2016-07-01 - NEUTRINO EK AND "REALSTATISTICS" GATE CHANGE

NOTICE:

NOTES:

ASSOCIATED FILES:

  • 2016-07-01-pseudoDarkleech-Neutrino-EK-sends-CryptXXX-ransomware-after-gennaroespositomilano_it.pcap   (715,824 bytes)
  • 2016-07-01-pseudoDarkleech-Neutrino-EK-sends-CryptXXX-ransomware-second-example.pcap   (1,136,508 bytes)
  • 2016-07-01-realstatistics-gate-traffic-after-tne_mx.pcap   (6,655 bytes)
  • 2016-07-01-pseudoDarkleech-Neutrino-EK-and-CryptXXX-ransomware-files.zip   847.0 kB (847,013 bytes)
    • 2016-07-01-page-from-gennaroespositomilano_it-with-injected-pseudoDarkleech-script.txt   (15,990 bytes)
    • 2016-07-01-pseudoDarkleech-CryptXXX-ransomware-decrypt-instructions.bmp   (3,686,454 bytes)
    • 2016-07-01-pseudoDarkleech-CryptXXX-ransomware-decrypt-instructions.html   (36,201 bytes)
    • 2016-07-01-pseudoDarkleech-CryptXXX-ransomware-decrypt-instructions.txt   (1,755 bytes)
    • 2016-07-01-pseudoDarkleech-Neutrino-EK-flash-exploit-after-gennaroespositomilano_it.swf   (86,405 bytes)
    • 2016-07-01-pseudoDarkleech-Neutrino-EK-flash-exploit-second-example.swf   (85,196 bytes)
    • 2016-07-01-pseudoDarkleech-Neutrino-EK-landing-page-after-gennaroespositomilano_it.txt   (1,025 bytes)
    • 2016-07-01-pseudoDarkleech-Neutrino-EK-landing-page-second-example.txt   (1,105 bytes)
    • 2016-07-01-pseudoDarkleech-Neutrino-EK-payload-CryptXXX-ransomware-after-gennaroespositomilano_it.dll   (458,752 bytes)
    • 2016-07-01-pseudoDarkleech-Neutrino-EK-payload-CryptXXX-ransomware-second-example.dll   (368,640 bytes)

     

    TRAFFIC

    ASSOCIATED DOMAINS:

     

    FILE HASHES

    FLASH EXPLOITS:

     

    MALWARE PAYLOADS:

     

    IMAGES


    Shown above:  Injected script pointing to the "realstatistics" gate from a compromised website yesterday.

     


    Shown above:  Injected script from the same site pointing to a different "realstatistics" gate today.

     


    Shown above:  As you can see, the new "realstatistics" domain is using a different IP address and a slightly different URL.

     


    Shown above:  Unfortunately, I haven't been able to get past this new gate.  The iframe looks like it's using a placeholder.

     


    Shown above:  Neutrino EK and CryptXXX ransomware traffic kicked off by viewing gennaroespositomilano[.]it.

     


    Shown above:  Injected pseudoDarkleech script in a page from a second compromised site.

     


    Shown above:  Neutrino EK and CryptXXX ransomware traffic kicked off by viewing the second compromised site.

     

    Click here to return to the main page.