Hi,
First of all, I am not very familar with this exploit.
From what I know, there was a buffer overflow vulnerability in GDI+ when parsing the comment section (marker FFFE) of JPEG files.
Anyway, in this case it seems the JFIF section (marker FFE0) is being crafted for buffer overflow. The two bytes after this marker indicate the length of the section (including itself), so they should be minimum of 2. In this image though, they are set to 0:
00000000 ff d8 ff e0 00 00 00 00 00 00 00 00 00 00 00 00 |................|
This is being detected by (few) AV vendors.
I think the shellcode you are looking for, is somewhere at the end of the image. So if you can share the whole file, it would be greatly appreciated.
Sorry if this wasnt too helpful and/or incorrect!
Regards,
Philipp
ref:
http://www.obrador.com/essentialjpeg/headerinfo.htm