
SonicWALL UTM Research team received reports of a new Adobe 0-day Vulnerability reported here being exploited in the wild. This new vulnerability is being targeted by a specially crafted PDF file. Upon successful exploit attempt, it will drop & execute a malicious executable file on the victim machine.
Installation:
Once the user opens the malicious PDF file, it will drop the following payloads on %TEMP% folder:
The content of the file ~temp.bat looks like:
After successfully exploit attempt on the Adobe Acrobat application, the control will be transferred over to nsunday.exe to continue its infection.
Malware Routine:
Sample screenshot of the commands received:
These commands include:
Sample screenshot of the information retrieved from the system:
Other dropped files:
SonicWALL Gateway AntiVirus provided protection against this malware via the following:
GAV: Wisp.A_2 (Trojan)
GAV: PDF.JS_3 (Exploit)
IPS: Adobe Shockwave rcsL Chunk Memory Corruption PoC
IPS: Adobe Shockwave rcsL Chunk Memory Corruption PoC 2
Share This Article

An Article By
An Article By
Security News
Security News