Dailydave mailing list archives

Re: Times up!


From: dennis () backtrace de
Date: Fri, 24 Oct 2008 16:36:06 +0200


That said, it won't take much for someone to write self-replicating code
exploiting this vulnerability.


I can now confirm what has been stated on the ThreatExpert blog. I  
found shellcode at
file offset 0x4712A (or address 0x1004712A in IDA). Simple "sub 1"  
payload decoder,
imports urlmon/UrlDownloadToFileA and WinExec to download a copy of  
the Trojan.

MD5 of basesvc.dll: 82ba009746da8603c463f37e381a42a4

Cheers

_______________________________________________
Dailydave mailing list
Dailydave () lists immunitysec com
http://lists.immunitysec.com/mailman/listinfo/dailydave


Current thread: