{"id":614,"date":"2016-11-23T12:41:26","date_gmt":"2016-11-23T12:41:26","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=614"},"modified":"2016-11-23T12:41:26","modified_gmt":"2016-11-23T12:41:26","slug":"malware-exercise-2016-11-19-a-luminous-future","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=614","title":{"rendered":"Malware Exercise 2016-11-19 A luminous future"},"content":{"rendered":"<p>Brad has a new one out and I figured that I would take a break from studying to crank this one out. Artifacts for this exercise can be found <a href=\"http:\/\/github.com\/bloomer1016\/Malware-exercise-2016-11-19\" target=\"_blank\">here<\/a>. Hope that everyone has a great Thanksgiving this week!<\/p>\n<p>Executive Summary<br \/>\n=================<br \/>\nBased on what is in the PCAP, there are two issues going on. The first issue is that the user went to a compromised site called www[.]spoofee[.]com which had a malicious script injected into it which directed the user to another site which used a Flash exploit from the Rig EK (exploit kit) against the client system. This was done behind the scenes as the user was not aware of this activity. Once this was downloaded and installed, we see callbacks to a malicious IP address (the LuminosityLink Command and Control). The other issue is that the user signed into a fake Netflix site over a non-encrypted channel. This looks like it was done via a phishing email since we can see Tom going to Outlook.com right before he entered in his Netflix credentials.  <\/p>\n<p>About the Investigation<br \/>\n=======================<br \/>\n\u2013 Date and time range of the traffic you\u2019re reviewing.<br \/>\n&gt; First packet: 2016-11-19 00:16:02 \/ Last packet: 2016-11-19 00:25:43 \/ Elapsed: 00:09:41<\/p>\n<p>\u2013 Date and time of infection.<br \/>\n&gt; Nov 19, 2016 00:16:49.402750000 GMT &#8211; For the Rig EK and LuminosityLink C2<br \/>\n&gt; Nov 19, 2016 00:24:56.109088000 GMT &#8211; For the Netflix credentials issue<\/p>\n<p>\u2013 IP address, MAC address, Other host information<br \/>\n&gt; 172.16.104.115 \/ 00:21:70:5b:f4:2c \/ Hostname: TUCKER-4A9F-WIN \/ Windows 7 SP1 with IE v11<\/p>\n<p>\u2013 A conclusion with recommendations for any follow-up actions.<br \/>\n&gt; At this time the laptop should be banned from the network and re-kicked to make sure that the infection gets cleaned up. Once that is done, I would advise Tom on the importance of keeping his system up-to-date to help prevent these types of attacks. I would also talk to Tom and make sure that any credentials for any web-based services used on that system (Facebook, Twitter, Outlook, Netflix, etc.) are changed immediately to help prevent any further compromises. Some basic phishing education would help Tom as well so he is aware of these types of emails in the future (and how to avoid them). From the corporate side, this infection may help strengthen the argument for locking down outbound ports on the corporate firewall to only the needed ports that allow the business to operate effectively and efficiently. Lastly, I would make sure that any web proxies\/firewalls used in the company have the IOCs added to them to help limit the attack surface; especially any ICMP traffic going to the 46.101.201.100 address.<\/p>\n<p>\u2013 Indicators of Compromise (IP, FQDN, etc\u2026)<br \/>\n===========================================<br \/>\n&gt; www.spoofee.com \/ 207.58.143.233<br \/>\n&gt; 118.178.241.78 (80)<br \/>\n&gt; free.banayok.com \/ 195.133.146.58<br \/>\n&gt; 46.101.201.100 (ICMP \/ TCP 1337)<br \/>\n&gt; resolution.netflix.link.confirm.user.auth.37548471.nettrust01.com \/ 190.14.37.232 (80)<\/p>\n<p>Hash Information of Artifacts<br \/>\n=============================<br \/>\nFile name: flash.swf<br \/>\nSize: 10KB<br \/>\nMD5 hash: a12e75e71e44140f582440ecc261658a<br \/>\nVirustotal: <a href=\"http:\/\/virustotal.com\/en\/file\/0cc84eaea2a9661c07d316aa1275ffd9227fc92e8d2507f167a9f6e534dc2644\/analysis\/\" target=\"_blank\">http:\/\/virustotal.com\/en\/file\/0cc84eaea2a9661c07d316aa1275ffd9227fc92e8d2507f167a9f6e534dc2644\/analysis\/<\/a><br \/>\nFirst submission: 2016-11-18 21:48:59 UTC<\/p>\n<p>Notes From The Investigation<br \/>\n=============================<br \/>\nSo an easy starting point for this is to look at the alerts that were generated from the traffic. Personally I prefer the Suricata alerts over the Snort alerts since the ETPRO rules seem to be &#8220;better&#8221; when dealing with EK traffic. Granted when looking at the Snort alerts, we do see some interesting alerts there that are not referenced in the Suricata alerts. Anyways, I digress&#8230;<\/p>\n<p>Like I stated above, there are two issues that are seen in the network traffic. Let&#8217;s start with the first one &#8211; the Rig EK that leads to LuminosityLink C2. The start of the traffic is from Tom looking up the site &#8220;www[.]spoofee[.]com&#8221; via Bing. Once Tom gets to the site to start shopping, we see a script that has been injected into the website that directs Tom to another site in the background.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/11\/iframe.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/11\/iframe.png\" alt=\"\" width=\"770\" height=\"90\" class=\"aligncenter size-full wp-image-615\" \/><\/a><\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nGET \/getcupon\/43RQcj HTTP\/1.1\r\nAccept: text\/html, application\/xhtml+xml, *\/*\r\nReferer: http:\/\/www.spoofee.com\/\r\nAccept-Language: en-US\r\nUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\nAccept-Encoding: gzip, deflate\r\nHost: 118.178.241.78\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 302 Found\r\nDate: Sat, 19 Nov 2016 00:16:48 GMT\r\nServer: Apache\/2.4.10 (Debian)\r\nExpires: Thu, 21 Jul 1977 07:30:00 GMT\r\nLast-Modified: Sat, 19 Nov 2016 00:16:48 GMT\r\nCache-Control: max-age=0\r\nPragma: no-cache\r\nSet-Cookie: 967e1=%7B%22streams%22%3A%5B1479514608%5D%2C%22campaigns%22%3A%7B%222%22%3A1479514608%7D%2C%22time%22%3A1479514608%7D; expires=Tue, 20-Dec-2016 00:16:49 GMT; Max-Age=2678400; path=\/\r\nLOCATION: http:\/\/free.BANAYOK.COM\/?q=ILXWrwE0q1oZOd2scOAKpgs76aa1mAqW83ufQ9ma9vW0P-pMLW2Wxkesta&amp;sourceid=edge&amp;ie=UTF-8&amp;oq=MsGNLl5Omf81Pz0zbxaYjyVG1xqgotAAnU2OPDcQtNbFhn5b2sHwayded2&amp;aqs=edge.93p91.406j5o4&amp;es_sm=140\r\nContent-Length: 0\r\nKeep-Alive: timeout=5, max=100\r\nConnection: Keep-Alive\r\nContent-Type: text\/html; charset=utf-8<\/pre>\n<p>Then there is a call to the site &#8220;free[.]BANAYOK[.]COM&#8221; which I believe does a system check to see what version of Flash is on the system, and then proceeds to get the Flash file. This is part of the Rig EK at this time. I extracted the Flash file from Wireshark, but I was unable to decipher it. Once the Flash exploit has taken hold, we see the encrypted binary being pulled down to Tom&#8217;s system.<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nGET \/?q=ILXWrwE0q1oZOd2scOAKpgs76aa1mAqW83ufQ9ma9vW0P-pMLW2Wxkesta&amp;sourceid=edge&amp;ie=UTF-8&amp;oq=MsGNLl5Omf81Pz0zbxaYjyVG1xqgotAAnU2OPDcQtNbFhn5b2sHwayded2&amp;aqs=edge.93p91.406j5o4&amp;es_sm=140 HTTP\/1.1\r\nAccept: text\/html, application\/xhtml+xml, *\/*\r\nReferer: http:\/\/www.spoofee.com\/\r\nAccept-Language: en-US\r\nUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\nAccept-Encoding: gzip, deflate\r\nConnection: Keep-Alive\r\nHost: free.banayok.com\r\n\r\nHTTP\/1.1 200 OK\r\nServer: nginx\/1.6.2\r\nDate: Sat, 19 Nov 2016 00:16:50 GMT\r\nContent-Type: text\/html\r\nContent-Length: 2030\r\nConnection: keep-alive\r\nX-Powered-By: PHP\/5.4.45-0+deb7u5\r\nVary: Accept-Encoding\r\nContent-Encoding: gzip\r\n\r\n...........W]w....+Y&lt;...3.J..!k.\r\n\r\n-----\r\n\r\nGET \/?es_sm=113&amp;sourceid=yandex&amp;ie=Windows-1252&amp;q=LbLWrwE0q00ZItmscOYNphMk7qSzhhCT7RuEOtnW-rW-Ev16OGTR0QGs3fVpIID&amp;oq=g6-HJ8VD20D2kOY73X21z8QUpA17Z3OCffA1FOAU9voXKe1ylB6dzaVY30EZpbtE&amp;aqs=yandex.82g80.406p4l7 HTTP\/1.1\r\nAccept: *\/*\r\nReferer: http:\/\/free.banayok.com\/?q=ILXWrwE0q1oZOd2scOAKpgs76aa1mAqW83ufQ9ma9vW0P-pMLW2Wxkesta&amp;sourceid=edge&amp;ie=UTF-8&amp;oq=MsGNLl5Omf81Pz0zbxaYjyVG1xqgotAAnU2OPDcQtNbFhn5b2sHwayded2&amp;aqs=edge.93p91.406j5o4&amp;es_sm=140\r\nAccept-Language: en-US\r\nUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\nAccept-Encoding: gzip, deflate\r\nHost: free.banayok.com\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 200 OK\r\nServer: nginx\/1.6.2\r\nDate: Sat, 19 Nov 2016 00:16:51 GMT\r\nContent-Type: application\/x-shockwave-flash\r\nContent-Length: 10622\r\nConnection: keep-alive\r\nX-Powered-By: PHP\/5.4.45-0+deb7u5\r\n\r\nCWS.3R..x.\\Uo.......m.w.3....._.\r\n\r\n-----\r\n\r\nGET \/?es_sm=100&amp;q=ILbWrwE0q1oZOd2scOAKpgs76aW1mAqW83ufQ9ua9vW0P-pMLWKWxkestaMs&amp;oq=GNPl5Omf81Pz0zHxaYjyVG1xqgktAAnU2OPDcQdNbFhn5b2ZJw3xMaVFNxAx&amp;ie=UTF-16&amp;sourceid=msie&amp;aqs=msie.111q100.406v3f073 HTTP\/1.1\r\nAccept: *\/*\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/5.0 (Windows NT 6.1; WOW64; Trident\/7.0; rv:11.0) like Gecko\r\nHost: free.banayok.com\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 200 OK\r\nServer: nginx\/1.6.2\r\nDate: Sat, 19 Nov 2016 00:16:56 GMT\r\nContent-Type: application\/x-msdownload\r\nContent-Length: 1015808\r\nConnection: keep-alive\r\nX-Powered-By: PHP\/5.4.45-0+deb7u5\r\nAccept-Ranges: bytes\r\n\r\n,-.KADwAewBK..wA.wMKCDwA!wWKCDwAawMKCDwAawMKCDwAawMKCDwAawMKCEwA.gME\\.~.@.L..e..5.$8c4....,&amp;c).2.W\/.c6.\/A.#<\/pre>\n<p>Once the encrypted binary was downloaded and installed on Tom&#8217;s system, we start to see the call-back traffic from his system to the malicious IP address of 46.101.201.100. The interesting thing about this one is the fact that the call-back traffic is using two different protocols &#8211; ICMP (echo request\/reply and TCP on port 1337 as shown below):<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/11\/C2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/11\/C2.png\" alt=\"\" width=\"1645\" height=\"894\" class=\"aligncenter size-full wp-image-617\" \/><\/a><\/p>\n<p>The other issue that we can see from the PCAP is the fact that Tom got phished for his Netflix credentials as seen below. Please note that I am making an educated guess here since right before the domain &#8220;resolution[.]netflix.link.confirm.user.auth.37548471[.]nettrust01.com&#8221; appears in the PCAP, we can see that Tom goes to &#8220;www.outlook.com.&#8221; Following the TCP stream for this site, we can see the numerous 301 redirects until we see where he POSTs his credentials to the site.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/11\/Phish.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/11\/Phish.png\" alt=\"\" width=\"1884\" height=\"919\" class=\"aligncenter size-full wp-image-616\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brad has a new one out and I figured that I would take a break from studying to crank this one out. Artifacts for this exercise can be found here. Hope that everyone has a great Thanksgiving this week! Executive Summary ================= Based on what is in the PCAP, there are two issues going on. The first issue is that the user went to a compromised site called www[.]spoofee[.]com which had a malicious script injected into it which directed the user to another site which used a Flash exploit from the Rig EK (exploit kit) against the client system. This&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=614\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-614","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=614"}],"version-history":[{"count":1,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/614\/revisions"}],"predecessor-version":[{"id":618,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/614\/revisions\/618"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}