Rig Exploit Kit via EiTest delivers DreamBot, Tor Client and Ursnif variant

NOTES:

  • Today I captured traffic from the Rig Exploit Kit (EK) which delivered a loader identified as possibly DreamBot via the EITEST campaign.
  • The loader then downloaded the Tor client and a Ursnif variant.

I have added a zipped pcap file for your analysis. The password for the zipped pcap is infected all lowercase.

PCAP file of the infection traffic:
2016-11-10-Rig-EK-pcap.zip

 

ASSOCIATED DOMAINS AND IP ADDRESSES:

  • outdooraddictx.com – COMPROMISED SITE
  • 174.128.253.197 – math.preliminaryam.top – RIG EK LANDING PAGE
  • 51.254.58.227 – GET /images/ – POST INFECTION TRAFFIC
  • 51.254.58.227 – GET /tor/t64.dll – TOR CLIENT DOWNLOAD
  • 37.48.122.26 – curlmyip.net – IP ADDRESS CHECK
  • 192.42.118.104 – spamhaus.org GET /images/XY3782IER/ – POST INFECT TRAFFIC
  • 104.20.4.21 – www.spamhaus.org GET /images/XY3782IER/ – POST INFECT TRAFFIC

 

IMAGES AND DETAILS OF ORIGINAL INFECTION CHAIN:

Shown above: Network traffic  associated with the Rig exploit and the delivery  loader and Tor client

 

Shown above: Obfuscated injected script found on index page of compromised site associated with the EiTest campaign which redirects visitors to the Rig EK landing page – Web page source code can be found by right clicking on web page and selecting “View source”

 

Shown above: Wireshark HTTP object list shows malicious payloads delivered from IP address  51.254.58.227

 

Shown above: Registry key associated with TOR client

 

MALICIOUS PAYLOAD ASSOCIATED WITH RIG EXPLOIT: