2016-09-27 - AFRAIDGATE CAMPAIGN SWITCHES TO RIG EK, SENDS ODIN VARIANT LOCKY
ASSOCIATED FILES:
- ZIP archive of the pcaps: 2016-09-27-Afraidgate-Rig-EK-sends-Locky-ransomware.pcap.zip 266.3 kB (266,341 bytes)
- 2016-09-27-Afraidgate-Rig-EK-sends-Locky-ransomware.pcap (291,585 bytes)
- ZIP archive of the malware: 2016-09-27-Afraidgate-Rig-EK-sends-Locky-malware-and-artifacts.zip 260.9 kB (260,937 bytes)
- 2016-09-27-Afraidgate-Rig-EK-flash-exploit.swf (25,602 bytes)
- 2016-09-27-Afraidgate-Rig-EK-landing-page.txt (29,996 bytes)
- 2016-09-27-Afraidgate-Rig-EK-payload-Locky-downloader.exe (47,104 bytes)
- 2016-09-27-Locky-decryption-instructions_HOWDO_text.bmp (2,791,870 bytes)
- 2016-09-27-Locky-decryption-instructions_HOWDO_text.html (9,058 bytes)
- 2016-09-27-Locky-decryptor-page-style.css (3,602 bytes)
- 2016-09-27-Locky-decryptor-page.html (5,865 bytes)
- 2016-09-27-follow-up-download-Locky.exe (181,760 bytes)
- 2016-09-27-human.neurogaming.net-js-roksprocket.js.txt (385 bytes)
- 2016-09-27-page-from-languagerealm.com-with-injected-script.txt (13,904 bytes)
NOTES:
- My most recent report on the Afraidgate campaign can be found here.
- Today the Afraidgate campaign was using Rig EK (not Neutrino EK like before), and the Locky variant is now Odin (not Zepto).
- No traffic for PonyFox (or Fox Stealer) like we saw during yesterday's Locky infection from the Afraidgate campaign (link).
- Big thanks to Ron for emailing me about the compromised website.
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: Injected script in page from compromised site pointing to the Afraidgate URL.
Shown above: Afraidgate URL returns iframe pointing to Rig EK landing page.
Shown above: Traffic from the pcap filtered in Wireshark.
ASSOCIATED DOMAINS:
- www.languagerealm.com - Compromised website
- 139.59.171.176 port 80 - human.neurogaming.net - GET /js/roksprocket.js - Afraidgate gate/redirect
- 195.133.201.49 port 80 - add.thedocumentarywebsite.com - Rig EK
- 104.28.4.150 port 80 - crocotan.com - GET /search.php?g=&k=7idPBmDM6oTiWMPd7nzRCgRaV - Locky downloader
- 5.196.200.247 port 80 - 5.196.200.247 - POST /apache_handler.php - post-infection Locky callback
DOMAINS FROM THE DECRYPT INSTRUCTIONS:
- jhomitevd2abj3fk.tor2web.org
- jhomitevd2abj3fk.onion.to
FILE HASHES
RIG EK FLASH EXPLOIT:
- SHA256 hash: 25ea816e89234c1974e791b04eb83280c92296500fa9fbbdae24056d0b7a8bfe
File name: 2016-09-27-Afraidgate-Rig-EK-flash-exploit.swf
RIG EK PAYLOAD (DOWNLOADER FOR LOCKY):
- SHA256 hash: c8e567bcb80b60d315de1845f9faf89094d7ca33801b1662c8e8d8be11de6100
File name: 2016-09-27-Afraidgate-Rig-EK-payload-Locky-downloader.exe
FOLLOW-UP MALWARE (LOCKY):
- SHA256 hash: d4fd2fe61b13c70740ebc900e8d88123683790a43dd500e0f660f92e9fa257dc
File name: 2016-09-27-follow-up-download-Locky.exe
IMAGES
Shown above: Desktop of the infected Windows host.
Shown above: Checking the Locky Decryptor instructions using a Tor browser.
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcaps: 2016-09-27-Afraidgate-Rig-EK-sends-Locky-ransomware.pcap.zip 266.3 kB (266,341 bytes)
- ZIP archive of the malware: 2016-09-27-Afraidgate-Rig-EK-sends-Locky-malware-and-artifacts.zip 260.9 kB (260,937 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.