2016-10-24 - PSEUDO-DARKLEECH RIG EK FROM 95.183.12[.]11 SENDS CERBER RANSOMWARE
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2016-10-24-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware.pcap.zip 274.5 kB (274,485 bytes)
- 2016-10-24-pseudoDarkleech-Rig-EK-sends-Cerber-ransomware.pcap (477,703 bytes)
- 2016-10-24-pseudoDarkleech-Rig-EK-and-Cerber-ransomware-files.zip 541.1 kB (541,075 bytes)
- 2016-10-24-Cerber-ransomware-decryption-instructions-README.hta (63,083 bytes)
- 2016-10-24-Cerber-ransomware-decryption-instructions.bmp (1,920,054 bytes)
- 2016-10-24-page-from-avalon-logistic_com-with-injected-script.txt (46,084 bytes)
- 2016-10-24-pseudoDarkleech-Rig-EK-flash-exploit.swf (51,786 bytes)
- 2016-10-24-pseudoDarkleech-Rig-EK-landing-page.txt (5,075 bytes)
- 2016-10-24-pseudoDarkleech-Rig-EK-payload-Cerber-ransomware.exe (265,339 bytes)
NOTES:
- Thanks to @BroadAnalysis for emailing me about the compromised site.
- Looks like Rig EK changed its URL patterns since yesterday.
BACKGROUND ON THE PSEUDO-DARKLEECH CAMPAIGN:
- Something I wrote on exploit kit (EK) fundamentals: link
- 2016-03-22 - PaloAlto Networks Unit 42 blog: Campaign Evolution: Darkleech to Pseudo-Darkleech and Beyond
- 2016-07-02 - SANS ISC diary: Change in patterns for the pseudoDarkleech campaign
- 2016-09-14 - Malware-traffic-analysis.net: The pseudoDarkleech campaign starts using Rig EK instead of Neutrino EK
- 2016-10-03 - Malware-traffic-analysis.net: The pseudoDarkleech campaign stops sending CryptXXX, starts sending Cerber ransomware
Shown above: Flowchart for this infection traffic.
TRAFFIC
Shown above: Injected script from the pseudoDarkleech campaign in a page from the compromised site.
Shown above: Traffic from the infection filtered in Wireshark.
ASSOCIATED DOMAINS:
- avalon-logistic[.]com - Compromised site
- 95.183.12[.]11 port 80 - ds.mapalocksmith[.]com - Rig EK
- 194.165.16[.]0 - 194.165.19[.]255 (194.165.16[.]0/22) port 6892 (UDP) - UDP traffic caused by Cerber ransomware
- 136.243.157[.]171 port 80 - ffoqr3ug7m726zou.0ndl3j[.]bid - HTTP traffic caused by Cerber ransomware
OTHER DOMAINS FROM THE DECRYPT INSTRUCTIONS:
- ffoqr3ug7m726zou.osc6l4[.]bid
- ffoqr3ug7m726zou[.]onion[.]to
FILE HASHES
FLASH EXPLOIT:
- SHA256 hash: 0289e0909b4141e37e2a7f3a5de4390d64f444081b507502976f6b4dc2ab3baa
File name: 2016-10-24-pseudoDarkleech-Rig-EK-flash-exploit.swf (51,786 bytes)
PAYLOAD:
- SHA256 hash: 382624b9587792bcf5d16bf6b123ce4d810d702b0b4cc71624a170d76a8b0d97
File name: C:\Users\[username]\AppData\Local\Temp\rad91739.tmp.exe (265,339 bytes)
IMAGES
Shown above: Desktop of the infected Windows host after rebooting and checking one of the Cerber ransomware Decryptor URLs.
Click here to return to the main page.