본문 바로가기

malware

FIESTA EK - COMPARING HOW SILVERLIGHT AND JAVA DELIVER THE SAME MALWARE

728x90

FIESTA EK - COMPARING HOW SILVERLIGHT AND JAVA DELIVER THE SAME MALWARE

PCAP AND MALWARE

NOTES

The Silverlight exploit sent its malware payload through one HTTP GET request that returned an octect-stream of 1,643,332 bytes.  This is somewhat large for a malware payload, and I couldn't an artifact of that size on the infected VM.  To compare, I infected a VM from the same referer/Fiesta EK using only Java.

The Java exploit sent its malware payload through two HTTP GET requests.  These HTTP GET requests returned two octet-streams: one at 729,856 bytes and the other at 913,665.  That's a total of 1,643,521 bytes--less that 200 bytes difference from the Silverlight payload.  I saw the same artifacts on both infected VMs, so I'm assuming the Silverlight exploit bundled the two files in a single 1.6 MB octet-stream.

Places like Malware Don't Need Coffee show larger-than-normal payload sizes (1 MB or more) sent by the Silverlight exploit, but I didn't realize this single octet-stream ended up as two different EXE files.

 

CHAIN OF EVENTS

ASSOCIATED DOMAINS

  • 184.168.64.228 - www.quickr.org - comrpomised website - GET /Discover_ATM_1655_SOUTH_29TH_STREET_Philadelphia_PA_19145
  • 209.239.113.37 - nwntmtvjs.hopto.or and kzuvgi.hopto.org - Fiesta EK
  • 79.142.66.240 - report.my555m5g55a5555.com and report.ei17q3wsku1m9gmy9ce.com - post-infection callback traffic

FIESTA EK TRAFFIC USING SILVERLIGHT AS AN EXPLOIT

  • 03:01:38 - nwntmtvjs.hopto.org - GET /3fkthxp4g3gqgpi6hqdlzxuuxmqtgez93n4jf4
  • 03:01:45 - nwntmtvjs.hopto.org - GET /rmvk30g/?0cf322e68fd40caa430f100800095107005a5007090607060b5655015154010703;5110411
  • 03:01:49 - nwntmtvjs.hopto.org - GET /rmvk30g/?1582191b894778355245530903020553010c0e060a0d53520a000b00525f555302;6
  • 03:01:53 - nwntmtvjs.hopto.org - GET /rmvk30g/?1582191b894778355245530903020553010c0e060a0d53520a000b00525f555302;6;1

FIESTA EK - SILVERLIGHT EXPLOIT - POST-INFECTION CALLBACK

  • 03:01:59 - report.my555m5g55a5555.com - GET /?79u1mYW20=%96%9C%D1%A1%D6%AAd%A0%AE%98f%9B%9Dl%CCj%[long string]

FIESTA EK TRAFFIC USING JAVA AS AN EXPLOIT

  • 03:33:31 - kzuvgi.hopto.org - GET /3fkthxp4g3gqgpi6hqdlzxuuxmqtgez93n4jf4
  • 03:33:56 - kzuvgi.hopto.org - GET /rmvk30g/?3d8173a8c41fc917590a540a0508550902520c000c07030808510b035303550050
  • 03:33:57 - kzuvgi.hopto.org - GET /rmvk30g/?04d6365d1f0e55455f5b060d010d015501025007080257540b0157045706010505
  • 03:33:57 - kzuvgi.hopto.org - GET /rmvk30g/?04d6365d1f0e55455f5b060d010d015501025007080257540b0157045706010505
  • 03:33:57 - kzuvgi.hopto.org - GET /rmvk30g/?08b665e319034e315340070d040e5102010e56070d0107030b0d51045205510b53;1;4
  • 03:33:59 - kzuvgi.hopto.org - GET /rmvk30g/?3143fd3219034e3150495108545f0703020700025d505102080407010254070a50;2;4
  • 03:34:02 - kzuvgi.hopto.org - GET /rmvk30g/?3143fd3219034e3150495108545f0703020700025d505102080407010254070a50;2;4;1

FIESTA EK - JAVA EXPLOIT - POST-INFECTION CALLBACK

  • 03:34:02 - report.ei17q3wsku1m9gmy9ce.com - GET /?55wSK5520=%96%9E%A9%A1%D7%A8g%9A%CAg%99%D6%97%DA%[long string]

NOTE: In the First example, a Java exploit was sent after the Silverlight traffic; however, no malware payload was sent using Java.  I did not include those additional HTTP GET requests in the PCAP for the Silverlight traffic.

 

PRELIMINARY MALWARE ANALYSIS

SILVERLIGHT EXPLOIT

File name:  2014-03-22-Fiesta-EK-silverlight-exploit.xap
File size:  5.1 KB ( 5265 bytes )
MD5 hash:  eb74945c840dfd74a171639f379777aa
Detection ratio:  3 / 51
First submission:  2014-03-19 15:32:15 UTC
VirusTotal link:  https://www.virustotal.com/en/file/bed60e3715e542881d5e80784bdcbb4945a6a8375a63cbde6436a2782593a87c/analysis/

 

JAVA EXPLOIT

File name:  2014-03-22-Fiesta-EK-java-exploit.jar
File size:  7.3 KB ( 7462 bytes )
MD5 hash:  d529b2a500b94641fa89157f14d46608
Detection ratio:  4 / 51
First submission:  2014-03-22 03:59:50 UTC
VirusTotal link:  https://www.virustotal.com/en/file/a4d56c4a8ddf5bed48b6fc8641f87ff356e272d52c2516d4dfb00575f64e3e0c/analysis/

 

MALWARE PAYLOAD PART 1

File name:  2014-03-22-Fiesta-EK-first-malware-payload.exe
File size:  712.5 KB ( 729600 bytes )
MD5 hash:  2233f453d8a120321a3dca0e3df25420
Detection ratio:  9 / 51
First submission:  2014-03-22 04:00:42 UTC
VirusTotal link:  https://www.virustotal.com/en/file/2629ea9fe35e2ff0dde9d018c66e5f0355068a958f827b74ec3fb067ea751383/analysis/
Malwr link:  https://malwr.com/analysis/NDEwZDliOTI3YzNhNGQ2MmE2ODMxYzRiMjY0NzljZjI/

 

MALWARE PAYLOAD PART 2

File name:  2014-03-22-Fiesta-EK-second-malware-payload.exe
File size:  892.0 KB ( 913409 bytes )
MD5 hash:  bbab2ae7c44d8c024928d2f978d5b991
Detection ratio:  2 / 51
First submission:  2014-03-22 04:01:06 UTC
VirusTotal link:  https://www.virustotal.com/en/file/3aabe8afb7e974cb4b5ec89c9aa87e3f1841957146da2c8b620314b575f89c16/analysis/
Malwr link:  https://malwr.com/analysis/ZGQ2NTYyODBhMDY1NGQ3NTliZGY5ZjM4YzFiYjJkNDk/

 

SNORT EVENTS

SNORT EVENTS FOR THE FIESTA EK SILVERLIGHT TRAFFIC (from Sguil on Security Onion)

  • ET INFO HTTP Connection To DDNS Domain Hopto.org
  • ET CURRENT_EVENTS Fiesta EK Landing Jan 24 2013
  • ET CURRENT_EVENTS Phoenix/Fiesta URI Requested Contains /? and hex
  • ET CURRENT_EVENTS Possible Neutrino/Fiesta SilverLight Exploit March 05 2014 DLL Naming Convention
  • ET TROJAN Simda.C Checkin

 

SNORT EVENTS

SNORT EVENTS FOR THE FIESTA EK JAVA TRAFFIC (from Sguil on Security Onion)

  • ET INFO HTTP Connection To DDNS Domain Hopto.org
  • ET CURRENT_EVENTS Fiesta EK Landing Jan 24 2013
  • ET POLICY Vulnerable Java Version 1.7.x Detected
  • ET CURRENT_EVENTS SUSPICIOUS Java Request to NOIP Dynamic DNS Domain
  • ET CURRENT_EVENTS Unknown - Java Request - gt 60char hex-ascii
  • ET CURRENT_EVENTS Phoenix/Fiesta URI Requested Contains /? and hex
  • ET CURRENT_EVENTS Possible J7u21 click2play bypass
  • ET INFO Java File Sent With X-Powered By HTTP Header - Common In Exploit Kits
  • ET INFO JAVA - Java Archive Download By Vulnerable Client
  • ET CURRENT_EVENTS DRIVEBY Generic - 8Char.JAR Naming Algorithm
  • ET TROJAN Generic - 8Char.JAR Naming Algorithm
  • ET TROJAN Simda.C Checkin

 

HIGHLIGHTS FROM THE TRAFFIC

Embedded iframe in page from the infected web server


From the first PCAP with the Silverlight exploit

From the second PCAP with the Java exploit

 

Fiesta EK Silverlight exploit delivers malware payload in single HTTP GET request

 

Fiesta EK Java exploit delivers same malware payload in two different HTTP GET requests

 

FINAL NOTES

Once again, here are links for PCAP file of the traffic and ZIP file of the associated malware:

The ZIP file is password-protected with the standard password.  If you don't know it, email me at admin@malware-traffic-analysis.net and ask.

Click here to return to the main page.

728x90