{"id":10622,"date":"2017-11-27T13:10:10","date_gmt":"2017-11-27T21:10:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/27\/news-4394\/"},"modified":"2017-11-27T13:10:10","modified_gmt":"2017-11-27T21:10:10","slug":"news-4394","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/27\/news-4394\/","title":{"rendered":"Terror exploit kit goes HTTPS all the way"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Mon, 27 Nov 2017 20:00:34 +0000<\/strong><\/p>\n<p>We&#8217;ve been following the Terror exploit kit during the past few months and observed notable changes in both its redirection mechanism and infrastructure, which have made capturing it in the wild a more challenging task.<\/p>\n<p>Unlike the RIG exploit kit, which uses predictable URI patterns and distribution channels, Terror EK is constantly attempting to evade detection by using malvertising chains without any static upper referrers (at least to our knowledge) combined with multi-step filtering in some cases, as well as HTTPS throughout the delivery sequence.<\/p>\n<h3>Traffic redirection<\/h3>\n<p>We&#8217;ve noticed consistent malvertising incidents via the Propeller Ads Media ad network, followed by the advertiser&#8217;s campaign, which we were able to recognize through URI patterns and other identifying creative choices. Ultimately, the ad redirected to the exploit kit&#8217;s first check-in page, which acts as both a decoy and launchpad.<\/p>\n<p>Over time, the threat actors behind Terror have been trying to hide the call to the exploit kit. In one example, they created\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/iframe_redir_long_subdomain.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-0\" title=\"\">overly long URLs and using obfuscation<\/a> to mask their iframe. Interestingly, in other sequences, we witnessed an additional type of filtering that uses unique subdomains. The user is first taken to a page whose current theme is cheap flights and hotels, containing what looks like an affiliate link to the travel site\u00a0<em>expedia.com<\/em>:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/redirection_chain.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20630 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/redirection_chain.png\" alt=\"\" width=\"743\" height=\"534\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/redirection_chain.png 743w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/redirection_chain-300x216.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/redirection_chain-600x431.png 600w\" sizes=\"auto, (max-width: 743px) 100vw, 743px\" \/><\/a><\/p>\n<p>But the main point of focus here is the additional invisible iframe, created with a unique 15-digit subdomain and refreshed for each new visit:<\/p>\n<pre>580773189093524.mistake-hexagon.science\/haxit.php  319561824482067.mistake-hexagon.science\/haxit.php  239878215504660.mistake-hexagon.science\/haxit.php  828990124673515.mistake-hexagon.science\/haxit.php  ...<\/pre>\n<p>This iframe is what creates the final call to the exploit kit landing page. We believe this setup may be to prevent replays that attempt to step over the normal redirection flow, although it was only used for a short period of time.<\/p>\n<h3>HTTPS all the things<\/h3>\n<p>In late August 2017, we saw Terror EK <a href=\"http:\/\/www.malware-traffic-analysis.net\/2017\/08\/29\/index.html\" target=\"_blank\" rel=\"noopener\">make an attempt at HTTPS<\/a> by using free SSL certificates, although it kept switching back and forth between HTTP and HTTPS. At times, there also seemed to be problems with domains that had the wrong certificate:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20649\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/cert_error.png\" alt=\"\" width=\"435\" height=\"190\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/cert_error.png 435w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/cert_error-300x131.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/cert_error-195x85.png 195w\" sizes=\"auto, (max-width: 435px) 100vw, 435px\" \/><\/p>\n<p>However, in recent days we&#8217;ve observed a constant use of SSL, not only for the exploit kit itself but also at the upper redirection stage.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/certificate.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20648\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/certificate.png\" alt=\"\" width=\"554\" height=\"264\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/certificate.png 554w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/certificate-300x143.png 300w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/a><\/p>\n<p>This is what the traffic looks like using a <a href=\"https:\/\/github.com\/malwareinfosec\/EKFiddle\" target=\"_blank\" rel=\"noopener\">customized version<\/a> of the <a href=\"https:\/\/www.telerik.com\/fiddler\" target=\"_blank\" rel=\"noopener\">Fiddler web debugger<\/a> set up as a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Man-in-the-middle_attack\" target=\"_blank\" rel=\"noopener\">man-in-the-middle<\/a> proxy:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/traffic_view.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20631 alignnone\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/traffic_view.png\" alt=\"\" width=\"782\" height=\"225\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/traffic_view.png 782w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/traffic_view-300x86.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/traffic_view-600x173.png 600w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/a><\/p>\n<p>Without using a MITM proxy, network administrators will see the SSL handshake with the corresponding server&#8217;s IP address, but not the full URIs or content being sent:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/traff_wireshark_sguill.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20632 alignnone\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/traff_wireshark_sguill.png\" alt=\"\" width=\"677\" height=\"192\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/traff_wireshark_sguill.png 677w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/traff_wireshark_sguill-300x85.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/traff_wireshark_sguill-600x170.png 600w\" sizes=\"auto, (max-width: 677px) 100vw, 677px\" \/><\/a><\/p>\n<p>Terror EK is one of few exploit kits to have used SSL encryption this year, the other well-documented one being <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/adgholas-malvertising-thrives-shadows-ransomware-outbreaks\/\" target=\"_blank\" rel=\"noopener\">Astrum EK, used in large malvertising attacks<\/a> via the AdGholas group. Also, unlike RIG EK, which appears to have permanently switched to IP literal URIs after <a href=\"https:\/\/www.rsa.com\/en-us\/blog\/2017-06\/shadowfall\" target=\"_blank\" rel=\"noopener\">operation ShadowFall<\/a>, Terror is making full use of domains using new\/abused\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Top-level_domain\" target=\"_blank\" rel=\"noopener\">TLDs<\/a>.<\/p>\n<p>As usual, Terror EK is dropping <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/08\/smoke-loader-downloader-with-a-smokescreen-still-alive\/\" target=\"_blank\" rel=\"noopener\">Smoke Loader,<\/a>\u00a0which in turn downloads several more payloads, likely to generate a lot of noise on the network:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20635 alignnone\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/post_smokeloader.png\" alt=\"\" width=\"479\" height=\"98\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/post_smokeloader.png 479w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/post_smokeloader-300x61.png 300w\" sizes=\"auto, (max-width: 479px) 100vw, 479px\" \/><\/p>\n<h3>Conclusion<\/h3>\n<p>Despite no significant advancement with more powerful vulnerabilities being integrated, exploit kit authors are nonetheless still leveraging malvertising as their primary distribution method and attempting to evade detection from the security community, which they monitor closely.<\/p>\n<p>In light of these new challenges, security defenders must also understand the malicious techniques that are used by threat actors in order to adapt their tools and procedures and keep tracking the new campaigns taking place.<\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Terror EK-related IP addresses and domains:<\/p>\n<pre>188.226.179.53  188.226.180.230  188.226.180.241    yakset.accountant  dimplethan.stream  edgeelse.science<\/pre>\n<p>SSL certificates:<\/p>\n<pre>CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US    [Serial Numbers]  03C5BC64ED4CB1331212750F0ECBF7D2EB4E  0337D982AFCC25063A91502A482AAB39A559    [Thumbprints]  73FDC41268FC8B53D37D66BF63FDF71FDF111803  60ADD6955D23029A571BE7F0079C941631CAD32F<\/pre>\n<p>Payloads:<\/p>\n<p>Smoke Loader<\/p>\n<pre>7bdf05e4c3bda569d1c79b6de9e1c4d44733fbceec1f066dcbd713daa196b519<\/pre>\n<p>Other drops:<\/p>\n<pre>3579870858e68d317bb907b6362d956a80f3973c823021d452a077fd90719cdf  99d6c4830605ed61e444c002193da4efe3bc7d015ad230624a2c9aae81982740  a8a8b5ed76019c17add5101b157ab9c288a709a323d8c12dbae934c7ec6e1d14<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/terror-exploit-kit-goes-https-all-the-way\/\">Terror exploit kit goes HTTPS all the way<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/terror-exploit-kit-goes-https-all-the-way\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Mon, 27 Nov 2017 20:00:34 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/terror-exploit-kit-goes-https-all-the-way\/' title='Terror exploit kit goes HTTPS all the way'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/banner.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A look at some techniques used by the Terror exploit kit to evade traffic-based detection.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kits\/\" rel=\"tag\">exploit kits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/propeller-ads-media\/\" rel=\"tag\">Propeller Ads Media<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/smoke-loader\/\" rel=\"tag\">smoke loader<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/terror-ek\/\" rel=\"tag\">Terror EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/terror-exploit-kit\/\" rel=\"tag\">Terror exploit kit<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/terror-exploit-kit-goes-https-all-the-way\/' title='Terror exploit kit goes HTTPS all the way'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/terror-exploit-kit-goes-https-all-the-way\/\">Terror exploit kit goes HTTPS all the way<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10528,10987,10531,16767,16768,11945,16769,10494],"class_list":["post-10622","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exploit-kits","tag-exploits","tag-malvertising","tag-propeller-ads-media","tag-smoke-loader","tag-terror-ek","tag-terror-exploit-kit","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10622"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10622\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10622"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}