2017-04-06 - EITEST RIG EK FROM 109.234.36[.]165 SENDS MATRIX RANSOMWARE VARIANT

NOTICE:

ASSOCIATED FILES:

  • 2017-04-06-EITest-Rig-EK-sends-Matrix-ransomware-variant.pcap   (916,311 bytes)
  • 2017-04-06-EITest-Rig-EK-artifact-o32.tmp.txt   (1,141 bytes)
  • 2017-04-06-EITest-Rig-EK-flash-exploit.swf   (40,245 bytes)
  • 2017-04-06-EITest-Rig-EK-landing-page.txt   (57,899 bytes)
  • 2017-04-06-EITest-Rig-EK-payload-Matrix-ransomware-variant.exe   (371,712 bytes)
  • 2017-04-06-Matrix-ransomware-variant-decyrption-instructions.hta   (3,231 bytes)
  • 2017-04-06-Matrix-ransomware-variant-decyrption-instructions.jpg   (690,707 bytes)
  • 2017-04-06-Matrix-ransomware-variant-decyrption-instructions.rtf   (5,684 bytes)
  • 2017-04-06-page-from-trackingsharks_com-with-injected-EITest-script.txt   (75,714 bytes)

BACKGROUND ON THE EITEST CAMPAIGN:


Shown above:  Flowchart for this infection traffic.

 

TRAFFIC


Shown above:  Injected script from the EITest campaign in a page from the compromised site.

 


Shown above:  Pcap of the infection traffic filtered in Wireshark.

 

TRAFFIC FROM AN INFECTION:

 

EMAIL ADDRESSES FROM THE DECRYPTION INSTRUCTIONS:

 

FILE HASHES

FLASH EXPLOIT:

PAYLOAD (MATRIX RANSOMWARE VARIANT):

 

IMAGES


Shown above:  Some alerts on the traffic from the Emerging Threats and ETPRO rulesets using Sguil on Security Onion.

 


Shown above:  Desktop of an infected windows host.

 

Click here to return to the main page.