2016-10-17 - PSEUDO-DARKLEECH RIG EK FROM 5.200.35[.]126 SENDS CERBER RANSOMWARE
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 16-10-17-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware-3-pcaps.zip 1.5 MB (1,521,307 bytes)
- 2016-10-17-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware-first-run.pcap (681,413 bytes)
- 2016-10-17-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware-second-run.pcap (575,307 bytes)
- 2016-10-17-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware-third-run.pcap (633,131 bytes)
- 22016-10-17-pseudoDarkleech-Rig-EK-and-Cerber-ransomware-files.zip 816.5 kB (816,452 bytes)
- 2016-10-17-Cerber-ransomware-decryption-instructions-README.hta (63,059 bytes)
- 2016-10-17-Cerber-ransomware-decryption-instructions.bmp (1,920,054 bytes)
- 2016-10-17-page-from-annaburn_be-with-injected-script.txt (84,363 bytes)
- 2016-10-17-page-fromfurniturecorporation_com-with-injected-script.txt (86,084 bytes)
- 2016-10-17-page-jdsbrainwave_com-with-injected-script.txt (20,403 bytes)
- 2016-10-17-pseudoDarkleech-Rig-EK-flash-exploit-all-three-runs.swf (51,756 bytes)
- 2016-10-17-pseudoDarkleech-Rig-EK-landing-page-first-run.txt (30,247 bytes)
- 2016-10-17-pseudoDarkleech-Rig-EK-landing-page-second-run.txt (30,188 bytes)
- 2016-10-17-pseudoDarkleech-Rig-EK-landing-page-third-run.txt (30,296 bytes)
- 2016-10-17-pseudoDarkleech-Rig-EK-payload-Cerber-ransomware-all-three-runs.exe (467,707 bytes)
NOTES:
- As always, thanks to everyone who tweets about the compromised websites they find.
- I found today's compromised website in tweets from @BiebsMalwareGuy and @FreeBSDfan.
BACKGROUND ON THE PSEUDO-DARKLEECH CAMPAIGN:
- Something I wrote on exploit kit (EK) fundamentals: link
- 2016-03-22 - PaloAlto Networks Unit 42 blog: Campaign Evolution: Darkleech to Pseudo-Darkleech and Beyond
- 2016-07-02 - SANS ISC diary: Change in patterns for the pseudoDarkleech campaign
- 2016-09-14 - Malware-traffic-analysis.net: The pseudoDarkleech campaign starts using Rig EK instead of Neutrino EK
- 2016-10-03 - Malware-traffic-analysis.net: The pseudoDarkleech campaign stops sending CryptXXX, starts sending Cerber ransomware
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: Injected script from the pseudoDarkleech campaign in a page from the first compromised site.
Shown above: Traffic from the first pcap filtered in Wireshark.
Shown above: Injected script from the pseudoDarkleech campaign in a page from the second compromised site.
Shown above: Traffic from the second pcap filtered in Wireshark.
Shown above: Injected script from the pseudoDarkleech campaign in a page from the third compromised site.
Shown above: Traffic from the third pcap filtered in Wireshark.
ASSOCIATED DOMAINS:
- www.annaburn[.]be - Compromised site (first run)
- furniturecorporation[.]com - Compromised site (second run)
- jdsbrainwave[.]com - Compromised site (third run)
- 5.200.35[.]126 port 80 - vd.katiejustin[.]com - Rig EK (first run)
- 5.200.35[.]126 port 80 - srt.kassidymichael[.]com - Rig EK (second run)
- 5.200.35[.]126 port 80 - my.kassira[y].com - Rig EK (third run)
- 31.184.234[.]0 - 31.184.235[.]255 port 6892 (UDP) - UDP traffic caused by Cerber (all 3 runs)
- 107.161.95[.]138 port 80 - ffoqr3ug7m726zou.zn90h4[.]bid - HTTP traffic caused by Cerber ransomware (first and second runs)
- 173.254.231[.]111 port 80 - ffoqr3ug7m726zou.zn90h4[.]bid - HTTP traffic caused by Cerber ransomware (third run)
OTHER DOMAINS FROM THE DECRYPT INSTRUCTIONS:
- ffoqr3ug7m726zou.e6cf2t[.]bid
- ffoqr3ug7m726zou[.]onion[.]to
FILE HASHES
FLASH EXPLOIT:
- SHA256 hash: 792884fa58616d70ad35037e1bea240df5db95ad0f4d0476ec34987ff01462be
File name: 2016-10-17-pseudoDarkleech-Rig-EK-flash-exploit-all-three-runs.swf (51,756 bytes)
PAYLOAD:
- SHA256 hash: e14f32bdfbb2dc1117736029677effdedec2f570d73092261ba98f040a1b282f
File name: 2016-10-17-pseudoDarkleech-Rig-EK-payload-Cerber-all-three-runs.exe (467,707 bytes)
IMAGES
Shown above: Desktop of an infected Windows host after rebooting.
Click here to return to the main page.