Home / malwarePDF  

Exploit:Win32/ShellCode.gen!C


First posted on 15 February 2019.
Source: Microsoft

Aliases :

Exploit:Win32/ShellCode.gen!C is also known as Exploit.JS.Senglot, JS/BoF.J, SCRIPT.Virus, Trojan.Maliframe!html, Trojan.Script.6869.

Explanation :

In the wild, we have seen Exploit:Win32/ShellCode.gen!C use exploits that are often maliciously modified versions of the Metasploit proof on concept exploit framework (a series of exploits that are used for the legitimate testing of security systems) and can vary greatly. These exploits can include: 

CVE-2008-1309  ActiveX control remote code execution exploit in Real Player in rmoc3260.dll CVE-2008-1044  ActiveX control UploadLogs() buffer overflow exploit in Move Networks Quantum Streaming Player CVE-2008-0443  ActiveX control buffer overflow exploit in Lycos FileUploader CVE-2007-4515  ActiveX control buffer overflow exploit in Yahoo! Messenger CVE-2008-0551  Buffer overflow exploit in Sejoong Namo ActiveSquare6 in NamoInstaller.dll

We have observed the exploits downloading files from the following servers:

n.gan360.com w.qqnetcn.cn

Analysis by Jeong Mun

Last update 15 February 2019

 

TOP