Rig Exploit Kit via EiTest campaign delivers Chthonic banking malware

NOTES:

  • Today I captured traffic from the Rig Exploit Kit (EK) which delivered Chthonic via the EITEST campaign.
  • Thanks to @CyberScimitar for sharing information on compromised site.

I have added a zipped pcap file for your analysis. The password for the zipped pcap is infected all lowercase.

PCAP file of the infection traffic:
2016-11-28-Rig-EK-pcap.zip

 

ASSOCIATED DOMAINS AND IP ADDRESSES:

  • www.govo.wa.edu.au – COMPROMISED SITE
  • 146.0.72.176 – a4u55k.xlc4li.top – Rig EK Landing Page
  • 195.123.210.150 – blackcoffee.bit  POST /www/ – Post Infect Traffic
  • 31.3.135.232 Port 53 – DNS TRAFFIC – Post Infect Traffic
  • 193.183.98.154 Port 53 – SYN Only – Post Infect Traffic
  • 5.135.183.146 Port 53 – SYN Only – Post Infect Traffic
  • 84.201.32.108 Port 53 – SYN Only – Post Infect Traffic
  • 96.90.175.167 Port 53 – SYN Only – Post Infect Traffic
  • 104.238.186.189 Port 53 – SYN Only – Post Infect Traffic

 

IMAGES AND DETAILS OF INFECTION CHAIN:

Shown above: Network traffic  associated with the Rig exploit and the delivery of Chthonic banking malware

 

Shown above: Injected script found on index page of compromised site associated with the EiTest campaign which redirects visitors to the Rig EK landing page

 

Shown above: Post infection traffic associated with Chthonic banking malware

 

Shown above: Communication with malware campaigns DNS server over port 53

 

MALICIOUS PAYLOAD ASSOCIATED WITH RIG EXPLOIT: