.

 

Click here to return to the main page.