Snort mailing list archives
Re: [Emerging-Sigs] Malicious swf sig
From: Will Metcalf <william.metcalf () gmail com>
Date: Wed, 10 Dec 2014 14:58:03 -0600
Will check into those on the ET side. For some reason I think I've seen leading dir sometimes could be wrong though.. Regards, Will On Wed, Dec 10, 2014 at 1:09 PM, James Lay <jlay () slave-tothe-box net> wrote:
On 2014-12-10 11:11 AM, Shefferman, Ian wrote:So far I've seen these Flash files used primarily (and probably solely) to redirect to Angler exploit kit "32x32" gates. A typical chain is as follows: (Source: http://malware-traffic-analysis.net/2014/10/30/index.html) GET kj-invest.com/2de96bd378d6e6614297e27284fdb335.swf POST newfamilynutrition.com/c9e9975e0f51af3ce1354090fb303d8e.php?q= 87086c5336208ce7836edca90ecc8d25 # this POST request is made by the SWF GET qwe.leucaenaleucocephalaporno.net/7xibe37z48 # actual Angler EK GET qwe.leucaenaleucocephalaporno.net/4PJOZWsxU4AMjReTBUSHArovOS32pW Lvpt0cwm0sEion8J7ahaP62dkHtp-auIWi The SWF receives parameters dynamically through HTML param attributes to determine where to redirect. -----Original Message----- From: emerging-sigs-bounces () lists emergingthreats net [mailto:emerging-sigs-bounces () lists emergingthreats net] On Behalf Of James Lay Sent: Wednesday, December 10, 2014 11:27 AM To: Snort-sigs; Emerging Subject: [Emerging-Sigs] Malicious swf sig Didn't see this in current sets, so here goes. Seen this in the wild...attaching as an image for safety. The Shockwave file does a simple URLrequest. Interesting thing to note was the ETag in the response: GET /f4ce3f4ef065f157d07dd20977598b0e.swf HTTP/1.1 Accept: */* Accept-Language: en-US Referer: <redacted>www.futurehopping.com / self-sustaining-greenhouse/ x-flash-version: 14,0,0,176 User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Host: 2dollarpeepshow.com Cache-Control: max-stale=0 Connection: Keep-Alive Pragma: no-cache HTTP/1.1 200 OK Date: Tue, 09 Dec 2014 23:55:31 GMT Server: Apache/2.2.15 (CentOS) Last-Modified: Tue, 02 Dec 2014 15:35:51 GMT ETag: "2f184b-3bc-5093d7b5e83c0" Accept-Ranges: bytes Content-Length: 956 Connection: close Content-Type: application/x-shockwave-flash Not sure if this is isolated, or an infection of some sort....the iframe parameter might be able to be sig'd up as well: <redacted>iframe name="37BF769D6F28F3EA27520E9EC44C0644" id="37BF769D6F28F3EA27520E9EC44C0644" style="position:absolute;top:5000px;left:5000px;width: 300px;height:300px;"></iframe<redacted> Anyway sig here: alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER Malicious Shockwave redirect script"; content:"|2e|swf"; fast_pattern:only; pcre:"/[0-9a-z]{16}\.swf/"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, service http; reference: url,www.virustotal.com/en/file/f4e0c392b0249bd307b818cffa8a5b 8ee5259a44fa0405f445e279da7e1206e6/analysis/1418224977;" classtype:trojan-activity; sid:10000147; rev:1;) All the previous names are 16 characters (thanks VT) so that's what I'm matching on..might help out someone somewhere...thoughts and fixes are welcome..thanks all. JamesOk..this one should be a little better..clearly I'm not good at making sigs ;) : alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER Angler Landing Gate"; content:"|2e|swf"; fast_pattern:only; pcre:"/GET |2f|[0-9a-z]{16}\.swf/"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, service http; reference: url, www.virustotal.com/en/file/f4e0c392b0249bd307b818cffa8a5b 8ee5259a44fa0405f445e279da7e1206e6/analysis/1418224977; classtype:trojan-activity; sid:10000147; rev:3;) James _______________________________________________ Emerging-sigs mailing list Emerging-sigs () lists emergingthreats net https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs Support Emerging Threats! Subscribe to Emerging Threats Pro http://www.emergingthreats.net
------------------------------------------------------------------------------ Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server from Actuate! Instantly Supercharge Your Business Reports and Dashboards with Interactivity, Sharing, Native Excel Exports, App Integration & more Get technology previously reserved for billion-dollar corporations, FREE http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk
_______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- Malicious swf sig James Lay (Dec 10)
- Message not available
- Re: [Emerging-Sigs] Malicious swf sig James Lay (Dec 10)
- Message not available
- Message not available
- Re: [Emerging-Sigs] Malicious swf sig James Lay (Dec 10)
- Re: [Emerging-Sigs] Malicious swf sig Will Metcalf (Dec 10)
- Re: [Emerging-Sigs] Malicious swf sig James Lay (Dec 10)
- Re: [Emerging-Sigs] Malicious swf sig James Lay (Dec 10)