Quantcast
Channel: Malware don't need Coffee
Viewing all articles
Browse latest Browse all 185

CVE-2013-2423 integrating Exploit Kits

$
0
0
snipshot from mitre.org

One week after Patch Java7u21 the vulnerability is being exploited in mass blind attack.
( First alert come from Timo Hirvonen with CrimeBoss and later CritXPack/SafePack. Will update for these EK as soon as i land on it)

Cool EK:
CVE-2013-2423 successful path in Cool EK 2013-04-23


GET http://lekarskiejowlslight.ahmedpekin .net/works-softly.htm
200 OK (text/html)

GET http://lekarskiejowlslight.ahmedpekin .net/hopeful_orchestra-surveyor_remove.jar
200 OK (application/java-archive) 9339cb68dd4a1301f8b84da55bacd6b4

CVE-2013-2423 in Cool EK Jar


GET http://95.211.[bip]/getqq.jpg  c795ac9a7a84930c4da54439026556c6  Reveton as usual.
200 OK (application/x-msdownload)

<edit1 2013-04-26>
Sweet-Orange :


CVE-2013-2423 positive path in Sweet Orange 2013-04-26
GET http://prioritiesinformationlockdown .net/upgrade/uploads/photo/pets.php?spamnav=237
200 OK (text/html)

<edit5 2013-04-27> Security Bypass has been added.
Looks like that :
Security bypass implemented in Sweet Orange 2013-04-27

</edit5>
GET http://prioritiesinformationlockdown .net/upgrade/uploads/photo/bDCoZGmn.jar
200 OK (application/x-java-archive) d4a716a6434462ddd1b99a85f3d9cf87

CVE-2013-2423 in SWT


GET http://prioritiesinformationlockdown .net/upgrade/uploads/photo/KOrJjsK.jar
200 OK (application/x-java-archive) 49ca9dcbf4cc7176bb656ded3eb03dba



GET http://prioritiesinformationlockdown .net/iraq.php?setup=750&humor=598&star=4&virus=629&entry=171&paper=545&stars=451&intm=257&books=550&myguest=958
200 OK (application/octet-stream) Decoded payload : f94c16dc1c399849e37064e17c5337e1 (Ransomware c&c http://utrento .com/picture.php )


Undefined (for now) Ransomware landing for UK
</edit1>
<edit3 2013-04-27>
Neutrino :


"Добавлен новый эксплоит, пробив приятно поднялся ;)"
translated as :
Added a new exploit, breaking up nicely ;)

CVE-2013-2423 in Neutrino 2013-04-27 with Security Bypass


Security Bypass  (as explained by Security Immunity) in Neutrino
after some decoding
GET http://evaluation-man .net/ldeiyxlmeiujjn?fqemlffr=5884689
200 OK (text/html)

GET http://ajax.googleapis .com/ajax/libs/jquery/1.9.1/jquery.min.js
200 OK (text/javascript)

GET http://evaluation-man .net/scripts/js/plugin_detector.js
200 OK (application/x-javascript)

POST http://evaluation-man .net/cvwrssa
200 OK (text/html)

GET http://evaluation-man .net/eqtmw?hvvsxlyebdkj=517ba030aaa2cc8561032cc5
200 OK (application/java-archive)  4387db4a1da8f8f68df4369f8e6d46b6


CVE-2013-2423 in Neutrino Jar


GET http://evaluation-man .net/puvpdxcfdwntco?htigpfblxyx=517ba030aaa2cc8561032cc5
200 OK (application/octet-stream) Decoded payload : a69ffadf3d021f3edfb7b811e2fcb753 Urausy

Part of Urausy LU Design 2013-04-27



File: Neutrino_CVE-2013-2423.zip (OwnCloud via goo.gl)
</edit3>
<edit4 2013-04-27>
Sakura :


CVE-2013-2423 & Security Bypass successful path in Sakura EK
GET http://ef4g.stencilmaster1 .com:88/page/word.php
200 OK (text/html)

Security Bypass in Sakura (after partial deobfus) - 2013-04-27


GET http://ef4g.stencilmaster1 .com:88/page/important_whole_mile.php
200 OK (application/x-java-archive) b7c19737bcbeb0613ade20b71e2797fe

CVE-2013-2423 in Sakura Jar file 2013-04-27
GET http://ef4g.stencilmaster1 .com:88/page/3906.htm
200 OK (application/octet-stream)  Decoded payload : 1ecc8081e6fe50c886735c45e788d16d


Part of Urausy NL Design 2013-04-27


Files : Sakura_Landing_Jar_Payload_CVE-2013-2423.zip (OwnCloud via goo.gl)
</edit4>
<edit6 2013-04-27>
Styx :
At least 3 hours providing that jar without infecting...it appears now to be fully operationnal
Successful CVE-2013-2423 + Security bypass in Styx
+ Payload Urausy Call Home
GET http://1perfotas.gotgeeks .com/kgMXp60Bral0l2gu0T3h311sSh0gspW12nyO0jyQj0Clcm0APFy0tlNV06MeW0KUSX/
200 OK (text/html)

GET http://1perfotas.gotgeeks .com/kgMXp60Bral0l2gu0T3h311sSh0gspW12nyO0jyQj0Clcm0APFy0tlNV06MeW0KUSX/jrr.html
200 OK (text/html)

Embedded jnlp for Security Bypass


GET http://1perfotas.gotgeeks .com/kgMXp60Bral0l2gu0T3h311sSh0gspW12nyO0jyQj0Clcm0APFy0tlNV06MeW0KUSX/sdghsHHj.jar
200 OK (text/html) 702ad790017148b8eedd46ce5599a06f

CVE-2013-2423 in Styx Jar 2013-04-27


GET http://1perfotas.gotgeeks .com/OoTtsV0poEU0xnad0KaY910BMP0MRvW0emfi0nW3n0rEFd06afI0di5J0QjCx0OufD06IHF0CViI0ZVum0V3tm0zzAk14xMn0TcLD01PmR0nee80H9JU0Rdwk12WwY09mps0ZYSm0nX5o0OhKa17Z8N16eY5126Nc0hQ6m0ML3m0gjjR0EYoV0tEYB14CSM0GpRt0unAj0dUrn0vhxG0htLK12MMq0SNVP0OGdP/Er3jvhs7jf.exe?fJ2pf=XUaPp&h=13
200 OK (application/octet-stream)  Payload decoded (for now...) 1f9d504d0c3ad25ca42fbc661070d075 Urausy again...

Part of Urausy US Design 2013-04-27
Files: Styx_Landing_SecurityBypass_Jar_Payload_2013-04-27.zip
</edit6>

Reading :
CVE-2013-2423 on mitre
CVE-2013-2423 Metasploit Module
Java is So Confusing... - Trustwave/Spiderlabs - Anat Davidi -2013-04-19
Java 7 Update 21 - IKVM.Net Weblog - 2013-04-17
Post Publication Readings :
Yet Another Java Security Warning Bypass - Immunity - 2013-04-24 - Esteban Guillardoy
The Latest Java Exploit with Security Prompt/Warning Bypass (CVE-2013-2423) - Security Obscurity - 2013-04-26
K.I.A. – Java CVE 2013-2423 Via New and Improved Cool EK - Anup Ghosh - Invincea - 2013-04-26


Viewing all articles
Browse latest Browse all 185

Trending Articles