Rig Exploit Kit via EiTest campaign from 109.234.36.68 delivers Mole ransomware

NOTES:

  • Today I captured traffic from the Rig Exploit Kit (EK) which delivered Mole  ransomware via the EITEST campaign.
  • Files on the infected host were encrypted and the file extensions were changed to .MOLE

 

I have added a zipped pcap file for your analysis. The password for the zipped pcap is infected all lowercase.

PCAP file of the infection traffic:
2017-05-24-Rig-EK-pcap.zip

 

ASSOCIATED DOMAINS AND IP ADDRESSES:

  • cedar.igrooveweb.com – COMPROMISED SITE
  • 109.234.36.68 – set.tilleystudio.com – RIG EK LANDING PAGE
  • 144.217.240.227 – POST /scripts/jquery-color/info-static.php – MOLE C2

 

WEBSITE ASSOCIATED WITH MOLE RANSOMWARE:

  • supportjy2xvvdmx.onion

 

IMAGES AND DETAILS OF INFECTION CHAIN:

Shown above: Network traffic  associated with the Rig exploit and the delivery of MOLE ransomware

 

Shown above: Injected script found on index page of compromised site associated with the EiTest campaign which redirects visitors to the Rig EK landing page – Web page source code can be found by right clicking on web page and selecting “View source”

 

Shown above: Encrypted files with the .MOLE file extension

 

Shown above: _HELP_INSTRUCTION.TXT ransom note and payment instruction associated with MOLE ransomware

 

MALICIOUS PAYLOAD ASSOCIATED WITH RIG EXPLOIT: