There’s an excellent write up by Brad Duncan in the Internet Storm Center’s Handler Diaries on analyzing a compromise that used the Angler Exploit Kit to deliver TeslaCrypt.
From the article:
On Wednesday 2016-02-17 at approximately 18:14 UTC, I got a full chain of events.
The chain started with a compromised website that generated an admedia gate.
The gate led to Angler EK.
Finally, Angler EK delivered TeslaCrypt, and we saw some callback traffic from the malware.
· 184.108.40.206 – img.belayamorda.info – admedia gate
· 220.127.116.11 – ssd.summerspellman.com – Angler EK
· 18.104.22.168 – clothdiapersexpert.com – TeslaCrypt callback traffic
Full write up is here.
This is a Security Bloggers Network syndicated blog post authored by JeffSoh. Read the original post at: JeffSoh on NetSec