2016-06-24 - PSEUDO-DARKLEECH NEUTRINO EK SENDS CRYPTXXX RANSOMWARE

NOTICE:

ASSOCIATED FILES:

  • 2016-06-24-pseudoDarkleech-Neutrino-EK-after-fiocchidiriso_com.pcap   (1,170,037 bytes)
  • 2016-06-24-pseudoDarkleech-Neutrino-EK-after-sunlait_com.pcap   (1,390,485 bytes)
  • 2016-06-24-CryptXXX-ransomware-decrypt-instructions.bmp   (3,686,454 bytes)
  • 2016-06-24-CryptXXX-ransomware-decrypt-instructions.html   (36,201 bytes)
  • 2016-06-24-CryptXXX-ransomware-decrypt-instructions.txt   (1,755 bytes)
  • 2016-06-24-page-from-fiocchidiriso_com-with-injected-pseudoDarkleech-script.txt   (16,008 bytes)
  • 2016-06-24-page-from-sunlait_com-with-injected-pseudoDarkleech-script.txt   (79,532 bytes)
  • 2016-06-24-pseudoDarkleech-Neutrino-EK-flash-exploit-after-fiocchidiriso_com.swf   (81,798 bytes)
  • 2016-06-24-pseudoDarkleech-Neutrino-EK-flash-exploit-after-sunlait_com.swf   (81,798 bytes)
  • 2016-06-24-pseudoDarkleech-Neutrino-EK-landing-page-after-fiocchidiriso_com.txt   (1,034 bytes)
  • 2016-06-24-pseudoDarkleech-Neutrino-EK-landing-page-after-sunlait_com.txt   (1,112 bytes)
  • 2016-06-24-pseudoDarkleech-Neutrino-EK-payload-CryptXXX-ransomware-after-fiocchidiriso_com.dll   (362,496 bytes)
  • 2016-06-24-pseudoDarkleech-Neutrino-EK-payload-CryptXXX-ransomware-after-sunlait_com.dll   (5329,92 bytes)

NOTES:

BACKGROUND INFO:


Shown above:  Flowchart for today's infection traffic.

 

TRAFFIC

ASSOCIATED DOMAINS:

 

IMAGES


Shown above:  Traffic from the first pcap filtered in Wireshark.   Filter: http.request or (!(tcp.port eq 80) and tcp.flags eq 0x0002)

 


Shown above:  Traffic from the second pcap filtered in Wireshark.

 

Click here to return to the main page.