Rig Exploit Kit via EITEST delivers GootKit Banking Malware
- Today I captured traffic from the Rig Exploit Kit (EK) which delivered GootKit banking malware via the EITEST campaign.
I have added a zipped pcap file for your analysis. The password for the zipped pcap is infected all lowercase.
PCAP file of the infection traffic:
ASSOCIATED DOMAINS AND IP ADDRESSES:
- cedar.igrooveweb.com – COMPROMISED SITE
- 126.96.36.199 – dfg.twitttwoo.co.uk – RIG EK LANDING PAGE
- 188.8.131.52 – duplanty.top – GOOTKIT Check-in
IMAGES AND DETAILS OF INFECTION CHAIN:
Shown above: Injected script found on index page of compromised site associated with the EiTest campaign which redirects visitors to the Rig EK landing page – Web page source code can be found by right clicking on web page and selecting “View source”
MALICIOUS PAYLOAD ASSOCIATED WITH RIG EXPLOIT: