Neutrino Exploit Kit from EITEST Gate 188.8.131.52 sends CryptXXX Ransomware
ASSOCIATED DOMAINS AND IP ADDRESSES:
- 184.108.40.206 – milez.tk – EITEST GATE
- 220.127.116.11 – umfragefsymfunny.bettercarlighting.com – Neutrino EK LANDING PAGE
- 18.104.22.168 – CryptXXX Command and Control [C2]
I have added a zipped pcap file for your analysis. The password is the usual used by malware researchers. If you do not know it please email me.
PCAP file of the infection traffic:
DETAILS OF INFECTION CHAIN:
Shown above: Using Wiresharks Follow TCP Stream filter on Neutrino landing page shows malicious payload delivery via an application/octet-stream. Shown is the partial encrypted payload. If this was a true application/octet-stream the first two characters would have been “MZ” unless using HTTP compression.
MALICIOUS PAYLOAD ASSOCIATED WITH NEUTRINO EXPLOIT: