Malware-Traffic-Analysis.net - 2017-01-17 - EITest Rig-V from 92.53.127[.]86 sends Spora ransomware Archived: 2026-04-05 14:06:31 UTC NOTICE: The zip archives on this page have been updated, and they now use the new password scheme.  For the new password, see the "about" page of this website. ASSOCIATED FILES: 2017-01-17-EITest-Rig-V-sends-Spora-ransomware.pcap.zip   293.9 kB (293,923 bytes) 2017-01-17-EITest-Rig-V-sends-Spora-ransomware.pcap   (341,571 bytes) 2017-01-17-EITest-Rig-V-artifacts-and-Spora-ransomware.zip   169.5 kB (169,513 bytes) 2017-01-17-EITest-Rig-V-flash-exploit.swf   (37,436 bytes) 2017-01-17-EITest-Rig-V-landing-page.txt   (5,198 bytes) 2017-01-17-EITest-Rig-V-payload-Spora-ransomware-radFCDCC.tmp.exe   (114,688 bytes) 2017-01-17-Spora-ransomware-US20D-ABCDE-ABCDE-ABCDE.HTML   (14,402 bytes) 2017-01-17-Spora-ransomware-payment-page.html   (89,552 bytes) 2017-01-17-page-from-naturalhealthonline_com-with-injected-EITest-script.txt   (37,961 bytes) BACKGROUND ON RIG EXPLOIT KIT: Rig-V is what security researchers called Rig EK version 4 when it was only accessible by "VIP" customers, while the old version (Rig 3) was still in use. I currently call it "Rig-V" out of habit.  You can probably just call it Rig EK now. Before 2017, I used to see Empire Pack (Rig-E) which is a variant of Rig EK with older-style URLs as described by Kafeine here. I haven't seen anything other than Rig-V (Rig 4.0) when looking at Rig EK-based campaigns so far in 2017. BACKGROUND ON THE EITEST CAMPAIGN: My most recent write-up on the EITest campaign can be found here. BACKGROUND ON SPORA RANSOMWARE: Spora ransomware was first spotted last week and reported on 2017-01-10 at BleepingComputer (link) and other sites quickly picked up on the news. Apparently, it was being spread through malicious spam (malspam) last week. Now it's also being spread through Rig Exploit Kit by the EITest campaign. http://malware-traffic-analysis.net/2017/01/17/index2.html Page 1 of 7 Of note, there is no callback traffic by the Spora ransomware. The only post-infection I saw was HTTPS traffic to spora[.]bz when I followed the link from the decryption instructions. Shown above:  Flowchart for this infection traffic. TRAFFIC Shown above:  Injected script from the EITest campaign from the compromised site. http://malware-traffic-analysis.net/2017/01/17/index2.html Page 2 of 7 Shown above:  Pcap of the infection traffic filtered in Wireshark. ASSOCIATED DOMAINS: naturalhealthonline[.]com - Compromised site 92.53.127[.]86 port 80 - zome.aplusengineering-gr[.]com - Rig-V 186.2.161[.]51 port 443 - spora[.]bz - HTTPS/SSL/TLS traffic when I checked the Spora ransomware decryption instructions FILE HASHES FLASH EXPLOIT: SHA256 hash:  7ef95283a46424a4c8db0d00601f8369831c29d748c6d4dccbf6620dd7558c1c   (37,436 bytes) File description:  Rig-V Flash exploit seen on 2017-01-17 PAYLOAD (SPORA RANSOMWARE): SHA256 hash:  2637247ad66e6e57a68093528bb137c959cdbb438764318f09326fc8a79bdaaf   (114,688 bytes) File path example:  C:\Users\[username]\AppData\Local\Temp\radFCDCC.tmp.exe IMAGES http://malware-traffic-analysis.net/2017/01/17/index2.html Page 3 of 7 Shown above:  Desktop of the infected Windows host. http://malware-traffic-analysis.net/2017/01/17/index2.html Page 4 of 7 Shown above:  Full view of the decryption instructions. http://malware-traffic-analysis.net/2017/01/17/index2.html Page 5 of 7 Shown above:  Going to the link from the decyrption instructions. http://malware-traffic-analysis.net/2017/01/17/index2.html Page 6 of 7 Shown above:  The key that was dropped to the desktop along with the decryption instructions. Click here to return to the main page. Source: http://malware-traffic-analysis.net/2017/01/17/index2.html http://malware-traffic-analysis.net/2017/01/17/index2.html Page 7 of 7