Rig Exploit Kit via EiTest delivers LATENTBOT

NOTES:

  • Today I captured traffic from the Rig Exploit Kit (EK) which delivered LATENTBOT malware via the EITEST campaign.
  • More information about LATENTBOT can be read in a FireEye.com blog post LATENTBOT: Trace Me If You Can .
  • Thanks to @CyberScimitar for sharing information on compromised site and further analysis of the payload.

I have added a zipped pcap file for your analysis. The password for the zipped pcap is infected all lowercase.

PCAP file of the infection traffic:
2016-10-26-Rig-EK-pcap.zip

 

ASSOCIATED DOMAINS AND IP ADDRESSES:

  • gadistrictkiwanis.org –COMPROMISED SITE
  • 185.82.200.52 – pevn5.l6jmgq.top- RIG EK LANDING PAGE
  • 148.251.255.108 – GET /i30pRl1/41561423731219408887.zip
    POST INFECTION TRAFFIC
  • 148.251.255.108 – GET /i30pRl1/26651312199382219919337741378854.zip
    POST INFECTION TRAFFIC
  • 148.251.255.108 – GET /i30pRl1/166898663488891365391255303285738.zip
    POST INFECTION TRAFFIC
  • 148.251.255.108 – GET /i30pRl1/3447647190923826123201658256398654.zip
    POST INFECTION TRAFFIC
  • 148.251.255.108 – GET /i30pRl1/102566761309044280261986133853334.zip
    POST INFECTION TRAFFIC
  • 148.251.255.108 – GET /i30pRl1/4485141994019910541382410484054.zip
    POST INFECTION TRAFFIC
  • 148.251.255.108 – PUT /UPLOAD?file=CLIENT_UPLOAD
    POST INFECTION TRAFFIC

IMAGES AND DETAILS OF INFECTION CHAIN:

Shown above: Network traffic  associated with the Rig exploit and the delivery of LATENTBOT malware

 

Shown above: Injected script found on index page of compromised site associated with the EiTest campaign which redirects visitors to the Rig EK landing page – Web page source code can be found by right clicking on web page and selecting “View source”

 

Shown above: LATENTBOT using PUT command to communicate with the command and control (CnC) host

 

Shown above: Post infection download of .zip files

 

MALICIOUS PAYLOAD ASSOCIATED WITH RIG EXPLOIT: