Last Updated: 2015-05-04 03:40:34 UTC
by Brad Duncan (Version: 1)
A few hours ago, Jerome Segura, Senior Security Researcher at Malwarebytes, tweeted about a change in traffic patterns from Fiesta exploit kit (EK) .
What had been semi-colons in the URLs from Fiesta EK are now commas. Here's what we saw from my previous diary on Fiesta EK last week :
Here's what I saw from infecting a host with Fiesta EK a short while ago:
Any signatures for detecting Fiesta EK that depend on those semi-colons will need to be updated.
A pcap of the traffic is available at http://malware-traffic-analysis.net/2015/05/04/2015-05-04-Fiesta-EK-traffic.pcap, and a zip file of the associated malware is at http://malware-traffic-analysis.net/2015/05/04/2015-05-04-Fiesta-EK-malware.zip
The ZIP file is password-protected with the standard password. If you don't know it, email firstname.lastname@example.org and ask.
I checked out the payload from this infection, and it has a digital signature spoofing Microsoft.
Didn't get any traffic out of the malware payload from publicly-available malware analysis tools:
- https://www.hybrid-analysis.com/sample/67a3a6a3924e7e013b888350e1ff106faf665ccd191d21cb6b19b235e83d2aa5?environmentId=1 (Win 7 32-bit)
- https://www.hybrid-analysis.com/sample/67a3a6a3924e7e013b888350e1ff106faf665ccd191d21cb6b19b235e83d2aa5?environmentId=2 (Win 7 64-bit)
While generating traffic for my previous diary on Fiesta EK, I saw 3 different payloads within a 2 hour period. Every once in a while, I've seen digital signatures from Fiesta EK malware payloads, but I'm not sure what this particular payload is. Haven't really had time to analyze it. If anyone does have time, please leave a comment.
If you have more information or corrections regarding our diary, please share.