Exploit kit roundup - early June 2015

Published: 2015-06-04. Last Updated: 2015-06-04 02:04:13 UTC
by Brad Duncan (Version: 1)
5 comment(s)

Introduction

Security Operation Center (SOC) analysts investigate alerts on suspicious network activity.  However, these analysts might not run across exploit kit (EK) traffic that often.  An organization's web gateway can stop a great deal of bad traffic before you see a full infection chain.  Investigating other types of suspicious activity will likely take up the majority of an analyst's workday.

Some of us are lucky enough to review EK traffic on a routine basis.  What that in mind, I want to share examples of the most common exploit kits I've noticed so far this year.

In order, the EK traffic I've seen most often in 2015 has been:

  • Angler
  • Fiesta
  • Nuclear
  • Neutrino
  • Magnitude
  • Rig

This isn't a comprehensive list.  Other exploit kits are out there, but these are most common that I've seen this year.  I don't have any hard numbers, and the last four (Nuclear, Neutrino, Magnitude, and Rig) are more of an educated guess for the ranking.  The EK scene can evolve fairly quick.  The list will likely change within a few months, and my observations are only one person's view.

Angler EK

Angler is the most common exploit kit I run across.  It's also the most advanced.  Angler changes URL patterns frequently, and these changes have recently happened on a near-daily basis.  Angler started using "fileless" infection techniques in 2014 [1], and it now sends its payload in a fairly sophisticated encrypted manner (meaning it doesn't use a straight-forward ASCII string to XOR the payload when it's sent over HTTP).  In recent months, I've had a hard time obtaining the payload from Angler EK.  In the example for this diary, I wasn't able to obtain or decrypt the payload.

Previously, I've seen Angler sending some form of ransomware like the TeslaCrypt/Alpha Crypt variants [2] or CrytoWall 3.0 [3].  In the past few days, I've mainly seen Bedep and related payloads sent by Angler.

  • An example of Angler EK traffic on 2015-06-03: click here for the pcap file.


Shown above: Angler EK traffic and post-infection activity on Wednesday 2015-06-03.

Fiesta EK

Fiesta is probably the next-most common exploit kit I've run across, most of it related to the BizCN actor that I described in a previous diary [4].  Other actors certainly use this exploit kit.  Like Angler EK, Fiesta also uses a more sophisticated type of encryption when sending the malware payload.  Fortunately, I can usually grab a copy of the payload from an infected host in my lab or decrypt the payload when necessary.

  • Example 1 of Fiesta EK traffic on 2015-06-03: click here for the pcap file.
  • Example 2 of Fiesta EK traffic on 2015-06-03: click here for the pcap file.


Shown above: Fiesta EK traffic on Wednesday 2015-06-03.

Magnitude EK

Magnitude EK often sends several payloads, sometimes 6 or more.  It's a very noisy exploit kit.  I'll often see CryptoWall 3.0 as one of the payloads.  In the example for this diary, Magnitude only sent one payload, and that was CryptoWall 3.0.  I've usually seen Magnitude EK send the malware payloads unencrypted, at least when using IE 8 as a web browser in the vulnerable host.  I don't see Magnitude now as much as I did last year.

  • An example of Magnitude EK traffic on 2015-06-03: click here for the pcap file.


Shown above: Magnitude EK traffic and post-infection activity on Wednesday 2015-06-03.

Neutrino EK

In 2014, this exploit kit disappeared for about six months then came back in a much different form [5].  Traffic patterns have remained relatively unchanged since it reappeared in late 2014.  Neutrino EK uses a more sophisticated style of encryption when sending the malware payload (not merely a straight-forward XOR using an ASCII string).

Neutrino's current URL patterns remind people of Sweet Orange EK; however, Sweet Orange seems to have disappeared from the scene back in February of 2015.  I haven't found any Sweet Orange after February, but I've seen plenty of Neutrino since then.  If you see recent traffic you think is Sweet Orange, double check it.  It's probably Neutrino EK.

Neutrino has been relatively consistent over the past few months.  Haven't seen a lot of it, but it's never gone away.

  • An example of Neutrino EK traffic on 2015-06-03: click here for the pcap file.


Shown above: Neutrino EK traffic on Wednesday 2015-06-03.

Nuclear EK

Last year, this exploit kit seemed much more common than it is today.  Operation Windigo still uses Nuclear EK [6], but in recent weeks, I've rarely seen Nuclear outside of that.  Nuclear EK obfuscates its payload by XOR-ing it with an ASCII string.

  • An example of Nuclear EK traffic on 2015-06-03: click here for the pcap file.


Shown above: Nuclear EK traffic and post-infection activity associated with Operation Windigo on Wednesday 2015-06-03.

Rig EK

When Rig first appeared in 2014, it looked remarkably similar to Infinity EK [7] (which was first identified as Goon EK).  Rig EK apparently borrowed a great deal from Infinity.  While I haven't seen Infinity this year, I've definitely run across Rig every once in a while.

In April 2015, Rig EK changed the encryption it uses for sending the malware payload.  Now, it uses the same method as Nuclear EK, obfuscating its payload by XOR-ing it with an ASCII string [8].

  • An example of Rig EK traffic on 2015-06-03: click here for the pcap file.


Shown above: Rig EK traffic on Wednesday 2015-06-03.

Final words

As mentioned earlier, this is merely one person's view into the current state of exploit kits.  It's not comprehensive, and there are other exploit kits I don't have visibility on.  Here's a list of pcap files from the previous paragraphs:

I've also collected the exploits and malware payloads where I could.  A zip file with this collection is available at:

The zip file is password-protected with the standard password.  If you don't know it, email admin@malware-traffic-analysis.net and ask.

---
Brad Duncan
ISC Handler and Security Researcher at Rackspace
Blog: www.malware-traffic-analysis.net - Twitter: @malware_traffic

References:

[1] http://malware.dontneedcoffee.com/2014/08/angler-ek-now-capable-of-fileless.html
[2] https://isc.sans.edu/diary/Angler+exploit+kit+pushes+new+variant+of+ransomware/19681
[3] https://isc.sans.edu/diary/Angler+exploit+kit+pushing+CryptoWall+30/19737
[4] https://isc.sans.edu/diary/Actor+using+Fiesta+exploit+kit/19631
[5] https://isc.sans.edu/diary/Exploit+Kit+Evolution+Neutrino/19283
[6] http://www.rackspace.com/blog/in-2015-operation-windigo-is-still-going-strong/
[7] http://www.kahusecurity.com/2014/rig-exploit-pack/
[8] http://malware-traffic-analysis.net/2015/05/06/index2.html

Keywords:
5 comment(s)

Comments

Hashes of files injected by Angler

2998db1cbdb8b377413df5ea354b38b98d3cf05f
452b301f6797bf4854dd501bec0def895735d2bf
Thanks! SHA1 hash 2998db1cbdb8b377413df5ea354b38b98d3cf05f looks like Bedep. Always interesting to see no detection rates on Virus Total for malware like 452b301f6797bf4854dd501bec0def895735d2bf
After checking magnitude a few times, I found that magnitude is not using the latest flash vulnerability like other EK. There is a subtle difference, I didn't see a flash file involving in magntidue EK. I don't know about Nuclear EK or Rig EK, are this two leveraging the flash vulnerability? Just after you came across angler dropping cryptowall, I came across the same malware trying to spread via email campaign, which is probably the first time they did this; I think the lack for update for magnitude EK is the reason why it is driving the Cryptowall malware authors to move on to other means to deliver the malware.

https://techhelplist.com/index.php/spam-list/834-you-have-a-new-encrypted-message-from-jpmorgan-chase-co-malware
Mostropi, I don't know about the latest Flash vulnerability. I have a very old version of Flash player running on the vulnerable hosts, so they might not be hit with the latest version. That Magnitude EK pcap from the diary did have a Flash exploit, though (an extracted sample is in the zip archive).

We also saw another malicious spam campaign pushing CryptoWall 3.0 today, which I've documented at: http://malware-traffic-analysis.net/2015/06/04/index.html
You are right there is a shockwave file in the pcap. I had must have confused myself with magnitude EK pcap and some other pcap. Great information sharing.

Diary Archives