2016-05-26 - ANGLER EK SENDS UPDATED VERSION OF CRYPTXXX RANSOMWARE

ASSOCIATED FILES:

  • 2016-05-26-Afraidgate-Angler-EK-sends-CryptXXX.pcap   (1,101,070 bytes)
  • 2016-05-26-pseudoDarkleech-Angler-EK-sends-CryptXXX.pcap   (1,115,419 bytes)
  • 2016-05-26-Afraidgate-Angler-EK-CryptXXX-decrypt-instructions.bmp   (3,686,454 bytes)
  • 2016-05-26-Afraidgate-Angler-EK-CryptXXX-decrypt-instructions.html   (5,715 bytes)
  • 2016-05-26-Afraidgate-Angler-EK-CryptXXX-decrypt-instructions.txt   (987 bytes)
  • 2016-05-26-Afraidgate-Angler-EK-landing-page.txt   (102,905 bytes)
  • 2016-05-26-Afraidgate-Angler-EK-payload-CryptXXX.dll   (176,128 bytes)
  • 2016-05-26-Angler-EK-flash-exploit-vs-flash-21.0.0.213.swf   (67,386 bytes)
  • 2016-05-26-page-from-brookslake.com-with-injected-pseudoDarkleech-script.txt   (52,364 bytes)
  • 2016-05-26-pseudoDarkleech-Angler-EK-CryptXXX-decrypt-instructions.bmp   (3,686,454 bytes)
  • 2016-05-26-pseudoDarkleech-Angler-EK-CryptXXX-decrypt-instructions.html   (5,715 bytes)
  • 2016-05-26-pseudoDarkleech-Angler-EK-CryptXXX-decrypt-instructions.txt   (990 bytes)
  • 2016-05-26-pseudoDarkleech-Angler-EK-landing-page.txt   (102,831 bytes)
  • 2016-05-26-pseudoDarkleech-Angler-EK-payload-CryptXXX.dll   (176,128 bytes)

NOTES:


Shown above:  Example of a user's AppData\Local\Temp folder when Angler EK sends CryptXXX.

 

TRAFFIC


Shown above:  Traffic from the Afraidgate Angler EK filtered in Wireshark using the filter: http.request or (tcp.port eq 443 and tcp.flags eq 0x0002).


Shown above:  Traffic from the pseudoDarkleech Angler EK filtered in Wireshark using the filter: http.request or (tcp.port eq 443 and tcp.flags eq 0x0002).

ASSOCIATED DOMAINS:

 

IMAGES


Shown above:  Lock screen when the CryptXXX infect kicks in.

 


Shown above:  HTML file to get to the decrypt instructions.

 


Shown above:  Windows desktop when it was rebooted.

 


Shown above:  Going to the site to pay the ransom, you'll have to enter your code.

 


Shown above:  Decrypt instructions (part 1 of 3).

 


Shown above:  Decrypt instructions (part 2 of 3).

 


Shown above:  Decrypt instructions (part 3 of 3).

 


Shown above:  Talos subscriber set singatures still cover callback traffic from the new CryptXXX.

 


Shown above:  ET PRO signatures also still cover callback traffic.

NOTE: I remove the indentification code from the post-infection traffic in my pcaps.  Because of that, I haven't been able to get any of the pcaps to trigger the above ETPRO alerts when using tcpreplay on Security Onion (with Suricata and the ETPRO ruleset).  The above image shows CryptXXX alerts from post-infection traffic before I sanitized the pcap.

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.