Skip to content
1-888-762-8736(M-F 8:00am-5:00pm CST)
1-877-218-7353(M-F 8:00am-5:00pm CST)
href="http://www.trendmicro.com/us/enterprise/index.html" id="ENT-overview-test2" title="SEE ALL ENTERPRISE SOLUTIONS">Enterprise Overview
This malware was involved in the Adobe Flash Player zero-day exploit incident reported on February 2014. It would automatically download onto users' systems once the user browsed a compromised website. It would then exploit certain vulnerabilities in order to download malware. Users affected by this malware may find malicious routines exhibited on their systems.
To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
This Trojan executes when a user accesses certain websites where it is hosted.
It exploits a vulnerability identified as in a zero-day attack.
This Trojan exploits a zero-day vulnerability. More information on the said vulnerability can be found in the following pages:
This malware checks if the affected machine's operating system and/or installed software is any of the following:
If found, it attempts to bypass ASLR capability of these operating systems.
On Windows XP, it builds return-oriented programming (ROP) chain of Visual C runtime gadgets (MSVCRT) with hard-coded base addresses for English and Chinese language pack operating systems.
On Windows 7, it uses hard-coded ROP chain for MSVCR71.dll if the affected machine has Java 1.6, while a hard-coded ROP chain for HXDS.dll is used if the affected machine has Microsoft Office 2007 or 2010.
After performing ASLR bypass, it downloads its shell code as logo.gif. The URL where it downloads its shell code is the same as where this malware is uploaded.
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Close all opened browser windows
Scan your computer with your Trend Micro product to delete files detected as SWF_EXPLOYT.LPE. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Download and apply these security patches Refrain from using these products until the appropriate patches have been installed. Trend Micro advises users to download critical patches upon release by vendors.
Connect with us on
| | | |