Home / malware Exploit:Win32/Pdfjsc.ALA
First posted on 11 April 2019.
Source: MicrosoftAliases :
Exploit:Win32/Pdfjsc.ALA is also known as Exploit.JS.Pdfka.gkz, generic/Pdfjsc.DZ, PDF:Exploit.PDF-JS.AEV, JS/Pdfka.GKZ!exploit, JS.Pdfka, Suspicious-PDF.gen.
Explanation :
Installation
You might get Exploit:Win32/Pdfjsc.ALA if you visit a malicious website, or a website that's been hacked. It runs successfully on your PC if you have a version of Adobe Acrobat or Adobe Reader affected by the vulnerability discussed in CVE-2010-0188.
Payload
Downloads files
If Exploit:Win32/Pdfjsc.ALA successfully exploits a vulnerable PC, it tries to download and run files.
In the wild, we've observed Exploit:Win32/Pdfjsc.ALA trying to download files from this site:
oeyhrg.webbipolar.biz
As of this writing, the site is unavailable.
Analysis by Daniel ChipiristeanuLast update 11 April 2019