2017-02-28 - EITEST RIG EK FROM 81.177.140[.]75 SENDS CRYPTOSHIELD RANSOMWARE

NOTICE:

ASSOCIATED FILES:

  • 2017-02-28-EITest-Rig-EK-sends-CryptoShield-ransomware.pcap   (475,941 bytes)
  • 2017-02-28-CryptoShield-ransomware-decryption-instructions.html   (3,020 bytes)
  • 2017-02-28-CryptoShield-ransomware-decryption-instructions.txt   (1,750 bytes)
  • 2017-02-28-EITest-Rig-EK-payload-9lvn0467.exe   (119,296 bytes)
  • 2017-02-28-Rig-EK-artifact-o32.tmp.txt   (1,141 bytes)
  • 2017-02-28-Rig-EK-flash-exploit.swf   (15,105 bytes)
  • 2017-02-28-Rig-EK-landing-page.txt   (31,016 bytes)
  • 2017-02-28-page-from-zonadjsperu_com-with-injected-EITest-script.txt   (158,301 bytes)

BACKGROUND ON THE CAMPAIGN:

BACKGROUND ON CRYPTOSHIELD RANSOMWARE:

OTHER NOTES:


Shown above:  Flowchart for this infection traffic.

 

TRAFFIC


Shown above:  Injected script from the EITest campaign in a page from the compromised site.

 


Shown above:  Pcap of the infection traffic filtered in Wireshark.

 

ASSOCIATED DOMAINS:

 

FILE HASHES

FLASH EXPLOIT:

PAYLOAD:

 

IMAGES


Shown above:  Desktop of an infected Windows host.

 


Shown above:  CryptoShield ransomware made persistent on the infected host.

 

Click here to return to the main page.