2017-03-20 - EITEST RIG EK FROM 92.53.104[.]78 SENDS CERBER RANSOMWARE

NOTICE:

ASSOCIATED FILES:

  • 2017-03-20-EITest-Rig-EK-sends-Cerber-ransomware.pcap   (825,380 bytes)
  • 2017-03-20-Cerber-ransomware_READ_THIS_FILE_5JBDOT_.txt   (1,337 bytes)
  • 2017-03-20-Cerber-ransomware_READ_THIS_FILE_O9EALHF_.jpeg   (239,134 bytes)
  • 2017-03-20-Cerber-ransomware_READ_THIS_FILE_SRBVX_.hta   (76,770 bytes)
  • 2017-03-20-EITest-Rig-EK-artifact-o32.tmp.txt   (1,141 bytes)
  • 2017-03-20-EITest-Rig-EK-flash-exploit.swf   (15,010 bytes)
  • 2017-03-20-EITest-Rig-EK-landing-page.txt   (57,621 bytes)
  • 2017-03-20-EITest-Rig-EK-payload-Cerber-ransomware-2isifsc1.exe   (286,921 bytes)
  • 2017-03-20-page-from-regenairgy_com-wtih-injected-EITest-script.txt   (23,105 bytes)

BACKGROUND ON THE EITEST CAMPAIGN:

OTHER NOTES:


Shown above:  Flowchart for this infection traffic.

 

TRAFFIC


Shown above:  Injected script from the EITest campaign in a page from the compromised site.

 


Shown above:  Pcap of the infection traffic filtered in Wireshark.

 

TRAFFIC FROM AN INFECTION:

 

FILE HASHES

FLASH EXPLOIT:

PAYLOAD (CERBER RANSOMWARE):

 

IMAGES


Shown above:  Desktop of an infected Windows host.

 

Click here to return to the main page.