{"id":13441,"date":"2018-09-26T10:10:09","date_gmt":"2018-09-26T18:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/09\/26\/news-7208\/"},"modified":"2018-09-26T10:10:09","modified_gmt":"2018-09-26T18:10:09","slug":"news-7208","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/09\/26\/news-7208\/","title":{"rendered":"Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 26 Sep 2018 17:13:26 +0000<\/strong><\/p>\n<p>A variant of a\u00a0remote code execution vulnerability with Internet Explorer&#8217;s scripting engine known as CVE-2018-8373\u00a0<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8373\" target=\"_blank\" rel=\"noopener\">patched last August<\/a> has been found in the wild. Looking at the IOCs <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-cve-2018-8373-exploit-spotted-in-the-wild\/\" target=\"_blank\" rel=\"noopener\">posted by our colleagues at TrendMicro<\/a>, we recognized the infrastructure serving this exploit. The same static domain has been active <a href=\"https:\/\/www.virustotal.com\/en\/domain\/www.myswcd.com\/information\/\" target=\"_blank\" rel=\"noopener\">since at least early July<\/a>, and is being redirected to from an adult website injected with a malicious script.<\/p>\n<p>In the below traffic capture from August, we were served <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/\" target=\"_blank\" rel=\"noopener\">CVE-2018-8174<\/a>, which is <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/use-after-free-uaf-vulnerability-cve-2018-8373-in-vbscript-engine-affects-internet-explorer-to-run-shellcode\/\" target=\"_blank\" rel=\"noopener\">thought<\/a> to be from the same author. It is interesting to note that this is not an exploit kit, but rather appears to be a single actor who implemented the available Proof of Concept to distribute his payload, the Quasar Remote Administration Tool (RAT).<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic_08.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25651\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/buggy-implementation-of-cve-2018-8373-used-to-deliver-quasar-rat\/attachment\/traffic_08\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic_08.png\" data-orig-size=\"726,918\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic_08\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic_08-237x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic_08-475x600.png\" class=\"size-full wp-image-25651 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic_08.png\" alt=\"\" width=\"726\" height=\"918\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic_08.png 726w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic_08-237x300.png 237w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic_08-475x600.png 475w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\" \/><\/a><\/p>\n<p>During our tests with this new variant of\u00a0CVE-2018-8373, we found it to be quite unstable and failing to detonate its payload via Powershell invocation. However, a working CVE-2018-8174 was still serving the same payload we had captured back in August.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/error.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25659\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/buggy-implementation-of-cve-2018-8373-used-to-deliver-quasar-rat\/attachment\/error-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/error.png\" data-orig-size=\"798,695\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"error\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/error-300x261.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/error-600x523.png\" class=\"size-full wp-image-25659 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/error.png\" alt=\"\" width=\"798\" height=\"695\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/error.png 798w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/error-300x261.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/error-600x523.png 600w\" sizes=\"auto, (max-width: 798px) 100vw, 798px\" \/><\/a><\/p>\n<p>The source code for CVE-2018-8373 has been uploaded to many platforms already (<a href=\"https:\/\/pastebin.com\/W4aVvPVX\" target=\"_blank\" rel=\"noopener\">PasteBin<\/a>, <a href=\"https:\/\/www.virustotal.com\/#\/file\/96bdf283db022ca1729bbde82976c79d289ec5e66c799b3816275e62e422eb50\/detection\" target=\"_blank\" rel=\"noopener\">VirusTotal<\/a>), including to the <a href=\"https:\/\/app.any.run\/tasks\/d7ae8ea4-9767-44de-9784-b5cdb4ee1756\" target=\"_blank\" rel=\"noopener\">AnyRun<\/a> sandbox. That sample triggers the exploit and spawns PowerShell.\u00a0In the following animation, we replayed this attack to show how our <a href=\"https:\/\/www.malwarebytes.com\/business\/endpointprotectionandresponse\/\" target=\"_blank\" rel=\"noopener\">anti-exploit technology<\/a> is able to mitigate this vulnerability at various levels.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/CVE-2018-8373.gif\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25653\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/buggy-implementation-of-cve-2018-8373-used-to-deliver-quasar-rat\/attachment\/cve-2018-8373\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/CVE-2018-8373.gif\" data-orig-size=\"1031,805\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"CVE-2018-8373\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/CVE-2018-8373-300x234.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/CVE-2018-8373-600x468.gif\" class=\"size-full wp-image-25653 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/CVE-2018-8373.gif\" alt=\"\" width=\"1031\" height=\"805\" \/><\/a><\/p>\n<p>We can expect that other treat actors will be looking at this code for possible implementation. However, unless it is improved, it is unlikely to be integrated into exploit kits, considering that its cousin, CVE-2018-8174, works flawlessly.<\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Injected adult site<\/p>\n<pre>198.211.33.67  clubtubes[.]com<\/pre>\n<p>Exploit serving domain<\/p>\n<pre>54.191.17.130  myswcd[.]com\/vol\/m3.html,CVE-2018-8373  myswcd[.]com\/vol\/m2.html,CVE-2018-8174  myswcd[.]com\/vol\/me.html,CVE-2018-8174<\/pre>\n<p>Payload<\/p>\n<pre>myswcd[.]com\/vol\/s1.exe,Loader  myswcd[.]com\/vol\/v1.exe,Installer  myswcd[.]com\/vol\/v2.exe,Quasar RAT  7EEF6EF8FED53B7C3BF61BA821F375A0A433EA4CB0185FD223780B729A9A5792  268909BC33F0F8C5312B51570016311E3676AF651A57DE38E42241DCC177B2D6  D9A967D0CAA8DB86FECA3AE469EF6797E81DFDAC4D8531658CB242A87C80CE05<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/buggy-implementation-of-cve-2018-8373-used-to-deliver-quasar-rat\/\">Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/buggy-implementation-of-cve-2018-8373-used-to-deliver-quasar-rat\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 26 Sep 2018 17:13:26 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/buggy-implementation-of-cve-2018-8373-used-to-deliver-quasar-rat\/' title='Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2015\/04\/photodune-8243786-internet-browser-s.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A threat actor implements a newer vulnerability exploited in Internet Explorer to serve up the Quasar RAT and diversify the portfolio of attacks.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/anti-exploit\/\" rel=\"tag\">anti exploit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2018-8174\/\" rel=\"tag\">CVE-2018-8174<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2018-8373\/\" rel=\"tag\">CVE-2018-8373<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit\/\" rel=\"tag\">exploit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/indicators-of-compromise\/\" rel=\"tag\">Indicators of compromise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ioc\/\" rel=\"tag\">IOC<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iocs\/\" rel=\"tag\">IOCs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pastebin\/\" rel=\"tag\">pastebin<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/patch\/\" rel=\"tag\">patch<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/quasar\/\" rel=\"tag\">Quasar<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rat\/\" rel=\"tag\">rat<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/remote-administration-tool\/\" rel=\"tag\">remote administration tool<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/virustotal\/\" rel=\"tag\">virustotal<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vulnerabilities\/\" rel=\"tag\">vulnerabilities<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vulnerability\/\" rel=\"tag\">vulnerability<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/buggy-implementation-of-cve-2018-8373-used-to-deliver-quasar-rat\/' title='Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/buggy-implementation-of-cve-2018-8373-used-to-deliver-quasar-rat\/\">Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11725,18334,19585,11638,10987,19506,19507,19508,13615,14244,14152,1810,11876,10494,11599,10752,10467],"class_list":["post-13441","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-anti-exploit","tag-cve-2018-8174","tag-cve-2018-8373","tag-exploit","tag-exploits","tag-indicators-of-compromise","tag-ioc","tag-iocs","tag-pastebin","tag-patch","tag-quasar","tag-rat","tag-remote-administration-tool","tag-threat-analysis","tag-virustotal","tag-vulnerabilities","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13441"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13441\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}