CryptoShield Ransomware from Rig EK, (Thu, Feb 9th)

Introduction

At the end of January 2017, BleepingComputer published a report about an updated variant of CryptoMix (CryptFile2) ransomware calling itself CryptoShield [1]. It was first discovered by Proofpoint security researcher Kafeine. At that time, CryptoShield was distributed by the EITest campaign using Rig exploit kit (EK).

Since then, other researchers continued seeing CryptoShield from EITest Rig EK. Ive already documented this Rig EK/CryptoShield combo twice [2, 3], and it shows no signs of stopping.

With that in mind, lets look at a recent infection generated on Wednesday, 2017-02-08.

Traffic

As I border-width:2px” />
Shown above: Flow chart for this infection traffic.

I tried the site and saw injected EITest script leading to a Rig EK landing page. border-width:2px” />
Shown above: border-width:2px” />
Shown above: border-width:2px” />
Shown above: border-width:2px” />
Shown above: Pcap of traffic from the second infection filtered in Wireshark.

Shortly after viewing the site, the Windows host was infected. I first saw an application error, then received a User Account Control (UAC) notification. After clicking through those two popup notifications, the host was fully infected. The infected Windows host then showed indicators of CryptoShield. border-width:2px” />
Shown above: border-width:2px” />
Shown above: border-width:2px” />
Shown above: Screenshot of the infected Windows host.

Malware

CryptoShield uses .CRYPTOSHIELD as the suffix for any files it encrypts. Based on the HTML file, the sample I saw (the same sample during both infections) was version 1.1 of the ransomware. border-width:2px” />
Shown above: border-width:2px” />
Shown above: border-width:2px” />
Shown above: Windows Registry update and file location for the ransomware.

Indicators of compromise (IOCs)

Rig EK IP address and domains:

  • 194.87.93.53 port 80 – need.southpadreforsale.com
  • 194.87.93.53 port 80 – star.southpadrefishingguide.com

Post infection traffic from the CryptoShield sample:

  • 45.63.115.214 port 80 – 173.66.46.112 – POST /images/gif_png/gif.php

File information for the Rig EK Flash exploit:

File information for the Rig EK payload:

Final words

Thanks to the people on Twitter who tweet information about compromised websites leading to Rig EK. Without help from the community, this type of traffic would be much harder to obtain.

Rig EK has been around for a while. I wrote a diary about Rig EK back in April 2015, and Rig EK was active well before then. As always, if you follow best security practices (keep your Windows computer up-to-date and patched), your risk of infection is minimal. Unfortunately, not enough people follow best practices, so it apparently remains profitable for criminals to continue using Rig EK as a method of malware distribution.

For now, CryptoShield ransomware from Rig EK remains a continuing presence in our threat landscape.

Pcaps, malware, and artifacts for this diary are available here.


Brad Duncan
brad [at] malware-traffic-analysis.net

References:

[1] https://www.bleepingcomputer.com/news/security/cryptomix-variant-named-cryptoshield-1-0-ransomware-distributed-by-exploit-kits/
[2] http://www.malware-traffic-analysis.net/2017/01/31/index2.html
[3] http://www.malware-traffic-analysis.net/2017/02/06/index.html
[4] http://researchcenter.paloaltonetworks.com/2016/06/unit42-understanding-angler-exploit-kit-part-1-exploit-kit-fundamentals/

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.