Download infected merry_christmas.pdf (password protected, please contact me or use the same password as you used on other CVE-2009-4324 samples)
Adobe is taking their sweet time to fix the problem while new variants show up. You don't need ESP to predict that Christmas cards will be followed by New Year's invites and IRS forms before most people receive and install the updates. I was surprised that Symantec, being the CVE-2009-4324 pack leader in the past few days, did not detect it. Tip of the hat to Messagelabs for catching it again.
From: Uyghur Hunova uyghurhunova@yahoo.com
Subject: merry christmas
Sent: Fri 12/18/2009 2:09 PM
My dear friend
Merry Christmas
The message sender was
uyghurhunova@yahoo.com
The message originating IP was 98.137.27.222 The message recipients were
XXX@XXX.XXX
The message was titled merry christmas
The message date was Fri, 18 Dec 2009 11:11:27 -0800 (PST) The message identifier was <474701.46814.qm@web112506.mail.gq1.yahoo.com>
The virus or unauthorised code identified in the email is:
>>> Possible MalWare 'Exploit/Acroread-CVE-2009-4324' found in
>>> '8044614_1000X_PA3_APDF__pdf_obj_31_0.js'. Heuristics score: 401
uyghurhunova@yahoo.com
The message originating IP was 98.137.27.222 The message recipients were
XXX@XXX.XXX
The message was titled merry christmas
The message date was Fri, 18 Dec 2009 11:11:27 -0800 (PST) The message identifier was <474701.46814.qm@web112506.mail.gq1.yahoo.com>
The virus or unauthorised code identified in the email is:
>>> Possible MalWare 'Exploit/Acroread-CVE-2009-4324' found in
>>> '8044614_1000X_PA3_APDF__pdf_obj_31_0.js'. Heuristics score: 401
Virustotal
http://www.virustotal.com/analisis/8ccc882c18d927b57a33f8c6bae4d0eec3290ac7ab1d1157725918feab76ec01-1261197266 File merry_christmas.pdf received on 2009.12.19 04:34:26 (UTC)
Result: 12/41 (29.27%)
Antivirus Version Last Update Result
a-squared 4.5.0.43 2009.12.18 Exploit.Win32.ShellCode!IK
AntiVir 7.9.1.114 2009.12.18 HTML/Shellcode.Gen
BitDefender 7.2 2009.12.19 Exploit.PDF-JS.Gen
ClamAV 0.94.1 2009.12.18 Exploit.PDF-4797
F-Secure 9.0.15370.0 2009.12.19 Exploit.PDF-JS.Gen
GData 19 2009.12.19 Exploit.PDF-JS.Gen
Ikarus T3.1.1.79.0 2009.12.18 Exploit.Win32.ShellCode
McAfee-GW-Edition 6.8.5 2009.12.18 Script.Shellcode.Gen
Microsoft 1.5302 2009.12.18 Exploit:Win32/ShellCode.A
Norman 6.04.03 2009.12.18 JS/ShellCode.M
Sophos 4.49.0 2009.12.19 Troj/PDFJs-FV
VirusBuster 5.0.21.0 2009.12.18 JS.Shellcode.Gen
Additional information
File size: 1226811 bytes
MD5 : 955bade419a9ba9e5650ccb3dda88844
SHA1 : b17eda55b10d1c19fee06e1bdc2afa561adadb20
SHA256: 8ccc882c18d927b57a33f8c6bae4d0eec3290ac7ab1d1157725918feab76ec01
Symantec - no luck this time :(
Look, someone analyzed it before me
Wepawet
http://wepawet.cs.ucsb.edu/view.php?hash=955bade419a9ba9e5650ccb3dda88844&type=js
Analysis report for merry_christmas.pdf MD5 955bade419a9ba9e5650ccb3dda88844
Analysis Started 2009-12-18 20:51:32 Report Generated 2009-12-18 20:51:37
Jsand 1.03.02 malicious
Exploits
doc.media.newPlayer Use-after-free vulnerability in the Doc.media.newPlayer method in Adobe Reader and Acrobat 8.0 through 9.2 CVE-2009-4324
Deobfuscation results
Evals
•ETMFqgIYhOocVWjRVnMtBeDMyEZbpYdlXRebZbfgklOFzlZcfpkCyMTAfndFS.substring(0, 32768 -
xBHsHLbqHkdJLgRdCzSYKCHsKBRQdjpEKVoPZtyMrgFVfLqWvLwNMZPRRShZImxFycvSUa.length)
(repeated 1 time)
•new Array() (repeated 1 time)
Writes No writes.
Network Activity Requests
URL file://merry_christmas.pdf
ActiveX controls AcrobatJavaScript Name Arg0 Arg1 Count Methods media.newPlayer (null) 1
util.printd 1.345678901.345678901.3456 : 1.31.34 Fri Dec 18 2009 20:51:36 GMT-0800 (PST) 3
- See post with CVE-2009-4324 Sample#0 (Nov. 30, 2009) note200911.pdf 61baabd6fc12e01ff73ceacc07c84f9a
- See post with CVE-2009-4324 sample #1 (Dec 11, 2009) note_20091210.pdf 61baabd6fc12e01ff73ceacc07c84f9a
- See post with CVE-2009-4324 sample #2 (Dec. 13, 2009) Outline of Interview.pdf 35e8eeee2b94cbe87e3d3f843ec857f6
- See post with CVE-2009-4324 Sample #3 (Dec 18, 2009) merry christmas.pdf 955bade419a9ba9e5650ccb3dda88844
- See post with CVE-2009-4324 Sample #4 (Dec 18, 2009) 「寶貝悶」瘋狂照.pdf 8950bbedf4a7f1d518e859f9800f9347
Download all files together with the binary downloaded from hxxxp://foruminspace.com/documents/dprk/ (Password protected archive. Use the same password you used on the samples above or contact me for the password)
No comments:
Post a Comment