
SonicWALL UTM Research received reports of malware actively exploiting the recently reported vulnerability in Windows Help and Support Center (CVE-2010-1885) - MS hcp-URL Cross Site Scripting (June 10, 2010)
The malware author used the code below to exploit the vulnerability:
Upon successful exploitation, it downloads a component JavaScript file shown below as its payload:
This script then downloads and executes the Backdoor Lecna file which uses an Adobe Acrobat icon to disguise itself as a acrobat file.
Malware Installation
Mutex Name:
To ensure that only one instance of this malware is running on the infected system it creates a mutex:
Files Added:
It drops a copy in Startup folder which allows itself to run on every system startup.
Registries Added:
It writes into the registry the host id which marks systems it successfully infected:
Files Downloaded:
It downloads the following files which are actually executable.
Network Activity:
Tries to connect to the following:
SonicWALL Gateway AntiVirus provided protection against this malicious backdoor via following signatures:
Share This Article

An Article By
An Article By
Security News
Security News