Rig Exploit Kit via the EiTest delivers CryptoShield/REVENGE ransomware

NOTES:

  • Today I captured traffic from the Rig Exploit Kit (EK) which delivered CryptoShield/REVENGE  ransomware via the EITEST campaign.
  • Files on the infected host were encrypted and the file extensions were changed to .REVENGE .
  • Thanks to @nao_sec for tweeting information on compromised site

I have added a zipped pcap file for your analysis. The password for the zipped pcap is infected all lowercase.

PCAP file of the infection traffic:
2017-03-14-Rig-EK-pcap.zip

 

ASSOCIATED DOMAINS AND IP ADDRESSES:

  • www.everythingcebu.com – COMPROMISED SITE
  • 217.107.34.86 – dfg.stickneylodge.com – RIG EK LANDING PAGE
  • 109.236.87.201 – POST /js/other_scripts/get.php – RANSOMWARE CHECK-IN

ASSOCIATED EMAILS FOR RANSOM PAYMENT:

EMAIL: rev00@india.com
EMAIL: revenge00@writeme.com
EMAIL: rev_reserv@india.com

 

IMAGES AND DETAILS OF INFECTION CHAIN:

Shown above: Network traffic  associated with the Rig exploit and the delivery of CryptoShield/REVENGE ransomware

 

Shown above: Injected script found on index page of compromised site associated with the EiTest campaign which redirects visitors to the Rig EK landing page – Web page source code can be found by right clicking on web page and selecting “View source”

 

Shown above: # !!!HELP_FILE!!! #.TXT ransom note and payment instruction associated with CryptoShield/REVENGE ransomware

 

MALICIOUS PAYLOAD ASSOCIATED WITH RIG EXPLOIT: