Dailydave mailing list archives
Re: Times up!
From: dennis () backtrace de
Date: Fri, 24 Oct 2008 16:36:06 +0200
That said, it won't take much for someone to write self-replicating code exploiting this vulnerability.
I can now confirm what has been stated on the ThreatExpert blog. I found shellcode at file offset 0x4712A (or address 0x1004712A in IDA). Simple "sub 1" payload decoder, imports urlmon/UrlDownloadToFileA and WinExec to download a copy of the Trojan. MD5 of basesvc.dll: 82ba009746da8603c463f37e381a42a4 Cheers _______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave
Current thread:
- Times up! Dave Aitel (Oct 23)
- Re: Times up! Hybridus (Oct 23)
- Re: Times up! Fionnbharr (Oct 23)
- Re: Times up! Mike Johnson (Oct 24)
- Re: Times up! dennis (Oct 24)
- Re: Times up! dennis (Oct 24)
- Re: Times up! Dave Aitel (Oct 24)
- Re: Times up! Brandon Enright (Oct 24)
- Re: Times up! Dennis Rand (Oct 24)
- Re: Times up! Fionnbharr (Oct 23)
- Re: Times up! Hybridus (Oct 23)
- Re: Times up! dan (Oct 24)
- Re: Times up! Erik Fichtner (Oct 24)
- Re: Times up! Salvador III Manaois (Oct 24)