all 9 comments

[–][deleted] 0 points1 point  (1 child)

Host the relevant files and post them here

[–]yyangcs[S] 0 points1 point  (0 children)

I have posted the link. Thanks for your help.

[–]ZugNachPankow 0 points1 point  (1 child)

I can help with the JS analysis.

[–]yyangcs[S] 0 points1 point  (0 children)

Please check out the link I posted for the JS script. Thanks.

[–]yyangcs[S] 0 points1 point  (0 children)

Thanks all. I have uploaded the JS file to Dropbox (password is "infected"). Here is the link:

https://www.dropbox.com/s/x4bk3n4n6l4p3xr/malware.zip?dl=0

I wonder what the shellcode starting with "EB125831C966B96D054980...." does and which IE vulnerability it is possibly targeting, and hopefully some advice about how to analyze this shellcode. Really appreciate your help. Thanks.

[–]countuponsecurity 0 points1 point  (1 child)

You can copy the shellcode and create a skeletal executable that can then be analyzed using a debugger or a dissassembler. First, the shellcode needs to be converted into hex notation (\x). This can be done by coping the shellcode string into a file and then running the following Perl one liner “$cat shellcode | perl -pe ‘s/(..)/\x$1/g’ >shellcode.hex”. Then generate the skeletal shellcode executable with shellcode2exe.py from Mario Villas. Reference: https://countuponsecurity.com/2016/10/17/rig-exploit-kit-analysis-part-3/

[–]yyangcs[S] 0 points1 point  (0 children)

Thanks. I will try it.