2017-04-04 - CERBER RANSOMWARE AND KOVTER INFECTION

NOTICE:

ASSOCIATED FILES:

  • 2017-04-04-Cerber-ransomware-and-Kovter-traffic.pcap   (3,138,096 bytes)
  • 2017-04-03-malspam-pushing-Cerber-ransomware-and-Kovter-2143-UTC.eml   (2,996 bytes)
  • 2017-04-04-Cerber-ransomware.exe   (272,041 bytes)
  • 2017-04-04-Kovter.exe   (369,850 bytes)
  • UPS-Parcel-ID-9755405.doc.js-recovered.txt   (786 bytes)
  • UPS-Parcel-ID-9755405.zip-corrupt   (1,010 bytes)

NOTES:

 

EMAIL


Shown above:  Screen shot of the email.

 

EMAIL HEADERS:

 


Shown above:  Attachment taken from the malspam.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

URLS GENERATED BY EXTRACTED .JS FILE:

CERBER RANSOMWARE POST-INFECTION HTTP TRAFFIC:

CERBER POST-INFECTION UDP TRAFFIC:

KOVTER POST-INFECTION HTTP TRAFFIC:

KOVTER POST-INFECTION HTTPS/SSL/TLS TRAFFIC:

 

FILE HASHES

CORRUPT ZIP ATTACHMENT FROM THE EMAIL:

CERBER RANSOMWARE AND KOVTER BINARIES:

 

IMAGES


Shown above:  Some alerts on the traffic from the Emerging Threats Pro (ETPRO) ruleset using Sguil on Security Onion.

 


Shown above:  Getting a better idea of the Kovter post-infection traffic through filtering in Wireshark.

 


Shown above:  Getting a better idea of the Kovter post-infection traffic through escalating the events in Security Onion.

 

Click here to return to the main page.