# 2014-11-16

What is the IP address of the Windows VM that gets infected?

Answer: 172.16.165.165

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FWiBT6zMUac3OiMCQG5h8%2Fimage.png?alt=media&#x26;token=8f9b57e1-2d08-4117-95eb-81b255eb03ba" alt=""><figcaption></figcaption></figure></div>

What is the host name of the Windows VM that gets infected?

Answer: K34EN6W3N-PC<00>

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2Fjc5IAiVoSnn8P11vvnWT%2Fimage.png?alt=media&#x26;token=fd4f1142-d4d9-43ca-8ae1-f1043b571b8d" alt=""><figcaption></figcaption></figure></div>

What is the MAC address of the infected VM?

Answer: f0:19:af:02:9b:f1

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FRVOouEWD8FHmomnHR7Ea%2Fimage.png?alt=media&#x26;token=817fc883-1c73-4a24-8444-a614afe71780" alt=""><figcaption></figcaption></figure></div>

What is the IP address of the compromised web site?

Answer:

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FwCOz8P3BxxMhHVyQ6CwC%2Fimage.png?alt=media&#x26;token=475b83e9-c1d1-4ae5-b4cd-083595ff9876" alt=""><figcaption></figcaption></figure></div>

What is the domain name of the compromised web site?

Answer:

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FgVY95ZbDrX7n1AFSzveo%2Fimage.png?alt=media&#x26;token=88005617-91bd-459e-8bac-913ccb13b578" alt=""><figcaption></figcaption></figure></div>

What is the IP address and domain name that delivered the exploit kit and malware?

Answer:

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FW0IC1vzGFSBKEUu2tacL%2Fimage.png?alt=media&#x26;token=f205d007-0fe9-428c-8e68-46c5fc728366" alt=""><figcaption></figcaption></figure></div>

What is the domain name that delivered the exploit kit and malware?

Answer:

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FLUx6SYVvGv1bDzCwZJgY%2Fimage.png?alt=media&#x26;token=4d0f4717-e3cb-4c56-99da-6457edc83ec1" alt=""><figcaption></figcaption></figure></div>

What is the redirect URL that points to the exploit kit (EK) landing page?

Answer:

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2F0sXH15SRz3DxhZLudAjN%2Fimage.png?alt=media&#x26;token=c4209349-7ac6-4423-8be4-7c114621e125" alt=""><figcaption></figcaption></figure></div>

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FUVhrsaEw2bwopxY4f0sj%2Fimage.png?alt=media&#x26;token=4f938649-99a7-4677-a3a9-5e5cfe9e1430" alt=""><figcaption></figcaption></figure></div>

Besides the landing page (which contains the CVE-2013-2551 IE exploit), what other exploit(s) sent by the EK?

Answer:

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2F5vSefptVku6iUkLtwueF%2Fimage.png?alt=media&#x26;token=9cc2a337-5dc1-41c4-bfb7-5c138123ae3b" alt=""><figcaption></figcaption></figure></div>

How many times was the payload delivered?

Answer:

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FCgSe3SY89uKGdYNd3IrG%2Fimage.png?alt=media&#x26;token=24b85b9b-9843-40c2-b4ae-8f1375b98083" alt=""><figcaption></figcaption></figure></div>

Submit the pcap to VirusTotal and find out what snort alerts triggered. What are the EK names are shown in the Suricata alerts?

Answer:

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2F5QmvxVJrO1X0hEbZF0Xd%2Fimage.png?alt=media&#x26;token=5546ebc6-b8d1-44fb-902b-9762baeb8972" alt=""><figcaption></figcaption></figure></div>

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2Ft3lRuppPqJjbs3XFo75S%2Fimage.png?alt=media&#x26;token=2aa69424-e52c-44aa-ae27-091c13d83b18" alt=""><figcaption></figcaption></figure></div>

Checking my website, what have I (and others) been calling this exploit kit?

Answer:

What file or page from the compromised website has the malicious script with the URL for the redirect?

Answer:

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2F9dnYDPDJkvVoGNUW1Qvn%2Fimage.png?alt=media&#x26;token=3b47fcfc-4daa-4165-a509-1debd175531a" alt=""><figcaption></figcaption></figure></div>

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FD62ig1C5DMEqnJSGobnC%2Fimage.png?alt=media&#x26;token=f90172e6-a9e2-46ef-bf8b-42076d7e45e8" alt=""><figcaption></figcaption></figure></div>

Extract the exploit file(s). What is(are) the md5 file hash(es)?

Answer:

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FtuW0TBFLTu0iR24Q8hsZ%2Fimage.png?alt=media&#x26;token=e08d2037-136a-42fa-805d-38a402891a34" alt=""><figcaption></figcaption></figure></div>

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FP9RDg447snxqRUk3T75o%2Fimage.png?alt=media&#x26;token=de31676c-9adb-49ad-8c4f-b1a909f0ecfa" alt=""><figcaption></figcaption></figure></div>

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2FHLevkAxQj1jqdKjmfWdx%2Fimage.png?alt=media&#x26;token=6faa8e1d-fcd1-4bbc-928a-09d312a35266" alt=""><figcaption></figcaption></figure></div>

<div align="left"><figure><img src="https://175589723-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGKnrvJSGeWbW7GGTr6Dv%2Fuploads%2Fqnol6Zij8YOUaQVVo8P8%2Fimage.png?alt=media&#x26;token=3b9f1727-336b-4ec4-968f-ea0c535794c8" alt=""><figcaption></figcaption></figure></div>
