Advertisement
Set_Abominae

Changes in Neutrino EK

Nov 1st, 2013
196
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.25 KB | None | 0 0
  1. @Set_Abominae
  2. Changes in URLs related to Neutrino Exploit kit, first observed 2013.11.01
  3. --------------------------------------------------------------------------
  4. Previously Neutrino EK used a predefined char in the different stages of an exploit, now it seems to be more random / changing more often (every hour?)
  5.  
  6. Before:
  7. Landing <domain>:8000/o...
  8. Profile POST <domain>:8000/y... /i...
  9. Java exploit <domain>:8000/b...
  10. Payload: <domain>:8000/v...
  11.  
  12. Some observed Landing urls today:
  13. maeba9g.wildwebsites.org:8000/krnqewdi?hkmmxcb=4038276
  14. iqu6bee.wildwebsites.org:8000/hdxvxhipon?iqmfpos=1307818 
  15. ume6chi.wildwebsites.org:8000/fsbnlwbt?hylyxdmvnon=1256450
  16. dai8oot.wildwebsites.org:8000/hkihltgynxhijx?ijrqqp=3251988
  17. eanga2g.wildwebsites.org:8000/awfdheoun?yuoophru=1307818
  18. vie2che.wildwebsites.org:8000/dumumby?sycriqepetq=1307818
  19.  
  20. Example of an exploit chain:
  21. Landing: http://iqu6bee.wildwebsites.org:8000/hdxvxhipon?iqmfpos=1307818 
  22. Profile POST http://iqu6bee.wildwebsites.org:8000/sqkxzhlejv and http://iqu6bee.wildwebsites.org:8000/bixoeckkuk 
  23. Java exploit: http://iqu6bee.wildwebsites.org:8000/yqmhl?ahloua=iemzwmkotwc 
  24. Payload: http://iqu6bee.wildwebsites.org:8000/txwqhmqapojo?alkacbmwb=iemzwmkotwc
  25.  
  26. Got more info? Please DM me on Twitter.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement