There’s an excellent write up by Brad Duncan in the Internet Storm Center’s Handler Diaries on analyzing a compromise that used the Angler Exploit Kit to deliver TeslaCrypt.
From the article:
On Wednesday 2016-02-17 at approximately 18:14 UTC, I got a full chain of events.
The chain started with a compromised website that generated an admedia gate.
The gate led to Angler EK.
Finally, Angler EK delivered TeslaCrypt, and we saw some callback traffic from the malware.
· 18.104.22.168 – img.belayamorda.info – admedia gate
· 22.214.171.124 – ssd.summerspellman.com – Angler EK
· 126.96.36.199 – clothdiapersexpert.com – TeslaCrypt callback traffic
Full write up is here.
This is a Security Bloggers Network syndicated blog post authored by JeffSoh. Read the original post at: JeffSoh on NetSec