2016-07-19 - EITST NEUTRINO EK FROM 74.208.185[.]198 SENDS CRYPTXXX RANSOMWARE
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2016-07-19-EITest-Neutrino-EK-sends-CryptXXX-ransomware.pcap.zip 1.0 MB (1,038,634 bytes)
- 2016-07-19-EITest-Neutrino-EK-sends-CryptXXX-ransomware.pcap (1,154,711 bytes)
- 2016-07-19-EITest-Neutrino-EK-nad-CryptXXX-ransomware-files.zip 493.0 kB (493,004 bytes)
- 2016-07-19-CryptXXX-ransomware-decrypt-instructions.BMP (3,686,454 bytes)
- 2016-07-19-CryptXXX-ransomware-decrypt-instructions.HTML (20,472 bytes)
- 2016-07-19-EITest-flash-redirect-from-anfilc_xyz.swf (4,446 bytes)
- 2016-07-19-EITest-Neutrino-EK-flash-exploit.swf (88,151 bytes)
- 2016-07-19-EITest-Neutrino-EK-landing-page.txt (3,859 bytes)
- 2016-07-19-EITest-Neutrino-EK-payload-CryptXXX-ransomware.dll (365,056 bytes)
- 2016-07-19-page-from-gymvibe_net-with-injected-EITest-script.txt (26,968 bytes)
NOTES:
- 2016-03-31 - Palo Alto Networks Unit 42 blog: How the EITest Campaign's Path to Angler EK Evolved Over Time.
- 2016-06-08 - SANS ISC diary: Neutrino EK and CryptXXX (campaigns using Angler EK switch to Neutrino EK)
- 2016-06-11 - Malware Don't Need Coffee: Is it the end of Angler?
- 2016-07-14 - Proofpoint Blog: Spam, Now With a Side of CryptXXX Ransomware!
From Proofpoint: "We believe that CryptXXX is in active development and possibly split off into two branches. The original branch is now up to version 5.001 (we wrote about the upgrade to version 3.100 near the end of May), while the new branch uses a different format for versioning and will require further analysis."
- I believe the CryptXXX ransomware in my blog post here is from the original branch.
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: Injected script in page from compromised website.
Shown above: Traffic from the pcap filtered in Wireshark. Filter: http.request or (!(tcp.port eq 80) and tcp.flags eq 0x0002)
ASSOCIATED DOMAINS:
- gymvibe[.]net - Compromised website
- 85.93.0[.]12 port 80 - anfilc[.]xyz - EITest gate
- 74.208.185[.]198 port 80 - mietteit[.]cambs-sep.co.uk - Neutrino EK
- 188.0.236[.]9 port 443 - CryptXXX ransomware post-infection traffic (custom encoded, not SSL)
DOMAINS FROM THE DECRYPT INSTRUCTIONS:
- 5bjte3wc7vn7wkrv[.]onion[.]to
- 5bjte3wc7vn7wkrv[.]onion[.]cab
- 5bjte3wc7vn7wkrv[.]onion[.]city
FILE HASHES
FLASH FILES:
- SHA256 hash: cf16de04310cceb203c8323b0bfd7ebdf53bb1fdad464f237db8c95dab8de59f
File name: 2016-07-19-EITest-flash-redirect-from-anfilc_xyz.swf
- SHA256 hash: 594201039b3465e1d0aaf5c33e364adb4cc130224d64356f9c57d66fcff40f76
File name: 2016-07-19-EITest-Neutrino-EK-flash-exploit.swf
PAYLOAD:
- SHA256 hash: 976090b6e091be012bb89ab9148399b3cf83af10e5a407304c74426ea4bea758
File name: 2016-07-19-EITest-Neutrino-EK-payload-CryptXXX-ransomware.dll
IMAGES
Shown above: The CryptXXX .dll file loaded during the infection.
Shown above: The infected Windows host after rebooting.
Click here to return to the main page.