2016-03-07 - ANGLER EK DATA DUMP

NOTICE:

ASSOCIATED FILES:

  • 2016-03-07-EITest-Angler-EK-after-dixonroofing_co_nz.pcap - 511.0 kB (511,038 bytes)
  • 2016-03-07-pseudo-Darkleech-Angler-EK-after-automufflersbrakes_com.pcap - 596.7 kB (596,693 bytes)
  • 2016-03-07-pseudo-Darkleech-Angler-EK-after-dstewartsales_com.pcap - 898.7 kB (898,683 bytes)
  • 2016-03-07-pseudo-Darkleech-Angler-EK-after-vediaud_net.pcap - 895.6 kB (895,551 bytes)

 

NOTES:

 

DOMAINS

GATES (REDIRECTS):

ANGLER EK:

TELSACRYPT RANSOMWARE POST-INFECTION TRAFFIC:

 

EXPLOITS/MALWARE

FLASH EXPLOITS SENT BY ANGLER EK (READ: MD5, FILE NAME):

MALWARE SENT BY ANGLER EK (READ: MD5, FILE NAME):

 

IMAGES


Shown above:  Traffic from the pcaps filtered in Wireshark.

 


Shown above:  Example of injected pseudo-Darkleech script in page from a compromised web site.

 


Shown above:  Injected script in page from a compromised site pointing to an "EITest" gate.

 

Click here to return to the main page.