Quantcast
Channel: Malware don't need Coffee
Viewing all articles
Browse latest Browse all 185

0 day 1.7u10 (CVE-2013-0422) spotted in the Wild - Disable Java Plugin NOW !

$
0
0
Was wondering what to do with that...
Disclose, do not Disclose.

Hundreds of thousands of hits daily where i found it. This could be a cause mayhem.
I think it's better to make some noise about it.

Standard PE download via CVE-2013-0422 with
jre1.7u10  - Firefox Windows XP

Standard PE download via CVE-2013-0422 with
jre1.7u9  -  Internet Explorer 9 Windows 7x64


<edit1 10/01/13 14:24 GMT+1>
Reading this, Zero-Day Java Exploit Debuts in Crimeware by Brian Krebs
I think there is no reason anymore to try to hide anything. Let's Disclose.

Cool EK :


CBeplay.P Cool EK Landing 10/01/13


0 day in Cool EK Cbeplay.P Spain Landing

GET http://geurtdenhaupdad.bounceme .net/read/offer-canvas.jsp
200 OK (text/html)

GET http://geurtdenhaupdad.bounceme .net/read/UTTER-OFFEND.JAR
200 OK (application/java-archive)  ee4930874422c818267b44112ac8f29b

GET http://geurtdenhaupdad.bounceme .net/read/UTTER-OFFEND.exe
200 OK (application/x-msdownload)  237f8ffc0c24191c5bb7bd9099802ee4  CBeplay.P Ransomware - ES (out of scope)



The payload : CBeplay.P - Localized for Spain
With Another landing (dig for :  Reflect.Ditch.shtml ) : out of scope CBeplay.P UK 8f8e84c1d982c53a6a171c9be55097b9

The payload : CBeplay.P - Localized for UK


If you are interested by this Specific Threat (CBeplay.P), feel free to drop a mail.



0 day in Cool EK Reveton


GET http://50ee59e132505.painfree123 .com/news/COSTLY-PROCURE.PHTML
200 OK (text/html)

GET http://50ee59e132505.painfree123 .com/news/contempt.eot <- CVE-2011-3042 failed (IE9) attempt (duqu like font drop)
200 OK (text/html)

GET http://50ee59e132505.painfree123 .com/news/Edit.jar ee4930874422c818267b44112ac8f29b
200 OK (application/java-archive)

GET http://50ee59e132505.painfree123 .com/news/Edit.exe
200 OK (application/x-msdownload)  0623ce6af469c041c3908f5c64e2cad6 Reveton Ransomware (out of scope)
(More Reveton : d28964c1f895c8edcb613f8b2cb5d051 fdf12efe66d614bfb29c51897a104430 ec7ad2a9c4ccff2630fb00db435a8941 )


Reveton SE "Winter" Landing
More information here


one more Java:
a3608c0086c93eec085f3f078c44fdf3

Useless video showing live infection (working referrer incl.)

Nuclear Pack :



Announcement for Nuclear Pack. 


Redkit :

Redkit featuring what could be the same 0day


GET http://streamwoman .com/mfui.htm
200 OK (text/html)

GET http://streamwoman .com/miqt.htm
200 OK (text/html)

GET http://streamwoman .com/332.jar
404 Not Found (text/html)

GET http://streamwoman .com/887.jar
200 OK (application/java-archive) 7143829b81963bd7c3fad219b595ec4c

GET http://streamwoman .com/41.html
200 OK (application/octet-stream)


Blackhole :




Sinowal Blackhole featuring 0 day




GET http://wymxxnb.compress .to/adfasdfksjdfn/implying-specify-dropping-fundamental.php
200 OK (text/html)

GET http://wymxxnb.compress .to/adfasdfksjdfn/implying-specify-dropping-fundamental.php?cvwms=iyokjb&ssyoa=favubmb
200 OK (application/java-archive) 483b40f21a9e97f0dc6c88a21fddc1ec

GET http://wymxxnb.compress .to/adfasdfksjdfn/implying-specify-dropping-fundamental.php?uf=1j:1l:1o:1l:2v&xe=1f:30:1h:1o:1o:31:1o:1l:2v:1f&p=1f&yt=w&pu=o
200 OK (application/x-msdownload)

Another one :

CVE-2013-0422 in BH EK

GET http://014044130110225951863963ee92258948f1673f95d31ad.jtmtir .eu/sort.php
200 OK (text/html)

GET http://014044130110225951863963ee92258948f1673f95d31ad.jtmtir .eu/info/last/index.php
200 OK (text/html)

GET http://014044130110225951863963ee92258948f1673f95d31ad.jtmtir .eu/info/last/index.php?qtp=mux&aqdyg=knny
200 OK (application/java-archive) 483b40f21a9e97f0dc6c88a21fddc1ec

GET http://014044130110225951863963ee92258948f1673f95d31ad.jtmtir .eu/info/last/index.php?yf=2w:30:1i:31:33&oe=33:1g:2v:32:1o:1h:2v:32:1m:1h&h=1f&fz=p&kq=u
200 OK (application/x-msdownload) dfc4995203b8e7d87df6dfbae1d7774c - Leechole.A - Malwr.com analysis

GET http://014044130110225951863963ee92258948f1673f95d31ad.jtmtir .eu/exit.php?x=31&t=timeout
200 OK (text/html)

GET http://014044130110225951863963ee92258948f1673f95d31ad.jtmtir .eu/exit.php?go=3035
302 Found to http://www.maturepornxxxtube .com/?t=113244,1,206,0



Sakura :



Sakura CVE-2013-0422 Positive Path

GET http://fc70efc87b.tespena.lapy .pl:82/forum/index.php?showtopic=715530
200 OK (text/html)

GET http://fc70efc87b.tespena.lapy .pl:82/forum/dare.php?hsh=tr&key=671bf50c83d3346a782094d74b655140
200 OK (application/pdf)

GET http://fc70efc87b.tespena.lapy .pl:82/forum/dare.php?hsh=6&key=f3a6e4200aeea550e9bbb090ffc13e12
200 OK (application/x-java-archive) 253c57c3f5e2abb23861134a343a7308

GET http://fc70efc87b.tespena.lapy .pl:82/forum/viob.php?cnf=c
200 OK (application/octet-stream) fe1e6410aac2b6af1ab92d1301f0c4ff

<edit n 13/01/13 10:00 GMT+1>
SofosFO:
Seems it has just been integrated. Found many since 2 days, but first one integrating the CVE.
Have been told that it's integrated since at least 2013-01-11
SofosFO - CVE-2013-0422 Positive path

GET http://tropical.finale.ceapy-wirealtyseou .org/dank-cashier.html
200 OK (text/html)

GET http://tropical.finale.ceapy-wirealtyseou .org/psemzhFIKWDhIWDmhwGKhDyFppGwK/QmxmlmQlwUo00/packets.js
200 OK (text/html)

GET http://tropical.finale.ceapy-wirealtyseou .org/7afdfihFIKWDhIWDmhwGKhDyFppGwy/010922216/terrorist.jar
200 OK (application/java-archive)

GET http://tropical.finale.ceapy-wirealtyseou .org/7afdfihFIKWDhIWDmhwGKhDyFppGwy/010922216/terrorist.jar
200 OK (application/java-archive) c1638d5ee237fc3228121b389d1cd3b0

GET http://tropical.finale.ceapy-wirealtyseou .org/7afdfihFIKWDhIWDmhwGKhDyFppGwy/010922216/4393992
200 OK (application/octet-stream)

ProPack Sploit Pack :

Thanks to to @switchingtoguns for that one.

Propack EK CVE-2013-0422 positive Path



GET http://46.30.42 .195/build2/doc/4yioqp.php
200 OK (text/html)

GET http://46.30.42 .195/build2/doc/axhncumubx.php?k=32203313104201
200 OK (application/java-archive)

GET http://46.30.42 .195/build2/doc/gneyipb.php?k=32203313104201
200 OK (application/java-archive)

GET http://46.30.42 .195/build2/doc/jxipmwgoksgu.php?k=32203313104201
200 OK (text/html) - (md5 if i find a way to clean chunked file)

GET http://46.30.42 .195/build2/doc/4mx57e.php?j=1&k=1
200 OK (application/octet-stream) ac91753182db3a9562a27bd78c95972e Zaccess

SofosFO Fiddler File: http://goo.gl/CB5mb
</edit n>


<edit n+2 13/01/13 21:00>
Sweet Orange :


Sweet Orange Positive Path on CVE-2013-0422
and Lucky Locker (aka Lyposit) call Home


GET http://fluorescentgrandfather .info/2008/meta_login/phpmyadmin2/plugins.php?arrowwiki=988&profile=193&scripts=194&users=78&baseball=950&movies=698&photoshop=16
200 OK (text/html)

GET http://fluorescentgrandfather .info/2008/meta_login/phpmyadmin2/wLsShgHc
200 OK (application/x-java-archive)

GET http://fluorescentgrandfather .info/2008/meta_login/phpmyadmin2/Fxptg
200 OK (application/x-java-archive)

GET http://fluorescentgrandfather .info/2008/meta_login/phpmyadmin2/wLsShgHc
200 OK (application/x-java-archive)

GET http://fluorescentgrandfather .info/2008/meta_login/phpmyadmin2/Fxptg
200 OK (application/x-java-archive) (will provide md5 if i found a way to clean fiddler export)

GET http://rubefasttrack .info/products.php?info=53&mapa=334&classes=12&pages=677&sport=1251&hotel=81&free=178&intl=58&style=604&openparadise1=299
200 OK (application/octet-stream)

GET http://b4wd52ftevtwvd .org/ad4/?jlrhg=rFssAhgRAFQ4SDEAAQAAAAUQ1KCkeEiX
200 OK (application/octet-stream) (Lyposit/Lucky Locker call home)

SWT Fiddler file : http://goo.gl/4cDMy
</edit n+2>


<edit n+1 2012-01-13 - 19h GMT+1>
Have seens some stats from an EK featuring this CVE. % of successful infection was between 13-15% overall (double usual rates on that EK). In DK it seems the % is higher. From 25% to 30%. Have been told that one explanation could be that Banks require Java to login in that country
</edit n+1>


Source of the Exploit :
http://pastebin.com/raw.php?i=cUG2ayjh - Gdark - DamageLabs

Unverified Source of the Exploit
Credits : Gdark - damagelabs



Files are now with public Password ( The default password almost everyone use for infected stuff ) . Will update this archive :
http://goo.gl/Oc1VA (Hubic - OVH)
http://goo.gl/tzjfr (Google Drive) Ctrl+s or File->Download to get the zip.
Note : All request for the public password in comment will be deleted.

Remove Java or disable plugins.
See :
Vulnerability Note VU#625617 - Solution part - Will Dorman - US-Certs
How do I disable Java in my web browser?  - Oracle - Java.com
<edit n+3 13/01/13> 
Patch is out. You can now update to 1.7u11

http://java.com/en/download/index.jsp
</edit3>

What is behind the curtains :
Look : The path to infection - Eye glance at the first line of "Russian Underground"

Some readings :
Vulnerability Summary for CVE-2013-0422 - NVD
Java MBeanInstantiator.findClass 0Day Analysis - Esteban Guillardoy - Immunity
Happy New Year From New Java Zero-Day - FireEye Blog - 2013-01-11
Nasty New Java Zero Day Found; Exploit Kits Already Have It - Michael Mimoso - ThreatPost - 2013-01-11
First Java 0day For The Year 2013 - Arseny Levin - SpiderLabs - 2013-01-11



Viewing all articles
Browse latest Browse all 185

Trending Articles