2016-09-21 - TWO EXAMPLES OF EITEST RIG EK

NOTICE:

ASSOCIATED FILES:

  • 2016-09-21-EITest-Rig-EK-sends-CryptFile2-after-germansuppliesinc_com.pcap   (174,049 bytes)
  • 2016-09-21-EITest-Rig-EK-sends-Vawtrak-after-imr-racing_com.pcap   (825,547 bytes)
  • 2016-09-21-EITest-Rig-EK-flash-exploit-after-germansuppliesinc_com.swf   (25,205 bytes)
  • 2016-09-21-EITest-Rig-EK-flash-exploit-after-imr-racing_com.swf   (25,205 bytes)
  • 2016-09-21-EITest-Rig-EK-landing-page-after-germansuppliesinc_com.txt   (3,536 bytes)
  • 2016-09-21-EITest-Rig-EK-landing-page-after-imr-racing_com.txt   (3,440 bytes)
  • 2016-09-21-EITest-Rig-EK-payload-CryptFile2-after-germansuppliesinc_com.exe   (86,016 bytes)
  • 2016-09-21-EITest-Rig-EK-payload-Vawtrak-after-imr-racing_com.exe   (320,512 bytes)
  • 2016-09-21-EITest-flash-redirect-from-avtex_top.swf   (4,439 bytes)
  • 2016-09-21-EITest-flash-redirect-from-sqlbackupandftp_top.swf   (4,439 bytes)
  • 2016-09-21-page-from-germansuppliesinc_com-with-injected-EITest-script.txt   (67,198 bytes)
  • 2016-09-21-page-from-imr-racing_com-with-injected-EITest-script.txt   (62,685 bytes)

 

NOTES:

 

BACKGROUND ON THE EITEST CAMPAIGN:

 


Shown above:  Flowchart for this infection traffic.

 

TRAFFIC


Shown above:  Traffic from the first pcap filtered in Wireshark.

 


Shown above:  Traffic from the second pcap filtered in Wireshark.

 

FIRST PCAP:

 

SECOND PCAP:

  • 198.105.254[.]228 port 443 - ctwruhwdk[.]com - HTTPS/SSL/TLS traffic
  • 198.105.254[.]228 port 443 - apgtsdeh[.]com - HTTPS/SSL/TLS traffic
  • 81.177.13[.]242 port 443 - lkfiravihg[.]com - HTTPS/SSL/TLS traffic
  • 212.116.113[.]163 port 443 - apparatusou[.]bid - HTTPS/SSL/TLS traffic
  • 185.36.102[.]164 port 80 - 185.36.102[.]164 - GET /module/272a5ad4a1b97a2ac874d6d3e5fff01d
  • 185.36.102[.]164 port 80 - 185.36.102[.]164 - GET /module/[various other hexadecimal strings]

 

FILE HASHES

FLASH FILES:

PAYLOADS:

 

Click here to return to the main page.