2015-07-11 - Exploit Integration
CVE-2015-5122 (HackingTeam 0d two - Flash up to 18.0.0.203) and Exploit Kits
Another 0d ( Patch expected in the coming week) was part of the files leaked from the HackingTeam compromission.
— dummys (@dummys1337) July 10, 2015
Code was fast disclosed, integrated to MetaSploit and as we were all expecting again, integration in Exploit Kits was a matter of hours.Angler EK:
2015-07-11
Thanks Peter Pi from TrendMicro for CVE Id confirmation
Flash 18.0.0.203 exploited by Angler EK via CVE-2015-5122 in Firefox 2015-07-11 |
(out of topic payload : bedep calling additional malware [ 44ddbe75d4bca0097f84005969d5e671 Andromeda C&C : - adm-serv.com - 5.255.67.108 -- df1a4963f1b40592cf416b3b70980071 - pony news.php - 46f4b368a761d76a7f6d08cbfccd9ab6 Zeprox.B C&C 92.63.88.8]- and performing adfraud )
Files: Fiddler (password is malware)
Neutrino :
2015-07-13 (before patch)
Flash 18.0.0.203 exploited by Neutrino via CVE-2015-5122 2015-07-13 (before patch) |
(out of topic payload : 0bc329730065f7eb8092203643964ca8 bunitu)
Files: Fiddler (password is malware)Nuclear Pack:
2015-07-14 (few hours before patch)
Thanks by Anton Ivanov ( Kaspersky ) for CVE ID confirmation
Note : saw after publishing that it was already spotted by Brooks_Li from TrendMicro
Flash 18.0.0.203 exploited by Nuclear Pack via CVE-2015-5122 2015-07-14 (before patch) |
(out of topic payload : 0d3390cb437ad7600fe0c532444af098 Troldesh.A ransomware)
Files: Fiddler (password is malware)
RIG :
2015-07-14 (few hours before patch)
As spotted by Brooks_Li from TrendMicro
Flash 18.0.0.203 exploited by RIG via CVE-2015-5122 2015-07-14 (before patch) |
(out of topic payload : 28031705eea28f6074e770a987cc85ec Betabot probably )
Files: Fiddler (password is malware)Magnitude :
2015-07-15
Flash 18.0.0.203 exploited by Magnitude via CVE-2015-5122 2015-07-15 (after patch) |
(out of topic payloads : Cryptowall 2230489586461a1627a4e1360d70c7ed and Cryptowall 9edf36d62fdd1ca7fcd99c191a83e701 )
Files: Fiddler (password is malware)
NullHole :
2015-07-22
(Edit : Once again i spotted severals hours after publication the tweet from Brooks_li )
Flash 18.0.0.203 exploited by NullHole via CVE-2015-5122 2015-07-22 (after patch) |
Sample : here
(out of topic payload : 9eaa90742d09daeb3157c30a3b18da7a )
Files : Fiddler and Sample (password is malware)
Spartan :
2015-09-11
I faced that Spartan few hours after SonicWall wrote about it.
IMO it's the work of Nuclear Pack coder. (the xml and payload server are imo operated by that actor).
Spartan EK firing CVE-2015-5122 to drop Miuref 2015-09-12 |
Files: Fiddler (password is malware)
Read More :
CVE-2015-5122 - Second Adobe Flash Zero-Day in HackingTeam Leak - 2015-07-10 - Dhanesh Kizhakkinan - FireEye
Another Zero-Day Vulnerability Arises from Hacking Team Data Leak - 2015-07-11 - Peter Pi - TrendMicro
Spartan Exploit Kit (Sep 11th, 2015) - 2015-09-11 SonicWall Security Center
Another Zero-Day Vulnerability Arises from Hacking Team Data Leak - 2015-07-11 - Peter Pi - TrendMicro
Spartan Exploit Kit (Sep 11th, 2015) - 2015-09-11 SonicWall Security Center