2017-01-30 - EITEST FAKE CHROME POPUP LEADS TO SPORA RANSOMWARE

NOTICE:

ASSOCIATED FILES:

  • 2017-01-30-EITest-fake-Chrome-popup-sends-Spora-ransomware-1st-run.pcap   (359,511 bytes)
  • 2017-01-30-EITest-fake-Chrome-popup-sends-Spora-ransomware-2nd-run.pcap   (291,918 bytes)
  • 2017-01-30-Spora-ransomware-sent-by-EITest-campaign.exe   (110,712 bytes)
  • 2017-01-30-page-from-forum.odroid_com-with-injected-EITest-script-1st-run.txt   (143,162 bytes)
  • 2017-01-30-page-from-forum.odroid_com-with-injected-EITest-script-2nd-run.txt   (143,391 bytes)

BACKGROUND ON EITEST FAKE CHROME POPUPS:

BACKGROUND ON SPORA RANSOMWARE:

OTHER NOTES:


Shown above:  Flowchart for this infection traffic.

 

TRAFFIC


Shown above:  Start of injected script from the EITest campaign from a page from the compromised site.

 


Shown above:  End of of injected script from the EITest campaign from a page from the compromised site.

 


Shown above:  Pcap of the infection traffic filtered in Wireshark (1st run).

 


Shown above:  Pcap of the infection traffic filtered in Wireshark (2nd run).

 

ASSOCIATED TRAFFIC:

 

FILE HASHES

SPORA RANSOMWARE:

 

IMAGES


Shown above:  Popup within Chrome when viewing the compromised website (image 1 of 2).

 


Shown above:  Popup within Chrome when viewing the compromised website (image 2 of 2).

 


Shown above:  Spora ransomware decryption instructions from the HTML file dropped to the Desktop.

 


Shown above:  Spora decryption site at spora[.]biz.

 

Click here to return to the main page.