Rig Exploit Kit via pseudoDarkleech from 220.127.116.11 delivers Cerber ransomware
- Today I captured traffic from the latest version of Cerber ransomware. The ransomware was delivered via the pseudoDarkleech campaign with use of the Rig Exploit Kit.
- The injection method was an Iframe, as mentioned in a post on SANS Internet Storm Center forum Change in patterns for the pseudoDarkleech campaign.
- The Rig exploit kit is making use of DNS Shadowing as explained in a sucuri.net blog post Website Malware – Evolution of Pseudo Darkleech.
- The Rig Exploit Kit has changed its URL pattern when used in the pseudoDarkleech campaign and Afraidgate campaign as reported by malware-traffic analysis.net – 2016-10-25 – RIG EK DATA DUMP: REGULAR RIG VS RIG-V
- This version of Cerber ransomware identifies itself as version 4.1.1
- Thanks to @CyberScimitar for sharing information on compromised site.
I have added a zipped pcap file for your analysis. The password for the zipped pcap is infected all lowercase.
PCAP file of the infection traffic:
ASSOCIATED DOMAINS AND IP ADDRESSES:
- sassyalbertsoap.com – COMPROMISED SITE
- 18.104.22.168 – red.sevending.com – RIG EK LANDING PAGE
- 22.214.171.124 – xrhwryizf5mui7a5.ugk9za.top – CERBER POST INFECT TRAFFIC
- 126.96.36.199 – 188.8.131.52 UDP Port 6892 – CERBER POST INFECT TRAFFIC
ASSOCIATED DOMAINS FOR RANSOM PAYMENT:
IMAGES AND DETAILS OF INFECTION CHAIN:
Shown above: Injected script found on index page of compromised site which redirects visitor to the Rig EK landing page to start infection chain – Web page source code can be found by right clicking on web page and selecting “View source”
Shown above: After extracting Rig flash exploit and saving as .swf file, decompiled using Flare (http://www.nowrap.de/flare.html) and examined flash meta data with text editor.
MALICIOUS PAYLOAD ASSOCIATED WITH RIG EXPLOIT: