CVE
slang/shorthand
Product / type . < means that v. and below
Exploit Description
CVE-2006-0003 mdac
IE 6
Pack Release Date (SEE OLDER PACKS ON TAB 3 BELOW) or Analysis date MS IE _ MSHTML IE6 MS IE _ IE 5.01, 5.5, and 6 DHTML Method Heap Memory Corruption Vulnerability MS IE _MS06-014 for lE6/Microsoft Data Access Components (MDAC) Remote Code Execution
CVE-2007-5659 collab, collectEmaillnfo /2008-0655
PDF < 8.1.1
ADOBE PDF _Exploit -collab, collectEmaillnfo
CVE-2004-0549
IE 6
CVE-2005-0055
IE 5, 6
m_Cor_n / MS Off Snapshot IE
CVE-2008-2463 snapshot/ activexbundle CVE-2009- Mozilla FF 3.5 / font tags | FF escape retval 2477 CVE-2008-2992 util.printf Java JRE/Javad0/Javado/Java
CVE-2008-5353 Calendar/javaold/JavaSr0 CVE-2009IE7 MEMCOR MS09-002 0075/0076
CVE-2009-0927 PDF collab.getIcon / pdf-gi
IE- MSAccess
MS OFFICE _M508-041 - MS Access Snapshot Viewer
FF < 3.5.1
FIREFOX - Font tags | Firefox 3.5 escape() Return Value Memory Corruption
PDF < 8.1.2
ADOBE PDF _Exploit• util.printf
Java < 6u10
JAVA _Javad0—JRECalendar Java Deserialize
IE 7
MS IE _ MS09-002 - lE7 Memory Corruption
PDF < 9.1
ADOBE PDF _ Exploit- collab.getlcon
CVE-2009-1136 spreadsheet
IE - MSOffice
MS OFFICE _ MSO9-043 - lE OWC Spreadsheet ActiveX control Memory Corruption
CVE-2009-3867 JAVA GSB
Java < 6u17
JAVA _Runtime Env. getSoundBank Stack BOF
PDF < 9.3
ADOBE PDF Exploit - docmedianewPlayer
CVE-2009-4324
PDF mediaNewPlayer / pdfmp
CVE-2010-0188 PDF Libtiff / Lib
PDF < 9.3.1
ADOBE PDF Exploit - LibTiff Integer Overflow
CVE-2010-0094 javarmi
Java < 6u18
JAVA _ Runtime Environment component in Oracle Java SE
CVE-2010-0806 IEPeers msiemc
IE 7
CVE-2010-1297 PDF SWF
MS IE _ IEPeers Remote Code Execution IE7 Unitialized Memory Corruption JAVA _ Trusted Method Chaining - Java getValue Remote Code Execution JAVA 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 -via MIDI file with a crafted MixerSequencer object JAVA _ SMB / Java JDT 6 Upd 10-19 * Requires xtra components ADOBE PDF _ Open/Launch embedded exe via built in functionality, ability to change prompt text. Didier Stevens. SWF < 10.1.53.64 ADOBE FLASH - "PDF SWF"
CVE-2010-1423 javanew JWS
Java 6u10,19
CVE-2010-1885 hcp
WIN XP-2003
CVE-2010-0840
JAVA TC (?) javagetval OBE Java invoke / Java Trust
CVE-2010-0842 JAVA MIDI Java OBE
Java < 6u19
SWF < 10.2.152.26 SWF < 10.2.152.26 SWF < 10.2.154.27
ADOBE FLASH _ authplay.dll ActionScript AVM2 memory corruption Vulnerability – Adobe Reader < 9.4.0 – ALL Win JAVA _ Unspecified vulnerability in the New Java Plug-in – Java 6 < Update 22 – IE Only – ALL Windows ADOBE FLASH _ memory corruption and application crash via crafted SWF content October 2010. IE Use-after-free IE 6, 7, and 8 "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," JAVA _Sun Java Applet2ClassLoader Remote Code Execution Exploit JAVA _ www.metasploit. com/modules/exploit/multi/browser/java_signed_applet ADOBE FLASH _ Integer overflow in Adobe Flash Player before 10.2.152.26 ADOBE FLASH _ Denial of service (memory corruption) via crafted parameters ADOBE FLASH -Microsoft Office document with an embedded . swf file
CVE-2011-1255 IE 6-8
IE 6-8
MS IE _Time Element Memory Corruption
CVE-2011-2110
SWF< 10.3.181.26 ADOBE FLASH _ Flash memory corruption June - 2011
SWF< 10.1.82.76
CVE-2010-3654 FlashPlayer Button
SWF < 10.1.102.64
CVE-2010-3962 IE CSS
IE 6, 7, 8
CVE-2010-4452 Java Codebase Trust
Java < 6u23
Signed Applet Signed Applet
JAVA SOCIAL
CVE: 20112371
FF Array.reduceRight() Exploit
SWF< 10.3.183.5
Mozilla Firefox Firefox 4.0.1 Array.reduceRight() Exploit
PDF < 10.1.1
ADOBE PDF _U3D onject memory corruption December 2011
CVE-2011-3106 Chrome websockets
CHROME < 19.0.1084.52
CHROME Websockets overflow
CVE-2011-3521
Java 6u27, 7
JAVA _Type confusion vulnerability in Oracle Java Update 27
TrueType Font - Duqu
CVE-2011-3544 Java Rhino CVE-2011-3659 Firefox 8/9 Firefox social FF Social
Java 6u27, 7
JAVA _ AtomicReferenceArray
2010-0188
2010-0188
MS WMP
CVE-2012-1889 IE XML memcor
XML IE
XML _ memory corruption
SAFARI < 6
SAFARI Webkit - memory corruption
Neutrino
Blackhole (last)*
10-'13
03-'13
10-'13
Blackhole 2.x Blackhole 2.0 Blackhole 1.2.5 Blackhole 1.2.3 09-'12
2006-0003
2006-0003
08-'12
12-'11
2006-0003
2006-0003
2007-5659 /2008-0655
2007-5659 /2008-0655
Crime Boss 2013
Crime Boss 2012
Grandsoft / SofosFO/Stamp EK
Grandsoft / SofosFO/Stamp EK
09-'12
09-'12
09-'13
09-'12
Crimeboss
10-'13
Private EK
Sakura
09-'13
09-'13
2006-0003
Sakura 1.0
LightsOut
Glazunov
Rawin
Flimkit
Cool EK (Kore-sh)
08-'12
01-'12
9-'13
08-'13
8-'13
08-'13
09-'13
2006-0003
2006-0003
Sakura 1.1
Kore (formely Sibhost known as (Urausy/BestAV Sibhost) EK) 08-'13
04-'13
Cool/Styxy
Styx 4.0
Cool
07-'13
05-'13
05-'13
Cool Jan 2013 ->
Cool
08-'12
08-'12
2006-0003
2006-0003
Styx 2.0
Topic
Nice EK
KaiXin Nov '12
KaiXin Aug '12
12-'12
12-'12
05-'13
03-'13
mid 2012
mid 2012
2007-5659 /2008-0655
2007-5659 /2008-0655
Styx 2.x 2013
G01pack
SPL Pack
Serenity pack
Alpha Pack
2006-0003
2006-0003
10-'12
2006-0003
2010-0188
2010-0188
2010-0188
2010-0188
2010-0188
2010-0188
2010-0188
2010-0188
2008-2992
2008-2992
2009-0927
2009-0927
2010-0188
2009-0927
2010-0188
2010-0188
2010-0188
2010-0188
2010-0188
2010-0188
2010-0188
2010-0188
2010-0188
2010-0806
2010-0806
2010-0842
2010-0842
CritXPack
Whitehole
Red Dot
11-'12
01-'13
12-'12
Assoc AiD (unconfirmed) No Name 09-'12
09-'12
2011-2140
2008-2992
2009-0927
2009-0927
2010-0188
2010-0188
2010-0188
2010-0188
2011-2140
2011-3544
2011-3544
2011-3544
2011-3544
2011-3544
-
IE VML
IE <10
IE Use-after-free vulnerability in IE 6 -10 - via a crafted web site that triggers access to a deleted object
Silverlight
Silverlight < 5.1.20913.0
SILVERLIGHT 5, 5 Dev. Runtime, < 5.1.20125.0 Double Dereference Vulnerability and SL 5 < 5.1.20913.0
IE < 10
IE InformationCardSigninHelper VulnerabiliIty
IE <11
IE Use-after-free vuln. in the CDisplayPointer class in mshtml.dll in IE6 11 - (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler
SWF<11. 7.700.252,<11. 9.900.152
FLASH - Memory Corruption
Number of exploits included
2012-1723
2012-1723
2012-0507
2011-3544
2012-1723
2012-1723
2012-0507
2012-1723
2012-1723
2011-3544
2011-3544?
2012-0507
2012-0507
2012-1723
2012-1723
2011-3544
2011-3544
2011-3544
2012-0754
2009-0927
2009-3867 2009-4324 2010-0188
2010-0188
2010-0806 2010-0840
2010-0806
2010-0188
2010-0806
2010-0840
2010-0806 2010-0840
2010-0842
2010-0842 2010-0886
2010-1297
2010-1885
2010-1297
2010-1885
2010-1885
2010-3552
SOCIAL
SOCIAL
SOCIAL
2011-0559 2011-0611 2011-1255
2011-2140
2011-1255
2011-0611
2011-1255 2011-2110
2011-2140
? flash-mp
2011-2110
2011-2110
2011-2140
2011-2140
2011-2110
2011-3402
2011-3544
2011-3544
2011-3544
2011-3544
2011-3544
2011-3544
2011-3544
2011-3544
2011-3402
2011-3402
2011-3402
2011-2140
2012-0507
2012-0507
2012-0775
2012-0775
Removed
2012-1723
2011-3544
2011-3544
2011-3544
2011-3544
2011-3544
2012-0507
2012-0507
Removed
2012-0507
Removed
2012-0754
2012-1723
2012-1723
2012-1723
2012-1723
2011-3544
2011-3544
2011-3544
2011-3544
2011-3544
2011-3544
2012-0003
2012-0507
2012-0507
2012-1723
2012-1723
2012-0507
2012-0507
2012-0754 2012-0775
2012-0507
2012-0507
2012-0507
2012-0507
2012-0507
2012-0507
2012-0507
2012-0779 Unknown CVE 2012-1535 2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1723
2012-1876
2012-4681
2012-4681
2012-5076
2012-5076
2012-4681
2012-4681
2012-4681
2012-4681
2012-4681
2012-5076
2012-5076
2012-1889
2012-1889
2012-4681
2012-4681
2012-1889
2012-4681
2012-4681
2012-5076
2012-5076
2012-4681
2012-4681
2012-4681
2012-4681
2012-4792
2012-1876
2012-1889
2012-1889
2012-4681
2012-4681
2012-1889
2012-1889
2012-1889
2012-4681
2012-4681
2012-4681
2012-4969
2012-4969
2012-4969
2012-4681
2012-4681
2012-4792
2012-5076
2012-5076
2012-5076
2012-4681
2012-4681
2012-4792
2012-4969
2012-5076
2012-5076
2012-5076
2012-5076
2012-5076
2013-0422
2013-0422
2013-0422
2012-0775 2012-1876 2012-1889 2013-0422
2013-0422
2013-0422 2013-0431
2013-0431
2013-0634
2013-0634
2013-0431
2013-0422
2013-0422
2013-0422
2013-0431
2013-0431
2013-0634
2013-0431
2013-0422
2013-0422
2013-0422
2013-0422
2013-0422
2013-0422
2013-0431
2013-0422
2013-0431
2013-0634 2013-1347
2013-0422
2013-0422
2013-0422
2013-0422
2013-0431
2013-0634
2013-0634
2013-1347
20131488 2013-1493
2013-1493
2013-1493
2013-1493
2013-1493
2013-1493
2013-1493
2013-1493
2013-1493
2013-1493
2013-2423
2013-2423
2013-1493
2013-1493
2013-1690 2013-2423
2013-2423
2013-2460
2013-2460
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
2013-2423
SOCIAL 2013-2460
2013-2460
2013-2460
2013-2460
2013-2463 2013-2465
2013-2465
2013-2463
2013-2465
2013-2471
2013-2471 ??
2013-2465 2013-2471
2013-2463
2013-2465
2013-2471
2013-2460
2013-2460
2013-2460
2013-2463
2013-2463
2013-2463
2013-2465 2013-2471
2013-2465 2013-2471
2013-2471
2013-2471
2013-2471 2013-2472
replaced by CVE2013-3918
2013-2551
2013-2551
2013-2551
2013-2551
2013-2551
2013-0074/3896
2013-0074/3896
20130074/3896
2013-2551
2013-2551
2013-2551 CVE-20130074/3896
2013-3918 2013-3897
2013-3897 2013-5329
Nuclear 3.x
6
Nuclear 3.x
5
3
$1,500
$1,500
Nuclear 2.2 - Nuclear 2.1 >
2
10
13
4
1
5?
7
Gong Da / GonDad
Gong Da / GonDad
Redkit 2.2
Goon (found to be Redkit 2.1)
Redkit
Redkit (former Puerto?)
$1,500 Nuclear 2.0
5
2?
3
5?
2?
2?
Fiesta (formerly Neosploit)
Neo Sploit
DotkaChef
Angler
FlashPack (child of SafePack / CritXPack/ Vintage Pack)
Safe Pack
CVE-2010-0188
CVE-2012-4681
CVE-2012-1723 CVE-2012-1723 CVE-2011-3402
CVE-2012-0507
CVE-2011-3544
CVE-2013-2471
CVE-2012-1723 CVE-2012-0507
CVE-2013-0074/3896
CVE-2012-1723
CVE-2012-4681 CVE-2011-3544
CVE-2012-1723
CVE-2012-0003
CVE-2013-1493
CVE-2013-0422 CVE-2012-1723
CVE-2013-0431
CVE-2013-2423 CVE-2013-2423
CVE-2012-5076
CVE-2012-1889
CVE-2012-0507
CVE-2013-2460
CVE-2013-1493 CVE-2012-4681
CVE-2013-0634
CVE-2013-2460 CVE-2013-2460
CVE-2013-0422
CVE-2013-3918 CVE-2013-2551
CVE-2012-1723 CVE-2012-1723 CVE-2013-0422 CVE-2013-0422
CVE-2011-3544
CVE-2012-4681 CVE-2012-5076
CVE-2011-2140
CVE-2013-2551
CVE-2012-0507
CVE-2010-0188 CVE-2010-0188
x2o (Redkit Light)
Exploits in ths pack - listing
CVE-2010-0188 CVE-2010-0188
CVE-2010-0188 CVE-2010-0188 CVE-2010-0188
?
3?
6
4
?
traff
Exploits in ths pack - listing
CVE-2012-1723 CVE-2012-4681
CVE-2013-2423 CVE-2012-5076 CVE-2013-0422 CVE-2013-2423
CVE-2013-2465
CVE-2013-2551
CVE-2012-5692
CVE-20130074/3896
CVE-2013-1493 CVE-2013-0634 CVE-2013-2423 CVE-2013-2551 CVE-2013-5329 CVE-2013-2471 ??
CVE-20130074/3896
CVE-2012-1723
CVE-2013-2551
CVE-2013-2423
9?
6?
2700
2700
3?
6
8
6
6
4?
5
$450-$1350 /mo
$450/mo
Author Paunch arrested in 10-'13
Neutrino
Neutrino
Blackhole (last)
5
Korean language NB Exploiter Version 2.8.4.6
6?
6?
11
1500
1500
10
Magnitude / Death Touch White Lotus (formerly known as Popads)
Popads
CVE-2011-3544 CVE-2011-3402
CVE-20130431
CVE-20132423
CVE-2013-2465 CVE-2012-0507
Social Eng
CVE-20132471
CVE-2012-1723 CVE-2010-0188 CVE-2010-0188 CVE-2010-0188
CVE-2012-1889
CVE-2011-2140 CVE-2011-0611 CVE-2010-3962
CVE-2011-3544 CVE-2013-2460
CVE-2013-0431
CVE-2013-2460
CVE-20132551
CVE-2012-5076 CVE-2011-3544 CVE-2011-3544 CVE-2011-3544
CVE-2012-4681
CVE-2011-3544 CVE-2011-2140 CVE-2011-1255
CVE-2013-0634 CVE-2013-2463*
CVE-2013-1493
CVE-2013-2471
CVE-2007-5659 CVE-2010-0188 CVE-2010-0188 CVE-2007-5659 /2008-0655 /2008-0655 CVE-2012-0507 CVE-2012-0507 CVE-2008-2992 CVE-2008-2992
CVE-2013-0431 CVE-2012-0507 CVE-2012-0507
CVE-20124792*
CVE-2012-0754 CVE-2011-3544 CVE-2011-0611
CVE-2013-2465 CVE-2013-2465*
CVE-2013-2423
and + all or some
CVE-2012-1723 CVE-2012-1723 CVE-2009-0927 CVE-2009-0927
CVE-2013-2551 CVE-2013-0634 CVE-2013-2460 CVE-2013-2471 CVE-2013-2551
Sweet Orange
Sweet Orange Sweet Sweet Sweet Orange 1.? Orange 1.? Orange 1.1 1.0 CVE-2010-0188 CVE-2006-0003 CVE-2006-0003 CVE-2006-0003
CVE-2012-1723 CVE-2012-1723 CVE-2012-4681 CVE-2012-4681
CK (child of Netboom Exploiter) CVE-2011-3544
CK (child of Netboom Exploiter)
CK (child of Netboom Exploiter)
CVE-2011-0611 CVE-2010-0806 CVE- 2010-0806
CVE-2013-0422 CVE-2012-1535 CVE-2012-0003 CVE-2013-0634
Net Boom NB Exploiter
CVE-2011-2110
CVE-2012-1889 CVE-2012-0754 CVE-2011-2140
HiMan (High Load)
CVE-2010-0188 CVE-2013-0431
CVE-2013-2551 CVE-2013-2551
CVE-2012-1723
CVE-2013-0422
exploits
CVE-20130074/3896
from the previous version
Blackhole 2.x Blackhole 2.0 Blackhole 1.2.5 Blackhole 1.2.3 CVE-2006-0003 CVE-2006-0003 CVE-2006-0003 CVE-2006-0003
CVE-2012-4681 CVE-2012-4681 CVE-2010-0188 CVE-2010-0188 CVE-2012-5076 CVE-2012-5076 CVE-2010-1885 CVE-2010-0842
Exploits in ths pack - listing
CVE-2013-0422
CVE-2012-4792
CVE-2012-5076
CVE-2013-3897
CVE-2012-4681
* switch 2463*<>2465*
CVE-2013-0422
CVE-2011-0559 CVE-2010-1885
Exploits in ths pack - listing
CVE-2013-0634
CVE-2012-4969
CVE-2013-0431
* removed
CVE-2012-4969
Possibly + exploits
CVE-2013-0431
CVE-2011-2110 CVE-2011-0559
Exploits in ths pack - listing
CVE-2013-2465
CVE-2012-5076
CVE-2013-2423
from the previous
CVE-2011-3402
CVE-2012-1723 CVE-2011-3544
Exploits in ths pack - listing
CVE-2013-3897
CVE-2012-1889
Exploits in ths pack - listing
CVE-2013-0422 CVE-2013-0634
Exploits in ths pack - listing
CVE-2013-1493
version
5
3
Crime Boss 2013
Crime Boss 2012
?
Crimeboss
CVE- CVE-20112013- 3544 1488 and + CVE-2012all or 4681 some CVE-2013exploits 0422 from CVE-2013the 2423 previous version SOCIAL
5
3
10k/hour = 900$ / 3500$ mo - and more for higher traff
3-5K/mo
Grandsoft
Grandsoft
CVE-2011-3544 CVE-2010-0188 CVE-2010-0188
7
CVE-2006-0003
4
Sakura 1.0
4?
2+?
3?
3
2+?
4
3?
5
11
5+
19?
8
9?
7?
?
Cool
Cool
Cool
Styx 2.x 2013
Styx 2.0
Topic
CVE-2006-0003 CVE-2006-0003
Rawin
Flimkit
Cool EK (Kore-sh)
Sibhost Kore (formely (Urausy/BestAV Cool/Styxy Sibhost) EK)
CVE-2012-5076
CVE-2013-2460 CVE-2013-2423
CVE-2013-1347 cve-2013-2471
CVE-2013-1493 CVE-2013-2423
CVE-2013-2463 CVE-2013-2460
CVE-2013-1493
CVE-2011-3402* CVE-2011-3402 CVE-2012-1876
CVE-2010-0188 CVE-2010-0188 CVE-2011-3544 CVE-2011-3544
CVE-2013-1690
CVE-2013-2423 CVE-2013-2471
CVE-2013-2463
CVE-2013-2423
CVE-2013-0431
CVE-2012-1723 CVE-2013-0634
CVE-2011-3402 CVE-2011-3402 CVE-2012-0507 CVE-2012-0507
CVE-2011-3544 CVE-2011-3544
CVE-2013-2465
CVE-2013-1493
CVE-2013-0422 CVE-2013-2465
CVE-2012-0507 CVE-2012-0507 CVE-2012-1723 CVE-2012-1723
version
CVE-2013-2471
CVE-2013-2423
CVE-2010-0188 CVE-2012-0755
CVE-2007-5659 CVE-2006-0003 CVE-2006-0003 CVE-2007-5659 /2008-0655 /2008-0655
CVE-2012-1723 CVE-2013-2463 CVE-2012-0507 CVE-2012-1723
CVE-2010-0806 CVE-2010-0806 CVE-2010-0842 CVE-2010-0842
exploits from the previous
CVE-2012-4681 CVE-2012-5076
CVE-2010-0188
Styx 4.0
CVE-2013-2460
CVE-2013-2460
cve-2013-2471
Glazunov
and + all or some
CVE-2010-0188 CVE-2011-3544
4
5
6?
2?
5
G01pack
SPL Pack
Serenity Pack
13
4?
Alpha Pack
Impact
CVE-2013-1493 cve-2013-2471 CVE-2013-2423
and + all or some
CVE-2013-0422
CVE-2013-2460 exploits
CVE-2013-2423
CVE-2013-2463
from the previous
CVE-2013-2472 version
CVE-2012-1889 CVE-2012-0507
CVE-2013-2551
CVE-2012-4681
Social Eng
CVE-2012-0775 CVE-2012-0775 CVE-2012-4681 CVE-2012-4681 Unknown CVE CVE-2012-1723 CVE-2012-4969 CVE-2012-4969
CVE-20132423
Nice EK
CVE-2012-1723
KaiXin Nov '12
KaiXin Aug '12
8
7
3?
- $1,800 rent $400/wk $200rent
$150/wk $250/mo
LightsOut
CVE-2013-1493
CVE-2011-3544 CVE-2013-0422
?
1-2K /mo rent
CVE-2013-2423
CVE-2011-3544 CVE-2013-0422
CVE-2013-2463
7
Sakura 1.1
CVE-2013-1347
CVE-2012-4681 SOCIAL
CVE-2013-2423
9-
Sakura 1.x
$1100 / mo rent
Private EK
CritXPack
Whitehole
5
3 2-5K
Red Dot
Assoc AiD no (info from Private name Ad only)
CVE-2010CVE-2011-1255 CVE-2011-1255 CVE-2006-0003 CVE-2012-1723 CVE-2006-0003 CVE-2011-2140 CVE-2007-5659 CVE-2006-0003 CVE-2011-3544 CVE-2012-0507 CVE-2011/2008-0655 3106 0188 CVE-2012CVE-2011-3544 CVE-2011-3544 CVE-2009-0927 CVE-2013-0422 CVE-2010-0188 CVE-2006-0003 CVE-2010-0188 CVE-2010-0188 CVE-2012-1723 CVE-2012-5076 CVE-20121876 1723 CVE-2012CVE-2012-1723 CVE-2012-0507 CVE-2010-1423 CVE-2012-0507 CVE-2008-2992 CVE-2012-1723 CVE-2011-2110 CVE-2012-4681 CVE-2013-0422 CVE-20121880 4681 CVE-2012CVE-2012-1889 CVE-2012-0754 CVE-2010-1885 CVE-2012-4681 CVE-2009-0927 CVE-2012-5076 CVE-2011-3544 CVE-2012-5076 3683 CVE-2012-1723 CVE-2012-1723 CVE-2012-4969 CVE-2009-2477 CVE-2013-0422 CVE-2012-0507 CVE-2013-0422 Unknown CVE CVE-2012-1889 CVE-2013-0422 CVE-2010-0188 CVE-2012-1723 CVE-2013-1493
11
2
1-1.5K
1500
Phoenix 3.1.15
NucSoft
5
9
14
13
4
8
10
10
Zhi Zhu
Incognito v.2
Phoenix 3.1
Eleonore 1.8.91
"Yang Pack"
Techno XPack
Siberia Private
Hierarchy
CVE: 2010-0248 CVE-20100188 CVE-2010-0842 CVE-20120507 CVE-2011-2110
CVE-2010-0806 CVE-2004-0549
CVE-2006-0003 CVE-2006-0003 CVE-2010-0806 CVE-2008-2992 CVE-2005-0055 CVE-2006-0003
CVE-2011-1255 CVE-2007-5659 /2008-0655 CVE-2011-2110 CVE-2008-2992
CVE-2011-2140
CVE-2011-2140 CVE-2009-0927
CVE-2007-5659 CVE-2008-2463 CVE-2011-2110 CVE-2010-0188 CVE-2006-0003 CVE-2009-0927 /2008-0655 CVE-2008-2992 CVE-2010-0188 CVE-2011-2140 CVE-2010-0842 CVE-2007-5659 CVE-2010-0094 /2008-0655 CVE-2008-5353 CVE-2010-0806 CVE-2011-3544 CVE-2010-1297 CVE-2008-2463 CVE-2010-0188
CVE: 2011-2371 CVE-2011-3544
CVE-2012-0003 CVE-2009-4324 CVE-2010-0842
CVE-2009-0927 CVE-2010-0840 CVE-2009-3867 CVE-2010-1885
CVE-2012-1876 CVE-2012-1889 CVE-2013-0431 CVE-2013-0431
CVE-2010-0806
CVE-2012-4681 CVE-2013-2423
CVE-2011-3659
CVE-2010-0886
CVE-2009-4324 CVE-2010-4452
CVE-2010-2884 CVE-2008-2992 CVE-2010-0806 CVE-2010-3552 CVE-2009CVE-2010-0840 0075/0076 CVE-2010-3654 CVE-2009-0927 CVE-2010-1297
CVE-2012-1889 CVE-2012-4681 Social Eng
CVE-2010-0840
CVE-2012-4792
CVE-2012-0500
CVE-2010-1885
CVE-2010-0188 CVE-2011-0558
SOCIAL
CVE-2012-4681
CVE-2010-2883
CVE-2013-2423
CVE-2012-0507
CVE-2012-0507
CVE-2010-0840 CVE-2011-0559
CVE-2009-4324 CVE-2011-0611
CVE-2010-0886 CVE-2011-0611
CVE-2010-0806
CVE-2012-4792
CVE-2010-3552
CVE-2012-5076 CVE-2012-1876
CVE-2012-1723 CVE-2012-1889
CVE-2010-1240 CVE-2011-2462 CVE-2010-1297 CVE-2011-3521
CVE-2012-1889
CVE-2012-4681
CVE-2011-3544 CVE-2011-3544
CVE-2013-0422
Exploits in ths pack - listing
CVE-2013-0431 CVE-2013-0437 CVE-2013-1347 CVE-2013-1690
Exploits in ths pack - listing
Social Eng
Exploits in ths pack - listing
2009-0927
2009-4324
2011-0559
2012-1876
Exploits in ths pack - listing
Exploits in ths pack - listing
2008-2992
2012-3683
Exploits in ths pack - listing
Exploits in ths pack - listing
2008-2992
2009-0927
2012-5692
Exploits in ths pack - listing
Exploits in ths pack - listing
01-'12
2008-2463
2008-2992
2010-0806
2012-0003
2012-0507
2012-4969
Last Update date:
Exploits in ths pack - listing
Hierarchy
2006-0003
2012-1880
By Mila Jan 21, 2014
Exploits in ths pack - listing
01-'12
2006-0003 2007-5659 /2008-0655
SOCIAL
6
Exploits in ths pack - listing
Siberia Private
2012-0500
Notes
Product / type . < means that v. and Exploit Description (CLICK ON CELLS 2 SEE TEXT) below
01-'12
2011-3659
JAVA Memory Corruption Vulnerability
CVE-2013-5329 on Flash 11.9.900.117
Techno XPack
01-'12
2010-0188
2010-0842
2011-3402
2012-0003
2012-0507
JAVA < 7 Update 21, < 6 Update 45, and < 5.0 Update 45, and OpenJDK 7 - Incorrect IntegerComponentRaster size checks JAVA < SE 7 Update 21, < 6 Update 45, < 5.0 Update 45, and OpenJDK 7 Incorrect ShortBandedRaster size checks in 2D
CVE-2013-3918
"Yang Pack"
03-'12
2006-0003
2007-5659 /2008-0655
2011-3521
Self-Generated fake cert Social Eng
CVE-2013-3897
Eleonore 1.8.91
03-'12
2006-0003
Phoenix 3.1
2011-2462
JAVA The color mgmnt (CMM) functionality in the 2D - an outof-bounds read or memory corruption in the JVM
Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7 "insufficient access checks" in the tracing component. JAVA < Update 21 6 Update 45 and earlier, and< 5.0 Update 45, and OpenJDK 7 -Incorrect image attribute verification in 2D.
2010-0188
2010-1885
FF < 22.0, FF ESR 17.x before 17.0.7, TBird < 17.0.7, and TBird ESR 17.x< 17.0.7 do not properly handle onreadystatechange events with page reloading,
JAVA SE 7 Update 17 and earlier allows remote attackers to
-
2012
2007-5659 /2008-0655
2011-2371
2013-0634
-
Incognito v.2
2011-3106
2013-0422
-
02-'12
2008-2992
2011-2110
2011-3402
2012-1889
Java
Zhi Zhu
2012
2011-0611
IE Microsoft Internet Explorer 8 improper object handling in memory JAVA via unspecified vectors involving reflection, Libraries, "improper toString calls," and the JDBC driver manager
Java < Java7u17 affect integrity via unknown vectors related to HotSpot.
NucSoft
05-'12
2011-0558
2013-0634
Java < 7u15 6u41 FF < 22, Tbird < 17.0.7
Phoenix 3.1.15
2006-0003
2010-4452
2013-0422
IE 8 Java <7u17, 6, 7
Java < 7u21 6u45 Java < 7u21 6u45 Java < 7u21 6u45 Java < 7u21 6u45 Java < 7u21 6u45
11-'12
2010-0806
2010-1885
SOCIAL
2011-0559 2011-0611
2011-2110
JAVA: abuses the JMX classes from a Java Applet to run arbitrary Java code outside of the sandbox JAVA Unspecified vulnerability in the Java Runtime Environment (JRE) via unknown vectors related to 2D.
Java 7u11
SWF<10.3.183.51 FLASH Buffer overflow in Adobe Flash Player via crafted SWF content, as exploited in the wild in February 2013. (win)
Social Fake Cert
Impact
2007-5659 /2008-0655
2011-1255
2012-1889
< Java 7u11 Java 7u11
CVE-2013-1347 IE UAF CVE-2013-1488
the newer kits/versions
Neutrino
10-'13
2011-0611
JAVA: JMB/MBEAN and Reflection API allow a crafted applet to bypass SecurityManager restrictions 2013-0422 2013-0422 2013-0422
WIN XP-7, Srv2003-2008
CVE-2013-0437
Legend:
HiMan (High Load)
2010-2011
2010-3654
JAVA Arbitrary Code Execution
CVE-2013-0634
Grey Column Old(er) kit [versions] for header Text in reference and comparison with Italic
2010-0188
PHP vuln. in admin/sources/base/core.php in Invision Power Board IPB or IP.Board) 3.1.x- 3.3.x JAVA The JavaScript implementation in Adobe Reader and Acrobat 9.x < 9.5.1 and 10.x < 10.1.3 - (memory corruption) IE aka "Col Element Remote Code Execution Vulnerability," by VUPEN - Pwn2Own competition at CanSecWest 2012. WIN: - Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 memory corruption via a crafted web site.
CVE-2013-0422
slang/shorthand (CLICK ON CELLS 2 SEE TEXT)
2010-0188
<Java 7u8
CVE-2013-0431
CVE
2010-0188
IP.Board) 3.1.x through 3.3.x PDF < 9.51 and < 10.1.3 IE 6-9, 10
w Click2play bypass
Net Boom NB Exploiter
04-'12
2010-3962
IE Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll
CVE-20132551 CVE-20130074/3896
CK (child of Netboom Exploiter)
03-'13
2010-2884
JAVA _crafted applet that bypasses SecurityManager restrictions
CVE-2013-2472
CK (child of Netboom Exploiter)
11-'13
2010-3552
Use-after-free vulnerability,inCDwnBindInfo object, and exploited in the wild in December 2012.
Java Type
CK (child of Netboom Exploiter)
2010-2883
IE 6-9
Java Raster
05-'12
2006-0003
2010-0248
<Java 7u6
w click2play bypass
09-'12
2006-0003
2010-1885
IE 6-8
w click2play bypass
09-'12
2006-0003
2010-1297
CVE-2012-4969 IE 6-9
CVE-2013-2465
03-'13
2010-1423
CVE-2012-4681 Java Gondvv / Gondzz
CVE-2013-2471
Sweet Sweet Sweet Orange Sweet Orange Orange 1.? Orange 1.1 1.0
2010-0094
CVE-2012-4792 IE 6-8
CVE-2013-2463
11-'13
SWF<10.3.183.15, FLASH Player allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. 11.1.102.62 PDF < 10.1.3, < ADOBE PDF JavaScript implementation allows arbitrary code execution 9.5.1 SWF<10.3.183.19, ADOBE FLASH (via IE?)- object type confusion 11.2.202.235 SWF<10.3.183.23, Claims to have some private flash exploit 11.4.402.265 SWF < Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux -SWF content in a Word document. 11.3.300.271
CVE-2012-3683 Safari Webkit
CVE-2013-2460
Sweet Orange
02-'13
2010-1240
IE _ insertRow Remote Code Execution Vulnerability
CVE-2013-1690
Popads
11-'13
2010-0886
IE 6-9
CVE-2013-2423
Magnitude / Death Touch (formerly known as Popads)
11-'13
2010-0840
CVE-2012-1880 IE InsertRow
CVE-2013-1493 Java CMM
White Lotus
04-'13
2010-0842
JAVA Remote Code Execution
XML
Safe Pack
12-'13
2010-0806
IE _ from VUPEN's Pwn2Own demo at CanSecWest 2012. Col Element Remote Code Execution Vulnerability
2012-1889
FlashPack (child of SafePack / CritXPack/ Vintage Pack)
12-'13
2009-4324 2010-0188
Java 6u32, 7u4
CVE-2012-0775 PDF 9. 10
Angler
12-'13
20090075/0076
IE 6-10
CVE-2012-1876 IE 6-9, 10
DotkaChef
09-'12
2009-3867
CVE-2012-1723 Java Byte / verifier
CVE-2012-5076 JAX-WS
Neo Sploit
01-'14
2008-5353
CVE-2012-1876 IE 6-10
CVE-2012-5692
Fiesta (formerly Neosploit)
2008-2463
FIREFOX 8/9_ AttributeChildRemoved() Use-After-Free.
MS MEDIA PLAYER _vulnerability in winmm.dll in Windows Multimedia Library in Windows Media Player (WMP) JAVA _Sun Java Web Start Plugin Command Line Argument Injection (2012)
Unknown CVE
08-'13
2009-2477
FIREFOX Bootstrapped Addon Social Engineering Code Execution
Java 6u30, 7u2
CVE-2012-1535 Flash SWF in Word
x2o (Redkit Light)
before 04-'13
JAVA _Vulnerability in the Rhino Script Engine
Java 6u30, 7u2
CVE-2012-0779 Flash
Redkit
05-'13
2005-0055
FF <3.6.26 ,4.9
WMP MIDI
CVE-2012-0754 MP4 Overflow
Redkit
11-'13
2004-0549
FF < 4
CVE-2012-0507 Java Atomic
CVE-2012-0775
Goon (found to be Redkit 2.1)
12-'13
WIN XP-2008 via WINDOWS XP, 2003, 2008 TrueType Font Parsing Vulnerability IE
CVE-2012-0500 Web Start Plugin
CVE-2012-0003
Redkit 2.x
03-'13
ADOBE FLASH _ Flash memory corruption August-2011 MP4 SequenceParameterSetNALUnit Buffer Overflow
FF < 4.0.1
CVE-2011-2462 PDF U3D
CVE-2011-3402
Gong Da / GonDad
12-'13
PDF Exploit Adobe Reader Stack-based buffer overflow in CoolType.dll
PDF < 9.4
Java < 6u21
CVE-2011-2140 MP4 sequence
Gong Da / GonDad
03-'12
MS HCP _ Help Center URL Validation Vulnerability
CVE-2010-2884 authplay.dll
CVE-2011-0559 Flash 10 by exm
Nuclear 2.0
03-'12
IE MS10-002 Internet Explorer Object Memory Use-After-Free
CVE-2010-3552 JAVA SKYLINE / docbase
CVE-2011-0611 Flash 10
Nuclear 2.1
03-'12
Java Deployment Toolkit Remote Argument Injection Vulnerability (Taviso)
IE Object Memory Use-AfterIE 6, 7, 8 Free
CVE-2011-0558 Flash <10.2
Nuclear 2.2
11-'13
Java < 6u18
PDF < 9.3.3
CVE-2010-2883 PDF FONT / Cooltype
Nuclear 3.x
01-'14
Java < 6u18
CVE-2010-0886 JAVA SMB / JAVA JDT CVE-2010-1240 PDFOPEN
CVE: 20100248
Nuclear 3.x
CVE-2012-0779
CVE-2012-0507
CVE-2009-3867 CVE-2010-1885
PDF_Document rule MSOfficeSnapshotViewer { meta: ref = "CVE-2008-2463" impact = 7 strings: $cve20082463 = /(F0E42D50|F0E42D60|F2175210)-368C-11D0-AD81-00A0C90DC8D9/ nocase condition: 1 of them }
rule cf_pdf_cve_2007_5659 (pdf_Document) { meta: maltype = "all" filetype = "pdf" yaraexchange = "No distribution without author's consent" author = "Michael Remen" source = "Yara Exchange" date = "2012-08" version = "1.0" cve = "CVE-2007-5659" strings: $a = {255044462d} $b = {7961727073} $c = {6570616373656e75} $d = {6e6f6974636e7566} $e = {7961727241} condition: all of them }
rule ShellcodePattern { meta: impact = 1 //while testing hide = true strings: $unescape = "unescape" fullword nocase $shellcode = /%u[A-Fa-f0-9]{4}/ $shellcode5 = /(%u[A-Fa-f0-9]{4}){5}/ condition: ($unescape and $shellcode) or $shellcode5 }
rule Utilprintf: decodedPDF { meta: ref = "CVE-2008-2992" hide = true strings: $cve20082992 = "util.printf" nocase fullword condition: 1 of them } rule cf_java_execute_write { meta: author = "Glenn Edwards (@hiddenillusion)" version = "0.1" ref = "http://docs.oracle.com" maltype = "all" filetype = "jar" yaraexchange = "No distribution without author's consent" date = "2012-09" strings: $magic = { CA FE BA BE } /* Local execution */ $exec0 = "Runtime.getRuntime" $exec1 = "exec" /* Exploit */ $exp0 = /arrayOf(Byte|String)/ $exp1 = "toByteArray" $exp2 = "HexDecode" $exp3 = "StringtoBytes" $exp6 = "InputStream" $exp7 = "Exception.printStackTrace" $fwrite0 = "FileOutputStream" /*contains a byte stream with the serialized representation of an object given to its constructor*/ $fwrite3 = "MarshalledObject" $fwrite4 = "writeObject" $fwrite5 = "OutputStreamWriter" /* Loader indicators */ $load0 = "getResourceAsStream" $load1 = /l(port|host)/ $load2 = "ObjectInputStream" $load3 = "ArrayOfByte" //$gen1 = "file://" condition: $magic at 0 and ((all of ($exec*) and 2 of ($fwrite*)) or (2 of ($exp*) and 2 of ($load*))) }
rule DecodedGenericCLSID : decodedOnly { meta: impact = 0 strings: $a = "02d55ba8-adf8-4a31-a685-f2f8e1e9e63d" $b = "9af45c85-b20b-4f64-8ecb-78eafca2fc53" condition: all of them }
rule cf_pdf_suspicious_obfuscation : pdf { meta: author = "Glenn Edwards (@hiddenillusion)" version = "0.1" weight = 2 maltype = "all" filetype = "pdf" yaraexchange = "No distribution without author's consent" strings: $magic = { 25 50 44 46 } $reg = /\/\w#[a-zA-Z0-9]{2}#[a-zA-Z0-9]{2}/ condition: $magic at 0 and #reg > 5 }
rule collectEmailInfo: decodedPDF { meta: ref = "CVE-2007-5659" hide = true strings: $cve20075659 = "collab.collectEmailInfo" nocase fullword condition: 1 of them }
rule DecodedGenericCLSID : decodedOnly { meta: impact = 0 strings: $a = "56bfcce4-6106-4bb0-be9c-12181cab7f4b" nocase $b = "e61eea32-6d31-4dc4-9842-b7f83d9edb5f" nocase condition: 1 of them }
rule cf_pdf_suspicious_obfuscation : pdf { meta: author = "Glenn Edwards (@hiddenillusion)" version = "0.1" weight = 2 maltype = "all" filetype = "pdf" yaraexchange = "No distribution without author's consent" strings: $magic = { 25 50 44 46 } $reg = /\/\w#[a-zA-Z0-9]{2}#[a-zA-Z0-9]{2}/ condition: $magic at 0 and #reg > 5 }
*vmdetect 000569 $vmware_mac_1c
rule CollabgetIcon: decodedPDF { meta: ref = "CVE-2009-0927" hide = true strings: $cve20090927 = "collab.getIcon" nocase fullword condition: 1 of them }
rule ShellcodePattern { meta: impact = 1 //while testing hide = true strings: $unescape = "unescape" fullword nocase $shellcode = /%u[A-Fa-f0-9]{4}/ $shellcode5 = /(%u[A-Fa-f0-9]{4}){5}/ condition: ($unescape and $shellcode) or $shellcode5 }
rule PDFobfuscation: decodedPDF { meta: impact = 5 strings: $cveNOMATCH = "collab[" nocase condition: 1 of them }
rule ShellcodePattern { meta: impact = 1 //while testing hide = true strings: $unescape = "unescape" fullword nocase $shellcode = /%u[A-Fa-f0-9]{4}/ $shellcode5 = /(%u[A-Fa-f0-9]{4}){5}/ condition: ($unescape and $shellcode) or $shellcode5 }
rule PDFobfuscation: decodedPDF { meta: impact = 5 strings: $cveNOMATCH = "collab[" nocase condition: 1 of them }
//hidden collab string
rule DecodedGenericCLSID : decodedOnly { meta: impact = 0 strings: $a = "D27CDB6E-AE6D-11cf-96B8-444553540000" nocase condition: 1 of them }
rule Utilprintf: decodedPDF { meta: ref = "CVE-2008-2992" hide = true strings: $cve20082992 = "util.printf" nocase fullword condition: 1 of them } rule DecodedIframe: decodedOnly { meta: impact = 0 hide = true strings: $iframe = "<iframe" nocase fullword
//possible in the future, if alerts are too common: //style\s*=["'\s\\]*([a-z0-9:\s]+;\s*)?(display\s*:\s*none|visibility\s*:\s*hidden) //(width|height)\s*=["'\s\\]*[01]["'\s\\>] //style=['"]display:none['"]>\s*<iframe //src\s*=\s*['"\s\\]*(&#\d+){10} //advertisers use DecodedIframe all the time //maybe domain name whitelisting? condition: 1 of them }
rule dyndns_d_la { strings: $a = "d.la" condition: $a }
rule dyndns_sytes_net { strings: $a = "sytes.net" condition: $a }
//hidden collab string
rule GEN_XOR_256bit_This_program_cannot_decremented { meta: author = "villys777@gmail.com" source = "Yara Exchange" date = "2012-08" version = "2.0" description = "encoded with decremented xor key executable" string = "This program cannot be run" byte_encode = true
rule mediaNewplayer: decodedPDF { meta: ref = "CVE-2009-4324" hide = true strings: $cve20094324 = "media.newPlayer" nocase fullword condition: 1 of them }
strings: $a1 = { 55 68 96 8d dd 8c 89 95 9e 8a 96 9b d5 97 92 9c 9f 9f 9b ce 8f 89 cb 98 9c 86} $a2 = { 56 69 69 8c de 8d 8e 94 9d 8b 99 9a d6 96 95 9d 9c 9e 84 cf 8c 88 cc 99 9f 87} $a3 = { 57 6a 68 73 df 8e 8f 93 9c 88 98 95 d7 95 94 9a 9d 9d 85 d0 8d 8b cd 9e 9e 84} $a4 = { 50 6b 6b 72 20 8f 8c 92 9b 89 9b 94 d8 94 97 9b 9a 9c 86 d1 92 8a ce 9f 99 85} $a5 = { 51 6c 6a 71 21 70 8d 91 9a 8e 9a 97 d9 9b 96 98 9b 9b 87 d2 93 95 cf 9c 98 82} $a6 = { 52 6d 6d 70 22 71 72 90 99 8f 9d 96 da 9a 99 99 98 9a 80 d3 90 94 d0 9d 9b 83} $a7 = { 53 6e 6c 77 23 72 73 6f 98 8c 9c 91 db 99 98 96 99 99 81 d4 91 97 d1 82 9a 80} $a8 = { 5c 6f 6f 76 24 73 70 6e 67 8d 9f 90 dc 98 9b 97 96 98 82 d5 96 96 d2 83 85 81} $a9 = { 5d 60 6e 75 25 74 71 6d 66 72 9e 93 dd 9f 9a 94 97 97 83 d6 97 91 d3 80 84 9e} $a10 = { 5e 61 61 74 26 75 76 6c 65 73 61 92 de 9e 9d 95 94 96 8c d7 94 90 d4 81 87 9f} $a11 = { 5f 62 60 7b 27 76 77 6b 64 70 60 6d df 9d 9c 92 95 95 8d d8 95 93 d5 86 86 9c} $a12 = { 58 63 63 7a 28 77 74 6a 63 71 63 6c 20 9c 9f 93 92 94 8e d9 9a 92 d6 87 81 9d} $a13 = { 59 64 62 79 29 78 75 69 62 76 62 6f 21 63 9e 90 93 93 8f da 9b 9d d7 84 80 9a} $a14 = { 5a 65 65 78 2a 79 7a 68 61 77 65 6e 22 62 61 91 90 92 88 db 98 9c d8 85 83 9b} $a15 = { 5b 66 64 7f 2b 7a 7b 67 60 74 64 69 23 61 60 6e 91 91 89 dc 99 9f d9 8a 82 98} $a16 = { 44 67 67 7e 2c 7b 78 66 6f 75 67 68 24 60 63 6f 6e 90 8a dd 9e 9e da 8b 8d 99} $a17 = { 45 78 66 7d 2d 7c 79 65 6e 7a 66 6b 25 67 62 6c 6f 6f 8b de 9f 99 db 88 8c 96} $a18 = { 46 79 79 7c 2e 7d 7e 64 6d 7b 69 6a 26 66 65 6d 6c 6e 74 df 9c 98 dc 89 8f 97} $a19 = { 47 7a 78 63 2f 7e 7f 63 6c 78 68 65 27 65 64 6a 6d 6d 75 20 9d 9b dd 8e 8e 94} $a20 = { 40 7b 7b 62 30 7f 7c 62 6b 79 6b 64 28 64 67 6b 6a 6c 76 21 62 9a de 8f 89 95} $a21 = { 41 7c 7a 61 31 60 7d 61 6a 7e 6a 67 29 6b 66 68 6b 6b 77 22 63 65 df 8c 88 92} $a22 = { 42 7d 7d 60 32 61 62 60 69 7f 6d 66 2a 6a 69 69 68 6a 70 23 60 64 20 8d 8b 93} $a23 = { 43 7e 7c 67 33 62 63 7f 68 7c 6c 61 2b 69 68 66 69 69 71 24 61 67 21 72 8a 90} $a24 = { 4c 7f 7f 66 34 63 60 7e 77 7d 6f 60 2c 68 6b 67 66 68 72 25 66 66 22 73 75 91} $a25 = { 4d 70 7e 65 35 64 61 7d 76 62 6e 63 2d 6f 6a 64 67 67 73 26 67 61 23 70 74 6e} $a26 = { 4e 71 71 64 36 65 66 7c 75 63 71 62 2e 6e 6d 65 64 66 7c 27 64 60 24 71 77 6f} $a27 = { 4f 72 70 6b 37 66 67 7b 74 60 70 7d 2f 6d 6c 62 65 65 7d 28 65 63 25 76 76 6c} $a28 = { 48 73 73 6a 38 67 64 7a 73 61 73 7c 30 6c 6f 63 62 64 7e 29 6a 62 26 77 71 6d} $a29 = { 49 74 72 69 39 68 65 79 72 66 72 7f 31 73 6e 60 63 63 7f 2a 6b 6d 27 74 70 6a} $a30 = { 4a 75 75 68 3a 69 6a 78 71 67 75 7e 32 72 71 61 60 62 78 2b 68 6c 28 75 73 6b} $a31 = { 4b 76 74 6f 3b 6a 6b 77 70 64 74 79 33 71 70 7e 61 61 79 2c 69 6f 29 7a 72 68} $a32 = { 74 77 77 6e 3c 6b 68 76 7f 65 77 78 34 70 73 7f 7e 60 7a 2d 6e 6e 2a 7b 7d 69} $a33 = { 75 48 76 6d 3d 6c 69 75 7e 6a 76 7b 35 77 72 7c 7f 7f 7b 2e 6f 69 2b 78 7c 66} $a34 = { 76 49 49 6c 3e 6d 6e 74 7d 6b 79 7a 36 76 75 7d 7c 7e 64 2f 6c 68 2c 79 7f 67} $a35 = { 77 4a 48 53 3f 6e 6f 73 7c 68 78 75 37 75 74 7a 7d 7d 65 30 6d 6b 2d 7e 7e 64} $a36 = { 70 4b 4b 52 00 6f 6c 72 7b 69 7b 74 38 74 77 7b 7a 7c 66 31 72 6a 2e 7f 79 65} $a37 = { 71 4c 4a 51 01 50 6d 71 7a 6e 7a 77 39 7b 76 78 7b 7b 67 32 73 75 2f 7c 78 62} $a38 = { 72 4d 4d 50 02 51 52 70 79 6f 7d 76 3a 7a 79 79 78 7a 60 33 70 74 30 7d 7b 63} $a39 = { 73 4e 4c 57 03 52 53 4f 78 6c 7c 71 3b 79 78 76 79 79 61 34 71 77 31 62 7a 60} $a40 = { 7c 4f 4f 56 04 53 50 4e 47 6d 7f 70 3c 78 7b 77 76 78 62 35 76 76 32 63 65 61} $a41 = { 7d 40 4e 55 05 54 51 4d 46 52 7e 73 3d 7f 7a 74 77 77 63 36 77 71 33 60 64 7e} $a42 = { 7e 41 41 54 06 55 56 4c 45 53 41 72 3e 7e 7d 75 74 76 6c 37 74 70 34 61 67 7f} $a43 = { 7f 42 40 5b 07 56 57 4b 44 50 40 4d 3f 7d 7c 72 75 75 6d 38 75 73 35 66 66 7c} $a44 = { 78 43 43 5a 08 57 54 4a 43 51 43 4c 00 7c 7f 73 72 74 6e 39 7a 72 36 67 61 7d} $a45 = { 79 44 42 59 09 58 55 49 42 56 42 4f 01 43 7e 70 73 73 6f 3a 7b 7d 37 64 60 7a} $a46 = { 7a 45 45 58 0a 59 5a 48 41 57 45 4e 02 42 41 71 70 72 68 3b 78 7c 38 65 63 7b} $a47 = { 7b 46 44 5f 0b 5a 5b 47 40 54 44 49 03 41 40 4e 71 71 69 3c 79 7f 39 6a 62 78} $a48 = { 64 47 47 5e 0c 5b 58 46 4f 55 47 48 04 40 43 4f 4e 70 6a 3d 7e 7e 3a 6b 6d 79} $a49 = { 65 58 46 5d 0d 5c 59 45 4e 5a 46 4b 05 47 42 4c 4f 4f 6b 3e 7f 79 3b 68 6c 76} $a50 = { 66 59 59 5c 0e 5d 5e 44 4d 5b 49 4a 06 46 45 4d 4c 4e 54 3f 7c 78 3c 69 6f 77} $a51 = { 67 5a 58 43 0f 5e 5f 43 4c 58 48 45 07 45 44 4a 4d 4d 55 00 7d 7b 3d 6e 6e 74} $a52 = { 60 5b 5b 42 10 5f 5c 42 4b 59 4b 44 08 44 47 4b 4a 4c 56 01 42 7a 3e 6f 69 75} $a53 = { 61 5c 5a 41 11 40 5d 41 4a 5e 4a 47 09 4b 46 48 4b 4b 57 02 43 45 3f 6c 68 72} $a54 = { 62 5d 5d 40 12 41 42 40 49 5f 4d 46 0a 4a 49 49 48 4a 50 03 40 44 00 6d 6b 73} $a55 = { 63 5e 5c 47 13 42 43 5f 48 5c 4c 41 0b 49 48 46 49 49 51 04 41 47 01 52 6a 70} $a56 = { 6c 5f 5f 46 14 43 40 5e 57 5d 4f 40 0c 48 4b 47 46 48 52 05 46 46 02 53 55 71} $a57 = { 6d 50 5e 45 15 44 41 5d 56 42 4e 43 0d 4f 4a 44 47 47 53 06 47 41 03 50 54 4e} $a58 = { 6e 51 51 44 16 45 46 5c 55 43 51 42 0e 4e 4d 45 44 46 5c 07 44 40 04 51 57 4f} $a59 = { 6f 52 50 4b 17 46 47 5b 54 40 50 5d 0f 4d 4c 42 45 45 5d 08 45 43 05 56 56 4c} $a60 = { 68 53 53 4a 18 47 44 5a 53 41 53 5c 10 4c 4f 43 42 44 5e 09 4a 42 06 57 51 4d} $a61 = { 69 54 52 49 19 48 45 59 52 46 52 5f 11 53 4e 40 43 43 5f 0a 4b 4d 07 54 50 4a} $a62 = { 6a 55 55 48 1a 49 4a 58 51 47 55 5e 12 52 51 41 40 42 58 0b 48 4c 08 55 53 4b} $a63 = { 6b 56 54 4f 1b 4a 4b 57 50 44 54 59 13 51 50 5e 41 41 59 0c 49 4f 09 5a 52 48} $a64 = { 14 57 57 4e 1c 4b 48 56 5f 45 57 58 14 50 53 5f 5e 40 5a 0d 4e 4e 0a 5b 5d 49} $a65 = { 15 28 56 4d 1d 4c 49 55 5e 4a 56 5b 15 57 52 5c 5f 5f 5b 0e 4f 49 0b 58 5c 46} $a66 = { 16 29 29 4c 1e 4d 4e 54 5d 4b 59 5a 16 56 55 5d 5c 5e 44 0f 4c 48 0c 59 5f 47} $a67 = { 17 2a 28 33 1f 4e 4f 53 5c 48 58 55 17 55 54 5a 5d 5d 45 10 4d 4b 0d 5e 5e 44} $a68 = { 10 2b 2b 32 60 4f 4c 52 5b 49 5b 54 18 54 57 5b 5a 5c 46 11 52 4a 0e 5f 59 45} $a69 = { 11 2c 2a 31 61 30 4d 51 5a 4e 5a 57 19 5b 56 58 5b 5b 47 12 53 55 0f 5c 58 42} $a70 = { 12 2d 2d 30 62 31 32 50 59 4f 5d 56 1a 5a 59 59 58 5a 40 13 50 54 10 5d 5b 43} $a71 = { 13 2e 2c 37 63 32 33 2f 58 4c 5c 51 1b 59 58 56 59 59 41 14 51 57 11 42 5a 40} $a72 = { 1c 2f 2f 36 64 33 30 2e 27 4d 5f 50 1c 58 5b 57 56 58 42 15 56 56 12 43 45 41} $a73 = { 1d 20 2e 35 65 34 31 2d 26 32 5e 53 1d 5f 5a 54 57 57 43 16 57 51 13 40 44 5e} $a74 = { 1e 21 21 34 66 35 36 2c 25 33 21 52 1e 5e 5d 55 54 56 4c 17 54 50 14 41 47 5f} $a75 = { 1f 22 20 3b 67 36 37 2b 24 30 20 2d 1f 5d 5c 52 55 55 4d 18 55 53 15 46 46 5c} $a76 = { 18 23 23 3a 68 37 34 2a 23 31 23 2c 60 5c 5f 53 52 54 4e 19 5a 52 16 47 41 5d} $a77 = { 19 24 22 39 69 38 35 29 22 36 22 2f 61 23 5e 50 53 53 4f 1a 5b 5d 17 44 40 5a} $a78 = { 1a 25 25 38 6a 39 3a 28 21 37 25 2e 62 22 21 51 50 52 48 1b 58 5c 18 45 43 5b} $a79 = { 1b 26 24 3f 6b 3a 3b 27 20 34 24 29 63 21 20 2e 51 51 49 1c 59 5f 19 4a 42 58} $a80 = { 04 27 27 3e 6c 3b 38 26 2f 35 27 28 64 20 23 2f 2e 50 4a 1d 5e 5e 1a 4b 4d 59} $a81 = { 05 38 26 3d 6d 3c 39 25 2e 3a 26 2b 65 27 22 2c 2f 2f 4b 1e 5f 59 1b 48 4c 56} $a82 = { 06 39 39 3c 6e 3d 3e 24 2d 3b 29 2a 66 26 25 2d 2c 2e 34 1f 5c 58 1c 49 4f 57} $a83 = { 07 3a 38 23 6f 3e 3f 23 2c 38 28 25 67 25 24 2a 2d 2d 35 60 5d 5b 1d 4e 4e 54} $a84 = { 00 3b 3b 22 70 3f 3c 22 2b 39 2b 24 68 24 27 2b 2a 2c 36 61 22 5a 1e 4f 49 55} $a85 = { 01 3c 3a 21 71 20 3d 21 2a 3e 2a 27 69 2b 26 28 2b 2b 37 62 23 25 1f 4c 48 52} $a86 = { 02 3d 3d 20 72 21 22 20 29 3f 2d 26 6a 2a 29 29 28 2a 30 63 20 24 60 4d 4b 53} $a87 = { 03 3e 3c 27 73 22 23 3f 28 3c 2c 21 6b 29 28 26 29 29 31 64 21 27 61 32 4a 50} $a88 = { 0c 3f 3f 26 74 23 20 3e 37 3d 2f 20 6c 28 2b 27 26 28 32 65 26 26 62 33 35 51} $a89 = { 0d 30 3e 25 75 24 21 3d 36 22 2e 23 6d 2f 2a 24 27 27 33 66 27 21 63 30 34 2e} $a90 = { 0e 31 31 24 76 25 26 3c 35 23 31 22 6e 2e 2d 25 24 26 3c 67 24 20 64 31 37 2f} $a91 = { 0f 32 30 2b 77 26 27 3b 34 20 30 3d 6f 2d 2c 22 25 25 3d 68 25 23 65 36 36 2c} $a92 = { 08 33 33 2a 78 27 24 3a 33 21 33 3c 70 2c 2f 23 22 24 3e 69 2a 22 66 37 31 2d} $a93 = { 09 34 32 29 79 28 25 39 32 26 32 3f 71 33 2e 20 23 23 3f 6a 2b 2d 67 34 30 2a} $a94 = { 0a 35 35 28 7a 29 2a 38 31 27 35 3e 72 32 31 21 20 22 38 6b 28 2c 68 35 33 2b} $a95 = { 0b 36 34 2f 7b 2a 2b 37 30 24 34 39 73 31 30 3e 21 21 39 6c 29 2f 69 3a 32 28} $a96 = { 34 37 37 2e 7c 2b 28 36 3f 25 37 38 74 30 33 3f 3e 20 3a 6d 2e 2e 6a 3b 3d 29} XOR_embeded_exefile_xored_with_round_256_bytes_key $a97 = { 35 08 36 2d 7d 2c 29 35 3e 2a 36 3b 75 37 32 3c 3f 3frule 3b 6e 2f 29 6b 38 3c 26} //Yara Distribution and sharing prohibited without author's $a98 = { 36 09 09 2c 7e 2d 2e 34 3d 2b 39 3a 76 36 35 3d 3c 3e 24 6fExchange: 2c 28 6c 39 3f 27} $a99 = { 37 0a 08 13 7f 2e 2f 33 3c 28 38 35 77 35 34 3a 3d 3dconsent. 25 70 2dContact: 2b 6d 3eyara@deependresearch.org 3e 24} { 26 71 32 2a 6e 3f 39 25} $a100 = { 30 0b 0b 12 40 2f 2c 32 3b 29 3b 34 78 34 37 3b 3a 3c $a101 = { 31 0c 0a 11 41 10 2d 31 3a 2e 3a 37 79 3b 36 38 3b meta: 3b 27 72 33 35 6f 3c 38 22} author = "villys777@gmail.com" $a102 = { 32 0d 0d 10 42 11 12 30 39 2f 3d 36 7a 3a 39 39 38 3a 20 73 30 34 70 3d 3b 23} description encoded with increment or decremented $a103 = { 33 0e 0c 17 43 12 13 0f 38 2c 3c 31 7b 39 38 36 39 39 21 74 31 =37"executable 71 22 3a 20} $a104 = { 3c 0f 0f 16 44 13 10 0e 07 2d 3f 30 7c 38 3b 37 36 38one 22 byte 75 36xor 36key" 72 23 25 21} decription = 31 "extension $a105 = { 3d 00 0e 15 45 14 11 0d 06 12 3e 33 7d 3f 3a 34 37 37 23 76 37 73 20 24PDF,XLS,DOC,PPT" 3e} = "Yara $a106 = { 3e 01 01 14 46 15 16 0c 05 13 01 32 7e 3e 3d 35 34 source 36 2c 77 34 30 Exchange" 74 21 27 3f} date = "2012-07" $a107 = { 3f 02 00 1b 47 16 17 0b 04 10 00 0d 7f 3d 3c 32 35 35 2d 78 35 33 75 26 26 3c} byte_encode true27 21 3d} $a108 = { 38 03 03 1a 48 17 14 0a 03 11 03 0c 40 3c 3f 33 32 34 2e 79 3a 32= 76 strings: $a109 = { 39 04 02 19 49 18 15 09 02 16 02 0f 41 03 3e 30 33 33 2f 7a 3b 3d 77 24 20 3a} = 7b {0038 013c 0278 0325 0423 053b} 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 $a110 = { 3a 05 05 18 4a 19 1a 08 01 17 05 0e 42 02 01 31 30 $inc 32 28 14 29 15 7c 16 39 17 3f 1879 192a 1a22 1b38} 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 $a111 = { 3b 06 04 1f 4b 1a 1b 07 00 14 04 09 43 01 00 0e 31 31 2a2a 2b7d 2c3e 2d3e 2e7a 2f 2b 30 2d 31 39} 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 $a112 = { 24 07 07 1e 4c 1b 18 06 0f 15 07 08 44 00 03 0f 0e 30 412b 427e 433f44 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 $a113 = { 25 18 06 1d 4d 1c 19 05 0e 1a 06 0b 45 07 02 0c 0f 0f 3945 7b46 2847 2c48 36} 5a38 5b7c 5c29 5d2f 5e37} 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c $a114 = { 26 19 19 1c 4e 1d 1e 04 0d 1b 09 0a 46 06 05 0d 0c 57 0e 58 14 59 7f 3c 6d15 6e40 6f 3d 70 3b 71 7d 72 2e 73 2e 74 34} 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 $a115 = { 27 1a 18 03 4f 1e 1f 03 0c 18 08 05 47 05 04 0a 0d 0d 84 16 85 41 86 02 87 3a 88 7e 89 2f 8a29 8b35} 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 $a116 = { 20 1b 1b 02 50 1f 1c 02 0b 19 0b 04 48 04 07 0b 0a 0c $a117 = { 21 1c 1a 01 51 00 1d 01 0a 1e 0a 07 49 0b 06 08 0b 9a 0b 9b 17 9c 42 9d 03 9e 05 9f 7f a0 2c a1 28 a2 32}a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 $a118 = { 22 1d 1d 00 52 01 02 00 09 1f 0d 06 4a 0a 09 09 08 0a 10 43 00 04 40 2d 2b 33} c8 11 c9 44 ca 01 cb 07 cc cd d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de $a119 = { 23 1e 1c 07 53 02 03 1f 08 1c 0c 01 4b 09 08 06 09 09 41 ce 12 cf 2ad0 30} e045 e106 e206 e342 e413 e515 e631} e7 e8 e9 ea eb ec ed ee ef f0 f1 f2 f3 f4 f5 f6 $a120 = { 2c 1f 1f 06 54 03 00 1e 17 1d 0f 00 4c 08 0b 07 06 08df12 f7 f8 fb 01 fc fd ff 14 00 0e} 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e $a121 = { 2d 10 1e 05 55 04 01 1d 16 02 0e 03 4d 0f 0a 04 07 07 13f946fa07 43fe10 $a122 = { 2e 11 11 04 56 05 06 1c 15 03 11 02 4e 0e 0d 05 04 0f 0610 1c11 4712 0413 0014 4415 1116 1717} 0f} $dec = {17 $a123 = { 2f 12 10 0b 57 06 07 1b 14 00 10 1d 4f 0d 0c 02 05 05 1d 48 05 16 03 15 45 14 16 13 16 12 0c}11 10 0f 0e 0d 0c 0b 0a 09 08 07 06 05 04 03 1e 02 49 01 0a 00 02 ff fe fc 11 fb fa $a124 = { 28 13 13 0a 58 07 04 1a 13 01 13 1c 50 0c 0f 03 02 04 46fd17 0d}f9 f8 f7 f6 f5 f4 f3 f2 f1 f0 ef ee ed ec eb ea e9 1f e84a e70b e60d e547 e414 e310 e20a} e1 e0 df de dd dc db da d9 d8 d7 d6 d5 d4 $a125 = { 29 14 12 09 59 08 05 19 12 06 12 1f 51 13 0e 00 03 03 ca c9 c8 c7 c6 c5 c4 c3 c2 c1 c0 bf be bd $a126 = { 2a 15 15 08 5a 09 0a 18 11 07 15 1e 52 12 11 01 00 d3 02 d2 18 d1 4b d0 08 cf 0cce 48cd 15cc13cb0b} bc bb ba b9 b8 b7 b6 b5 b4 b3 b2 b1 b0 af ae ad ac ab aa a9 a8 a7 $a127 = { 2b 16 14 0f 5b 0a 0b 17 10 04 14 19 53 11 10 1e 01 01 19 4c 09 0f 49 1a 12 08} a6 a5 a4 a3 a2 a1 a0 9f 9e $a128 = { d4 17 17 0e 5c 0b 08 16 1f 05 17 18 54 10 13 1f 1e 00 1a 4d 0e 0e 4a 1b 1d 09} 9d 9c 9b 9a 99 98 97 96 95 94 93 92 91 90 8f 8e 8d 8c 8b 8a 89 88 $a129 = { d5 e8 16 0d 5d 0c 09 15 1e 0a 16 1b 55 17 12 1c 1f 1f 1b 4e 0f 09 4b 18 1c 06} 87 86 85 84 83 82 81 80 7f 7e 7d 7c 7b 7a rule DecodedGenericCLSID : decodedOnly 7608 754c 7419 731f7207} 71 70 6f 6e 6d 6c 6b 6a 69 68 67 66 65 64 $a130 = { d6 e9 e9 0c 5e 0d 0e 14 1d 0b 19 1a 56 16 15 1d 1c 79 1e 78 04 77 4f 0c { 5e1e 5d1e 5c04} 5b 5a 59 58 57 56 55 54 53 52 51 50 4f 4e 4d $a131 = { d7 ea e8 f3 5f 0e 0f 13 1c 08 18 15 57 15 14 1a 1d 1d63056250610d600b5f4d meta: 4c06 4b51 4a12 490a 484e 471f46194505} 44 43 42 41 40 3f 3e 3d 3c 3b 3a 39 38 37 $a132 = { d0 eb eb f2 a0 0f 0c 12 1b 09 1b 14 58 14 17 1b 1a 1c impact = 0 3607 3552 3413 3315 324f311c30 2e 2d 2c 2b 2a 29 28 27 26 25 24 23 22 21 $a133 = { d1 ec ea f1 a1 f0 0d 11 1a 0e 1a 17 59 1b 16 18 1b 1b 182f02} strings: 1b1d 1a1b 1903} 18 17 16 15 14 13 12 11 10 0f 0e 0d 0c 0b 0a $a134 = { d2 ed ed f0 a2 f1 f2 10 19 0f 1d 16 5a 1a 19 19 18 1a20 001f531e101d141c50 $gen = /[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}/ nocase $a135 = { d3 ee ec f7 a3 f2 f3 ef 18 0c 1c 11 5b 19 18 16 19 1909 0108 5407 1106 1705 5104 0203 1a02 00}01 00} condition: condition: $a136 = { dc ef ef f6 a4 f3 f0 ee e7 0d 1f 10 5c 18 1b 17 16 18 02 55 16 16 52 03 05 01} 1 of them or17 $dec $a137 = { dd e0 ee f5 a5 f4 f1 ed e6 f2 1e 13 5d 1f 1a 14 17 17 $inc 03 56 11 53 00 04 1e} } $a138 = { de e1 e1 f4 a6 f5 f6 ec e5 f3 e1 12 5e 1e 1d 15 14 16} 0c 57 14 10 54 01 07 1f} $a139 = { $a140 = { $a141 = { $a142 = { $a143 = { $a144 = { $a145 = { $a146 = { $a147 = {
df e2 e0 fb a7 f6 f7 eb e4 f0 e0 ed 5f 1d 1c 12 15 15 0d 58 15 13 55 06 06 1c} d8 e3 e3 fa a8 f7 f4 ea e3 f1 e3 ec a0 1c 1f 13 12 14 0e 59 1a 12 56 07 01 1d} d9 e4 e2 f9 a9 f8 f5 e9 e2 f6 e2 ef a1 e3 1e 10 13 13 0f 5a 1b 1d 57 04 00 1a} da e5 e5 f8 aa f9 fa e8 e1 f7 e5 ee a2 e2 e1 11 10 12 08 5b 18 1c 58 05 03 1b} db e6 e4 ff ab fa fb e7 e0 f4 e4 e9 a3 e1 e0 ee 11 11 09 5c 19 1f 59 0a 02 18} c4 e7 e7 fe ac fb f8 e6 ef f5 e7 e8 a4 e0 e3 ef ee 10 0a 5d 1e 1e 5a 0b 0d 19} c5 f8 e6 fd ad fc f9 e5 ee fa e6 eb a5 e7 e2 ec ef ef 0b 5e 1f 19 5b 08 0c 16} c6 f9 f9 fc ae fd fe e4 ed fb e9 ea a6 e6 e5 ed ec ee f4 5f 1c 18 5c 09 0f 17} c7 fa f8 e3 af fe ff e3 ec f8 e8 e5 a7 e5 e4 ea ed ed f5 a0 1d 1b 5d 0e 0e 14}
rule KERNEL32_dll_xor_exe_key_239 { meta: author = "sconzo@visiblerisk.com" description = "xor encoded executable" string = "KERNEL32.dll" key = "239" byte_encode = true strings: $a = { a4 aa bd a1 aa a3 dc dd c1 8b 83 83 } condition: $a }
rule XOR_embeded_exefile_xored_with_round_256_bytes_key //Yara Exchange: Distribution and sharing prohibited without author's consent. Contact: yara@deependresearch.org { rule KERNEL32_dll_xor_exe_key_239 meta: { author = "villys777@gmail.com" meta: description = "executable encoded with increment author = "sconzo@visiblerisk.com" or decremented one byte xor key" decription = "extension PDF,XLS,DOC,PPT" description = "xor encoded executable" source = "Yara Exchange" string = "KERNEL32.dll" date = "2012-07" key = "239" byte_encode = true byte_encode = true strings: $inc = {00 01 02 03 04 05 06 07 08 09 0astrings: 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 3 $dec = {17 16 15 14 13 12 11 10 0f 0e 0d$a 0c=0b { a4 0aaa 09bd 08a1 07aa 06a3 05dc 04dd 03c1 028b 0183 0083 ff fe } fd fc fb fa f9 f8 f7 f6 f5 f4 f3 f2 f1 f0 ef ee ed ec eb ea e9 e8 e7 e6 e5 e4 e3 e2 e1 e condition: condition: $inc or $dec $a } }
rule mediaNewplayer: decodedPDF { meta: ref = "CVE-2009-4324" hide = true strings: $cve20094324 = "media.newPlayer" nocase fullword condition: 1 of them }
$a129 = { d5 e8 16 0d 5d 0c 09 15 1e 0a 16 1b 55 17 12 1c 1f 1f 1b 4e 0f 09 4b 18 1c 06} $a130 = { d6 e9 e9 0c 5e 0d 0e 14 1d 0b 19 1a 56 16 15 1d 1c 1e 04 4f 0c 08 4c 19 1f 07} $a131 = { d7 ea e8 f3 5f 0e 0f 13 1c 08 18 15 57 15 14 1a 1d 1d 05 50 0d 0b 4d 1e 1e 04} $a132 = { d0 eb eb f2 a0 0f 0c 12 1b 09 1b 14 58 14 17 1b 1a 1c 06 51 12 0a 4e 1f 19 05} $a133 = { d1 ec ea f1 a1 f0 0d 11 1a 0e 1a 17 59 1b 16 18 1b 1b 07 52 13 15 4f 1c 18 02} $a134 = { d2 ed ed f0 a2 f1 f2 10 19 0f 1d 16 5a 1a 19 19 18 1a 00 53 10 14 50 1d 1b 03} $a135 = { d3 ee ec f7 a3 f2 f3 ef 18 0c 1c 11 5b 19 18 16 19 19 01 54 11 17 51 02 1a 00} $a136 = { dc ef ef f6 a4 f3 f0 ee e7 0d 1f 10 5c 18 1b 17 16 18 02 55 16 16 52 03 05 01} $a137 = { dd e0 ee f5 a5 f4 f1 ed e6 f2 1e 13 5d 1f 1a 14 17 17 03 56 17 11 53 00 04 1e} $a138 = { de e1 e1 f4 a6 f5 f6 ec e5 f3 e1 12 5e 1e 1d 15 14 16 0c 57 14 10 54 01 07 1f} $a139 = { df e2 e0 fb a7 f6 f7 eb e4 f0 e0 ed 5f 1d 1c 12 15 15 0d 58 15 13 55 06 06 1c} $a140 = { d8 e3 e3 fa a8 f7 f4 ea e3 f1 e3 ec a0 1c 1f 13 12 14 0e 59 1a 12 56 07 01 1d} $a141 = { d9 e4 e2 f9 a9 f8 f5 e9 e2 f6 e2 ef a1 e3 1e 10 13 13 0f 5a 1b 1d 57 04 00 1a} $a142 = { da e5 e5 f8 aa f9 fa e8 e1 f7 e5 ee a2 e2 e1 11 10 12 08 5b 18 1c 58 05 03 1b} $a143 = { db e6 e4 ff ab fa fb e7 e0 f4 e4 e9 a3 e1 e0 ee 11 11 09 5c 19 1f 59 0a 02 18} $a144 = { c4 e7 e7 fe ac fb f8 e6 ef f5 e7 e8 a4 e0 e3 ef ee 10 0a 5d 1e 1e 5a 0b 0d 19} $a145 = { c5 f8 e6 fd ad fc f9 e5 ee fa e6 eb a5 e7 e2 ec ef ef 0b 5e 1f 19 5b 08 0c 16} $a146 = { c6 f9 f9 fc ae fd fe e4 ed fb e9 ea a6 e6 e5 ed ec ee f4 5f 1c 18 5c 09 0f 17} $a147 = { c7 fa f8 e3 af fe ff e3 ec f8 e8 e5 a7 e5 e4 ea ed ed f5 a0 1d 1b 5d 0e 0e 14} $a148 = { c0 fb fb e2 b0 ff fc e2 eb f9 eb e4 a8 e4 e7 eb ea ec f6 a1 e2 1a 5e 0f 09 15} $a149 = { c1 fc fa e1 b1 e0 fd e1 ea fe ea e7 a9 eb e6 e8 eb eb f7 a2 e3 e5 5f 0c 08 12} $a150 = { c2 fd fd e0 b2 e1 e2 e0 e9 ff ed e6 aa ea e9 e9 e8 ea f0 a3 e0 e4 a0 0d 0b 13} $a151 = { c3 fe fc e7 b3 e2 e3 ff e8 fc ec e1 ab e9 e8 e6 e9 e9 f1 a4 e1 e7 a1 f2 0a 10} $a152 = { cc ff ff e6 b4 e3 e0 fe f7 fd ef e0 ac e8 eb e7 e6 e8 f2 a5 e6 e6 a2 f3 f5 11} $a153 = { cd f0 fe e5 b5 e4 e1 fd f6 e2 ee e3 ad ef ea e4 e7 e7 f3 a6 e7 e1 a3 f0 f4 ee} $a154 = { ce f1 f1 e4 b6 e5 e6 fc f5 e3 f1 e2 ae ee ed e5 e4 e6 fc a7 e4 e0 a4 f1 f7 ef} $a155 = { cf f2 f0 eb b7 e6 e7 fb f4 e0 f0 fd af ed ec e2 e5 e5 fd a8 e5 e3 a5 f6 f6 ec} $a156 = { c8 f3 f3 ea b8 e7 e4 fa f3 e1 f3 fc b0 ec ef e3 e2 e4 fe a9 ea e2 a6 f7 f1 ed} $a157 = { c9 f4 f2 e9 b9 e8 e5 f9 f2 e6 f2 ff b1 f3 ee e0 e3 e3 ff aa eb ed a7 f4 f0 ea} $a158 = { ca f5 f5 e8 ba e9 ea f8 f1 e7 f5 fe b2 f2 f1 e1 e0 e2 f8 ab e8 ec a8 f5 f3 eb} $a159 = { cb f6 f4 ef bb ea eb f7 f0 e4 f4 f9 b3 f1 f0 fe e1 e1 f9 ac e9 ef a9 fa f2 e8} $a160 = { f4 f7 f7 ee bc eb e8 f6 ff e5 f7 f8 b4 f0 f3 ff fe e0 fa ad ee ee aa fb fd e9} $a161 = { f5 c8 f6 ed bd ec e9 f5 fe ea f6 fb b5 f7 f2 fc ff ff fb ae ef e9 ab f8 fc e6} $a162 = { f6 c9 c9 ec be ed ee f4 fd eb f9 fa b6 f6 f5 fd fc fe e4 af ec e8 ac f9 ff e7} $a163 = { f7 ca c8 d3 bf ee ef f3 fc e8 f8 f5 b7 f5 f4 fa fd fd e5 b0 ed eb ad fe fe e4} $a164 = { f0 cb cb d2 80 ef ec f2 fb e9 fb f4 b8 f4 f7 fb fa fc e6 b1 f2 ea ae ff f9 e5} $a165 = { f1 cc ca d1 81 d0 ed f1 fa ee fa f7 b9 fb f6 f8 fb fb e7 b2 f3 f5 af fc f8 e2} $a166 = { f2 cd cd d0 82 d1 d2 f0 f9 ef fd f6 ba fa f9 f9 f8 fa e0 b3 f0 f4 b0 fd fb e3} $a167 = { f3 ce cc d7 83 d2 d3 cf f8 ec fc f1 bb f9 f8 f6 f9 f9 e1 b4 f1 f7 b1 e2 fa e0} $a168 = { fc cf cf d6 84 d3 d0 ce c7 ed ff f0 bc f8 fb f7 f6 f8 e2 b5 f6 f6 b2 e3 e5 e1} $a169 = { fd c0 ce d5 85 d4 d1 cd c6 d2 fe f3 bd ff fa f4 f7 f7 e3 b6 f7 f1 b3 e0 e4 fe} $a170 = { fe c1 c1 d4 86 d5 d6 cc c5 d3 c1 f2 be fe fd f5 f4 f6 ec b7 f4 f0 b4 e1 e7 ff} $a171 = { ff c2 c0 db 87 d6 d7 cb c4 d0 c0 cd bf fd fc f2 f5 f5 ed b8 f5 f3 b5 e6 e6 fc} $a172 = { f8 c3 c3 da 88 d7 d4 ca c3 d1 c3 cc 80 fc ff f3 f2 f4 ee b9 fa f2 b6 e7 e1 fd} $a173 = { f9 c4 c2 d9 89 d8 d5 c9 c2 d6 c2 cf 81 c3 fe f0 f3 f3 ef ba fb fd b7 e4 e0 fa} $a174 = { fa c5 c5 d8 8a d9 da c8 c1 d7 c5 ce 82 c2 c1 f1 f0 f2 e8 bb f8 fc b8 e5 e3 fb} $a175 = { fb c6 c4 df 8b da db c7 c0 d4 c4 c9 83 c1 c0 ce f1 f1 e9 bc f9 ff b9 ea e2 f8} $a176 = { e4 c7 c7 de 8c db d8 c6 cf d5 c7 c8 84 c0 c3 cf ce f0 ea bd fe fe ba eb ed f9} $a177 = { e5 d8 c6 dd 8d dc d9 c5 ce da c6 cb 85 c7 c2 cc cf cf eb be ff f9 bb e8 ec f6} $a178 = { e6 d9 d9 dc 8e dd de c4 cd db c9 ca 86 c6 c5 cd cc ce d4 bf fc f8 bc e9 ef f7} $a179 = { e7 da d8 c3 8f de df c3 cc d8 c8 c5 87 c5 c4 ca cd cd d5 80 fd fb bd ee ee f4} $a180 = { e0 db db c2 90 df dc c2 cb d9 cb c4 88 c4 c7 cb ca cc d6 81 c2 fa be ef e9 f5} $a181 = { e1 dc da c1 91 c0 dd c1 ca de ca c7 89 cb c6 c8 cb cb d7 82 c3 c5 bf ec e8 f2} $a182 = { e2 dd dd c0 92 c1 c2 c0 c9 df cd c6 8a ca c9 c9 c8 ca d0 83 c0 c4 80 ed eb f3} $a183 = { e3 de dc c7 93 c2 c3 df c8 dc cc c1 8b c9 c8 c6 c9 c9 d1 84 c1 c7 81 d2 ea f0} $a184 = { ec df df c6 94 c3 c0 de d7 dd cf c0 8c c8 cb c7 c6 c8 d2 85 c6 c6 82 d3 d5 f1} $a185 = { ed d0 de c5 95 c4 c1 dd d6 c2 ce c3 8d cf ca c4 c7 c7 d3 86 c7 c1 83 d0 d4 ce} $a186 = { ee d1 d1 c4 96 c5 c6 dc d5 c3 d1 c2 8e ce cd c5 c4 c6 dc 87 c4 c0 84 d1 d7 cf} $a187 = { ef d2 d0 cb 97 c6 c7 db d4 c0 d0 dd 8f cd cc c2 c5 c5 dd 88 c5 c3 85 d6 d6 cc} $a188 = { e8 d3 d3 ca 98 c7 c4 da d3 c1 d3 dc 90 cc cf c3 c2 c4 de 89 ca c2 86 d7 d1 cd} $a189 = { e9 d4 d2 c9 99 c8 c5 d9 d2 c6 d2 df 91 d3 ce c0 c3 c3 df 8a cb cd 87 d4 d0 ca} $a190 = { ea d5 d5 c8 9a c9 ca d8 d1 c7 d5 de 92 d2 d1 c1 c0 c2 d8 8b c8 cc 88 d5 d3 cb} $a191 = { eb d6 d4 cf 9b ca cb d7 d0 c4 d4 d9 93 d1 d0 de c1 c1 d9 8c c9 cf 89 da d2 c8} $a192 = { 94 d7 d7 ce 9c cb c8 d6 df c5 d7 d8 94 d0 d3 df de c0 da 8d ce ce 8a db dd c9} $a193 = { 95 a8 d6 cd 9d cc c9 d5 de ca d6 db 95 d7 d2 dc df df db 8e cf c9 8b d8 dc c6} $a194 = { 96 a9 a9 cc 9e cd ce d4 dd cb d9 da 96 d6 d5 dd dc de c4 8f cc c8 8c d9 df c7} $a195 = { 97 aa a8 b3 9f ce cf d3 dc c8 d8 d5 97 d5 d4 da dd dd c5 90 cd cb 8d de de c4} $a196 = { 90 ab ab b2 e0 cf cc d2 db c9 db d4 98 d4 d7 db da dc c6 91 d2 ca 8e df d9 c5} $a197 = { 91 ac aa b1 e1 b0 cd d1 da ce da d7 99 db d6 d8 db db c7 92 d3 d5 8f dc d8 c2} $a198 = { 92 ad ad b0 e2 b1 b2 d0 d9 cf dd d6 9a da d9 d9 d8 da c0 93 d0 d4 90 dd db c3} $a199 = { 93 ae ac b7 e3 b2 b3 af d8 cc dc d1 9b d9 d8 d6 d9 d9 c1 94 d1 d7 91 c2 da c0} $a200 = { 9c af af b6 e4 b3 b0 ae a7 cd df d0 9c d8 db d7 d6 d8 c2 95 d6 d6 92 c3 c5 c1} $a201 = { 9d a0 ae b5 e5 b4 b1 ad a6 b2 de d3 9d df da d4 d7 d7 c3 96 d7 d1 93 c0 c4 de} $a202 = { 9e a1 a1 b4 e6 b5 b6 ac a5 b3 a1 d2 9e de dd d5 d4 d6 cc 97 d4 d0 94 c1 c7 df} $a203 = { 9f a2 a0 bb e7 b6 b7 ab a4 b0 a0 ad 9f dd dc d2 d5 d5 cd 98 d5 d3 95 c6 c6 dc} $a204 = { 98 a3 a3 ba e8 b7 b4 aa a3 b1 a3 ac e0 dc df d3 d2 d4 ce 99 da d2 96 c7 c1 dd} $a205 = { 99 a4 a2 b9 e9 b8 b5 a9 a2 b6 a2 af e1 a3 de d0 d3 d3 cf 9a db dd 97 c4 c0 da} $a206 = { 9a a5 a5 b8 ea b9 ba a8 a1 b7 a5 ae e2 a2 a1 d1 d0 d2 c8 9b d8 dc 98 c5 c3 db} $a207 = { 9b a6 a4 bf eb ba bb a7 a0 b4 a4 a9 e3 a1 a0 ae d1 d1 c9 9c d9 df 99 ca c2 d8} $a208 = { 84 a7 a7 be ec bb b8 a6 af b5 a7 a8 e4 a0 a3 af ae d0 ca 9d de de 9a cb cd d9} $a209 = { 85 b8 a6 bd ed bc b9 a5 ae ba a6 ab e5 a7 a2 ac af af cb 9e df d9 9b c8 cc d6} $a210 = { 86 b9 b9 bc ee bd be a4 ad bb a9 aa e6 a6 a5 ad ac ae b4 9f dc d8 9c c9 cf d7} $a211 = { 87 ba b8 a3 ef be bf a3 ac b8 a8 a5 e7 a5 a4 aa ad ad b5 e0 dd db 9d ce ce d4} $a212 = { 80 bb bb a2 f0 bf bc a2 ab b9 ab a4 e8 a4 a7 ab aa ac b6 e1 a2 da 9e cf c9 d5} $a213 = { 81 bc ba a1 f1 a0 bd a1 aa be aa a7 e9 ab a6 a8 ab ab b7 e2 a3 a5 9f cc c8 d2} $a214 = { 82 bd bd a0 f2 a1 a2 a0 a9 bf ad a6 ea aa a9 a9 a8 aa b0 e3 a0 a4 e0 cd cb d3} $a215 = { 83 be bc a7 f3 a2 a3 bf a8 bc ac a1 eb a9 a8 a6 a9 a9 b1 e4 a1 a7 e1 b2 ca d0} $a216 = { 8c bf bf a6 f4 a3 a0 be b7 bd af a0 ec a8 ab a7 a6 a8 b2 e5 a6 a6 e2 b3 b5 d1} $a217 = { 8d b0 be a5 f5 a4 a1 bd b6 a2 ae a3 ed af aa a4 a7 a7 rule b3XOR_embeded_exefile_xored_with_round_256_bytes_key e6 a7 a1 e3 b0 b4 ae} $a218 = { 8e b1 b1 a4 f6 a5 a6 bc b5 a3 b1 a2 ee ae ad a5 a4 a6 //Yara bc e7 Exchange: a4 a0 e4 Distribution b1 b7 af} and sharing prohibited without author's $a219 = { 8f b2 b0 ab f7 a6 a7 bb b4 a0 b0 bd ef ad ac a2 a5 a5consent. bd e8 a5 Contact: a3 e5 b6 yara@deependresearch.org b6 ac} $a220 = { 88 b3 b3 aa f8 a7 a4 ba b3 a1 b3 bc f0 ac af a3 a2 a4{ be e9 aa a2 e6 b7 b1 ad} $a221 = { 89 b4 b2 a9 f9 a8 a5 b9 b2 a6 b2 bf f1 b3 ae a0 a3 a3meta: bf ea ab ad e7 b4 b0 aa} $a222 = { 8a b5 b5 a8 fa a9 aa b8 b1 a7 b5 be f2 b2 b1 a1 a0 a2 author b8 eb= a8 "villys777@gmail.com" ac e8 b5 b3 ab} $a223 = { 8b b6 b4 af fb aa ab b7 b0 a4 b4 b9 f3 b1 b0 be a1 a1description b9 ec a9 af = e9 "executable ba b2 a8}encoded with increment or decremented $a224 = { b4 b7 b7 ae fc ab a8 b6 bf a5 b7 b8 f4 b0 b3 bf be a0one ba ed byte aexor ae key" ea bb bd a9} $a225 = { b5 88 b6 ad fd ac a9 b5 be aa b6 bb f5 b7 b2 bc bf bfdecription bb ee af a9 = "extension eb b8 bc a6} PDF,XLS,DOC,PPT" $a226 = { b6 89 89 ac fe ad ae b4 bd ab b9 ba f6 b6 b5 bd bc be source a4 ef =ac"Yara a8 ecExchange" b9 bf a7} $a227 = { b7 8a 88 93 ff ae af b3 bc a8 b8 b5 f7 b5 b4 ba bd bddate a5 f0= ad "2012-07" ab ed be be a4} $a228 = { b0 8b 8b 92 c0 af ac b2 bb a9 bb b4 f8 b4 b7 bb ba bc byte_encode a6 f1 b2 aa =eetrue bf b9 a5} $a229 = { b1 8c 8a 91 c1 90 ad b1 ba ae ba b7 f9 bb b6 b8 bb bb strings: a7 f2 b3 b5 ef bc b8 a2} $a230 = { b2 8d 8d 90 c2 91 92 b0 b9 af bd b6 fa ba b9 b9 b8 ba $inc a0 =f3{00 b0 01 b4 02 f0 bd 03 bb 04 a3} 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 $a231 = { b3 8e 8c 97 c3 92 93 8f b8 ac bc b1 fb b9 b8 b6 b9 b914a115f416 b117 b718 f1 19 a2 1a ba 1b a0}1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 $a232 = { bc 8f 8f 96 c4 93 90 8e 87 ad bf b0 fc b8 bb b7 b6 b82a a22b f5 b6 2c 2d b6 2e f2 a3 2f 30 a5 31 a1}32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 $a233 = { bd 80 8e 95 c5 94 91 8d 86 92 be b3 fd bf ba b4 b7 b7 41a3 42f643b744b145f346 a047 a448 be}49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 $a234 = { be 81 81 94 c6 95 96 8c 85 93 81 b2 fe be bd b5 b4 b6 57 ac 58f7 59b4 5ab0 5bf45c a15d a75e bf}5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c $a235 = { bf 82 80 9b c7 96 97 8b 84 90 80 8d ff bd bc b2 b5 b56d ad6e f86f b570 b371 f572 a673 a674 bc}75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 $a236 = { b8 83 83 9a c8 97 94 8a 83 91 83 8c c0 bc bf b3 b2 b4 84ae 85f986ba87b288f689 a78a a18b bd} 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 $a237 = { b9 84 82 99 c9 98 95 89 82 96 82 8f c1 83 be b0 b3 b3 9a af 9bfa9cbb9dbd9ef79fa4a0a0a1ba} a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 $a238 = { ba 85 85 98 ca 99 9a 88 81 97 85 8e c2 82 81 b1 b0 b1 b2 b2 a8 b3 fb b8 b4 bc b5f8 b6a5 b7a3 b8bb} b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 $a239 = { bb 86 84 9f cb 9a 9b 87 80 94 84 89 c3 81 80 8e b1 b1 c8 a9 c9 fc cab9 cbbf ccf9cdaacea2cfb8} d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de $a240 = { a4 87 87 9e cc 9b 98 86 8f 95 87 88 c4 80 83 8f 8e b0 dfaa e0fd e1be e2be e3fae4 abe5 ade6 b9} e7 e8 e9 ea eb ec ed ee ef f0 f1 f2 f3 f4 f5 f6 $a241 = { a5 98 86 9d cd 9c 99 85 8e 9a 86 8b c5 87 82 8c 8f 8ff7ab f8 fe f9 bf fa b9 fb fc fbfd a8feac ff b6} 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e $a242 = { a6 99 99 9c ce 9d 9e 84 8d 9b 89 8a c6 86 85 8d 8c 8e 0f 10 94 11 ff bc 12b8 13fc14a915af16 b7}17} $a243 = { a7 9a 98 83 cf 9e 9f 83 8c 98 88 85 c7 85 84 8a 8d 8d $dec 95 c0 = {17 bd bb 16 fd 15ae 14ae 13b4} 12 11 10 0f 0e 0d 0c 0b 0a 09 08 07 06 05 04 $a244 = { a0 9b 9b 82 d0 9f 9c 82 8b 99 8b 84 c8 84 87 8b 8a 8c 0396 02c1 0182 00ba ff fe fe fd af fc a9fbb5} fa f9 f8 f7 f6 f5 f4 f3 f2 f1 f0 ef ee ed ec eb ea $a245 = { a1 9c 9a 81 d1 80 9d 81 8a 9e 8a 87 c9 8b 86 88 8b e9 8b e8 97 e7 c2 83 e6 85 e5 ff e4ace3a8e2b2} e1 e0 df de dd dc db da d9 d8 d7 d6 d5 d4 $a246 = { a2 9d 9d 80 d2 81 82 80 89 9f 8d 86 ca 8a 89 89 88 8a d3 90 d2 c3 d1 80 d0 84 cf ce c0 cd ad cc abcb b3}ca c9 c8 c7 c6 c5 c4 c3 c2 c1 c0 bf be bd $a247 = { a3 9e 9c 87 d3 82 83 9f 88 9c 8c 81 cb 89 88 86 89 89 bc91 bbc4 ba81 b987 b8c1 b792 b6aa b5b0} b4 b3 b2 b1 b0 af ae ad ac ab aa a9 a8 a7 $a248 = { ac 9f 9f 86 d4 83 80 9e 97 9d 8f 80 cc 88 8b 87 86 88a6 92a5 c5a4 86a3 86a2 c2a1 93a0 959fb1} 9e 9d 9c 9b 9a 99 98 97 96 95 94 93 92 91 $a249 = { ad 90 9e 85 d5 84 81 9d 96 82 8e 83 cd 8f 8a 84 87 87 90 93 8f 8e c6 8d 87 8c 81 8b c3 8a 90 89 94 88 8e}87 86 85 84 83 82 81 80 7f 7e 7d 7c 7b 7a rule DecodedGenericCLSID : decodedOnly $a250 = { ae 91 91 84 d6 85 86 9c 95 83 91 82 ce 8e 8d 85 84 79 86 78 9c c7 77 84 76 80 75 c4 74 91 73 97 72 8f} 71 70 6f 6e 6d 6c 6b 6a 69 68 67 66 65 64 { $a251 = { af 92 90 8b d7 86 87 9b 94 80 90 9d cf 8d 8c 82 85 85 639d 62c8 6185 6083 5fc5 5e96 5d96 5c8c} 5b 5a 59 58 57 56 55 54 53 52 51 50 4f 4e 4d meta: $a252 = { a8 93 93 8a d8 87 84 9a 93 81 93 9c d0 8c 8f 83 82 84 4c 9e 4b c9 4a 8a 49 82 48 c6 4797 4691 458d} 44 43 42 41 40 3f 3e 3d 3c 3b 3a 39 38 37 impact = 0 $a253 = { a9 94 92 89 d9 88 85 99 92 86 92 9f d1 93 8e 80 83 83 36 9f 35ca 348b 338d 32c7 3194 3090 2f 8a} 2e 2d 2c 2b 2a 29 28 27 26 25 24 23 22 21 strings: $a254 = { aa 95 95 88 da 89 8a 98 91 87 95 9e d2 92 91 81 80 20 82 1f 981e cb1d 881c 8c1b c81a 9519 9318 8b}17 16 15 14 13 12 11 10 0f 0e 0d 0c 0b 0a $gen = /[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}/ nocase $a255 = { ab 96 94 8f db 8a 8b 97 90 84 94 99 d3 91 90 9e 81 81 09 99 08 cc 07 89 06 8f 05c9 049a 0392 0288} 01 00} condition: condition: condition: 1 of them any of them $inc or $dec } } } rule kernel32_dll_xor_exe_key_167 { meta: author = "sconzo@visiblerisk.com" description = "xor encoded executable" string = "kernel32.dll" key = "167" byte_encode = true strings: $a = { cc c2 d5 c9 c2 cb 94 95 89 c3 cb cb } condition: $a }
rule KERNEL32_dll_xor_exe_key_239 { meta: author = "sconzo@visiblerisk.com" description = "xor encoded executable" string = "KERNEL32.dll" key = "239" byte_encode = true strings: $a = { a4 aa bd a1 aa a3 dc dd c1 8b 83 83 } condition: $a }
rule XOR_embeded_exefile_xored_with_round_256_bytes_key //Yara Exchange: Distribution and sharing prohibited without author's consent. Contact: yara@deependresearch.org { rule KERNEL32_dll_xor_exe_key_239 meta: { author = "villys777@gmail.com" meta: description = "executable encoded with increment author = "sconzo@visiblerisk.com" or decremented one byte xor key" decription = "extension PDF,XLS,DOC,PPT" description = "xor encoded executable" source = "Yara Exchange" string = "KERNEL32.dll" date = "2012-07" key = "239" byte_encode = true byte_encode = true strings: $inc = {00 01 02 03 04 05 06 07 08 09 0astrings: 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 3 $dec = {17 16 15 14 13 12 11 10 0f 0e 0d$a 0c=0b { a4 0aaa 09bd 08a1 07aa 06a3 05dc 04dd 03c1 028b 0183 0083 ff fe } fd fc fb fa f9 f8 f7 f6 f5 f4 f3 f2 f1 f0 ef ee ed ec eb ea e9 e8 e7 e6 e5 e4 e3 e2 e1 e condition: condition: $inc or $dec $a } }
rule xor_0xa7_kernel32_dll {strings: $a={ cc c2 d5 c9 c2 cb 94 95 rule 89xor_0xa7_This_program c3 cb cb } condition: $a }{strings: $a={ f3 cf ce d4 87 d7 d5 c8 c0 d5rule c6 xor_0xa7_This_program ca } condition: $a } {strings: $a={ f3 cf ce d4 87 d7 d5 c8 c0 d5 c6 ca } condition: $a } rule dyndns_a_la { strings: $a = "a.la" condition: $a } rule MSIEUseAfterFreePeersDll rule MSIEUseAfterFreePeersDll { { meta: meta: ref = "CVE-2010-0806" rule ShellcodePattern ref = "CVE-2010-0806" hide = true { hide = true impact = 5 meta: impact = 5 strings: impact = 1 //while testing strings: rule DecodedGenericCLSID : decodedOnly $cve20100806_1 = "createElement" nocase fullword hide = true $cve20100806_1 = "createElement" { nocase fullword $cve20100806_2 = "onclick" nocase fullword rule pdf_document strings: $cve20100806_2 = "onclick" meta: nocase fullword $cve20100806_3 = "setAttribute" nocase fullword { $unescape = "unescape" fullword nocase$cve20100806_3 = "setAttribute" impact = 0 nocase fullword $cve20100806_4 = "window.status" nocase fullword strings: $shellcode = /%u[A-Fa-f0-9]{4}/ $cve20100806_4 = "window.status" strings: nocase fullword $cve20100806_5 = /getElementById[^<>;]+\.onclick/ nocase $a = "%PDF-" $shellcode5 = /(%u[A-Fa-f0-9]{4}){5}/ $cve20100806_5 = /getElementById[^<>;]+\.onclick/ $gen = /[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}/ nocase nocase condition: condition: condition: condition: condition: all of them $a at 0 ($unescape and $shellcode) or $shellcode5 all of them 1 of them } } } } } rule dyndns_ath_ro { strings: $a = "ath.ro" condition: $a }
"rule ShellcodePattern { meta: impact = 1 //while testing hide = true strings: $unescape = ""unescape"" fullword nocase $shellcode = /%u[A-Fa-f0-9]{4}/ $shellcode5 = /(%u[A-Fa-f0-9]{4}){5}/ condition: ($unescape and $shellcode) or $shellcode5 } "
rule MSIEUseAfterFreePeersDll { meta: ref = "CVE-2010-0806" rule ShellcodePattern hide = true { impact = 5 meta: strings: rule DecodedGenericCLSID impact =: 1decodedOnly //while testing $cve20100806_1 = "createElement" nocase { fullword hide = true $cve20100806_2 = "onclick" nocase fullword meta: strings: $cve20100806_3 = "setAttribute" nocase impact fullword= 0 $unescape = "unescape" fullword nocase $cve20100806_4 = "window.status" nocase strings: fullword $shellcode = /%u[A-Fa-f0-9]{4}/ $cve20100806_5 = /getElementById[^<>;]+\.onclick/ $gen = /[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}/ nocase $shellcode5 = /(%u[A-Fa-f0-9]{4}){5}/ nocase condition: condition: condition: all of them 1 of them ($unescape and $shellcode) or $shellcode5 } } } rule dyndns_ath_ro { strings: $a = "ath.ro" condition: $a }
Author: Francois Paget www.avertlabs.com "An Overview of Exploit Packs." Additions by Mila P (contagiodump.blogspot. com) with many thanks to Gunther from ARTeam (www. accessroot.com) for his help. REFERENCES McAfee Francois Paget Malwaredomainlist.com www.hackforums.net Jorge Mieres Brian Krebs KrebsonSecurity Jorge Mieres malwareint.blogspot.com Malwarereview.com exploit.in Malwarereview.com damagelab.org damagelab.org malwareint.blogspot.com mipistus.blogspot.com malwareint.blogspot.com
An Overview of Exploit Packs Crimepack 2.2.1 Crimepack 2.8. Crimepack 3.0 CRiMEPACK Zombie Exploit Gets Upgrades Eleonore 1.3. A Peek Inside the ‘Eleonore’ Browser Exploit Kit State of the art in Eleonore Exploit Pack Impassioned Framwork Phoenix exploit pack v2 Unique exploit pack v.2.1 Unique Pack Sploit v.2 Eleonore 1.4.1 JustExploit ZoPAck Fragus v1 Siberia. Intelligence and operational level by Siberia Exploit Jamieres http://www.offensivecomputing.netPack malwareview.com Liberty 1.0.7 exploit system kit WHB · Liberty 2.1.0 exploit system kit damagelab.org Lupit exploit pack malwareview.com http://malwareview.com/index.php?topic=775 http://malwareint.blogspot.com/2010/05/intelligence-andmalwareint.blogspot.com operational-level-by.html http://secniche.blogspot.com/2010/10/phoenix-exploit-kit-24Malware at Stake Aditya K Sood analysis.html
Analysis 5/28/2010 Ad 3/18/2010 Ad 4/10/2010 Analysis 5/26/2010 Analysis 1/25/2010 Analysis 4/10/2010 Ad 5/24/2010 Analysis 4/21/2010 Ad 10/19/2009 Ad 10/6/2009 Ad Analysis 11/29/2009 Analysis 11/2/2009 Analysis 8/15/2009
http://malwareint.blogspot.com
Analysis 10/6/2010
http://whsbehind.blogspot.com http://evilcodecave.blogspot.com http://blog.ahnlab.com
Eleonore Exploit Pack. New version http://whsbehind.blogspot.com/2010/09/new-linkedin-phishingcampaign-with-seo.html http://evilcodecave.blogspot.com/2010/06/reverseengineering-of-seo-sploit-kit.html http://blog.ahnlab.com/asec/366 (I think javad listed by ahnlab as CVE-2009-1493 is actually CVE-2008-5353 - let me know if I am wrong here)-Mila
Analysis 5/29/2010 Ad 9/29/2009 Ad 12/23/2009 Ad 5/28/2010 Ad 7/21/2010 Analysis
5/5/2010
Analysis 10/15/2010
Analysis 9/29/2010 Analysis 6/29/2010 Analysis 7/20/2010
http://forum.hackersoft.ru/showthread.php? t=13732 http://forum.hackersoft.ru/showthread.php?t=13732
Bleeding life
Websense Blackhole exploit kit decoded Tex comment on contagio Incognito
WildWildWest Update Eleonore 1.6.3a Eleonore 1.6.4 Tex comment on contagio Phoenix2.7 "Dloader" or ? Uknown name nuclear pack Robopak Blackhole exploit kit 1.1.0 Mushroom/unkow Open Source Exploit kit Bomba Papka Merry Christmas Pack Best Pack Sava LinuQ LinuQ LinuQ Eleonore 1.6.5 Zero pack Zero pack Beleeding Life 3 Blackhole 1.2.0 Blackhole 1.2.1 Sakura Exploit Pack 1.0 Phoenix 2.8 mini Fragus black Hierarchy Exploit pack Siberia Explot pack Techno Xpack Yang Pack Blackhole Exploit Kit 1.2.3 Blackhole Exploit Kit 1.2.3 Eleonore Exploit Kit 1.8.91 Incognito Exploit Pack v.2 Phoenix Exploit Kit v3.1 Chinese Zhi Zhu Pack Gong Da Pack Dragon Pack
Sakura 1.1 Nucsoft Blackhole 2 Blackhole 2
Blackhole 1.2.5
It still has this http://www.metasploit. com/modules/exploit/multi/browser/java_signed_applet) 2.0 Phoenix 2.3 - Ted said... Phoenix Exploit’s Kit v2.3. It was released in early 07-y 2010 at a cost of USD 2.200. One of the most important changes in this release was PDF libtiff support the use of bypass ASLR, DEP more for PDF file reader Adobe Reader on your version 8.0-9.3.0 for Windows Vista and Windows7. Blackhole exploit kit http://pastebin.com/shAEj8XK Incognito http://www.kahusecurity.com/2011/incognito-exploit-kit http://www.kahusecurity.com/wpcontent/uploads/2011/05/384x1500xwildwildwest_0511.jpg. pagespeed.ic.pw5QWio8Au.jpg http://www.opensc.ws/unverified-listings/13041-eleonore-expactual-exploits-pack.html http://www.forum.zloy.bz/showthread.php?t=124798 Go1pack http://scriptkiddiesec.blogspot.com/ http://damagelab.org/lofiversion/index.php?t=20852 http://forum.zloy.bz/archive/index.php?t-28859.html http://zae-biz.com/showthread.php?139-svjazka-Robopak. html http://zae-biz.com/showthread.php?108-Black-Hole-ExploitsKit-svjazka-jeksplojjtov.html http://www.kahusecurity.com/2011/new-unknown-exploit-kit-2/ http://www.kahusecurity.com/2011/metasploit-pack/ /www.kahusecurity.com /www.kahusecurity.com maymaym http://www.kahusecurity.com/2011/best-pack/ http://www.kahusecurity.com/2011/sava-exploits-pack/ https://damagelab.org/index.php?showtopic=21876 http://www.xaker.name/forvb/showthread.php?p=153371 pack http://hacker-pro.net/showthread.php?t=30721 http://www.opensc.ws/trojan-malware-samples/13246-zeroexploit-kit.html pack http://www.opensc.ws/unverified-listings/16175-bleedinglife-30-free-updates-amazing-features.html http://xylibox.blogspot.com/2011/09/blackhole-exploit-kit-v120. html
Blog Ted comment Analysis 02-'11 Analysis 04-'11 Analysis Analysis 04-'11
Analysis Ad 04-'11 ad 04-'11 Analysis 04-'11 ad ad ad ad
03-'11
ad 04-'11 Analysis 05-'11 Analysis 05-'11
Analysis 08-'11 Analysis 06-'11 Analysis 06-'11 Ad 07-'11 Ad 07-'11 ad reprint 05-'11? Ad discussion 02-'11? 02-'11? Ad
08-'11
Ad/analysis 09-'11
http://xylibox.blogspot.com/2011/12/blackhole-v121.html Ad/analysis 09-'11 http://xylibox.blogspot.com/2012/01/sakura-exploit-pack-10. html Ad/analysis 01-'12 http://malwareint.blogspot.com/2011/10/inside-phoenixexploits-kit-28-mini.html Ad/analysis 11-'11 from the pack contents 01-'12 kahusecurity.com - via email 01-'12 kahusecurity.com - via email 01-'12 kahusecurity.com - via email 01-'12 kahusecurity.com - via email 01-'12 Kahu Security 03-'12 F-Secure 03-'12 Kahu Security 03-'12 re Atomic Java saw pcap and off the record email from a researcher 03-'12 via Malware Don't Need Coffee 04 '12 via Kahu Security 02-'12 Kahu Security 03-'12 DaMaGeLab 12-'10 https://damagelab.org/index.php? showtopic=22663&pid=131743&st=0&#entry131743 http://prologic.su/topic/8484-kuplju-svjazku/ http://pastebin.com/DjGi7iyf Blackhole Exploit Kits update to v2.0 | Malware don't need Coffee http://malware.dontneedcoffee.com/2012/07/cve-2012-1723on-bh-ek.html#!/2012/07/cve-2012-1723-on-bh-ek.html + plus seller ads
08-'12 12 09-'12 09-'12
08-'12
http://malware.dontneedcoffee.com/2012/08/cve-2012-4681sweet-orange.html 09-'12 http://damagelab.org/lofiversion/index.php?t=22705 04-'12 http://exploit.in/forum/index.php?showtopic=57286&st=20 9-'12 http://www.kahusecurity.com/2012/crimeboss-exploit-pack/ 9-'12 http://www.kahusecurity.com/2012/neosploit-gets-java-0-day/ http://exploit.in/forum/index.php?showtopic=14526&st=60 4'12 http://www.binrand.com/post/2657885-cve-firefox-phoenixPhoenix 3.1.15 exploit-pack.html 07-'12 No Name http://pastebin.com/TV5MSUpu 09-'12 http://www.binrand.com/post/3616076-cve-java-cve-2010No Name 0188-pdf-libtiff-cve-2012-1723.html 09-'12 Cool exploit pack http://malware.dontneedcoffee.com/2012/10/newcoolek.html 10-'12 http://malware.dontneedcoffee.com/2012/08/cve-2012-4681Redkit redkit-exploit-kit-i-want.html 08-'12 http://blog.spiderlabs.com/2012/05/a-wild-exploit-kit-appears. Redkit html 05-'12 AssocAid http://twitter.yfrog.com/z/odzi7yep (mentioned by Brian Krebs) 09-'12 Cool Exploit Kit via Malware Don't Need Coffee 01-'13 CVE-2013-0422 via Malware Don't Need Coffee 01-'13 Sweet Orange via Malware Don't Need Coffee 12-'12 Whitehole Exploit Kit via Malware Don't Need Coffee 02-'13 Red Dot Exploit Kit via Malware Don't Need Coffee 01-'13 Styx 2.0 via Malware Don't Need Coffee 12-'12 Impact Exploit Kit via Malware Don't Need Coffee 11-'12 CVE-2013-0431 via Metasploit Blog 02-'13 http://eromang.zataz.com/2013/02/26/gong-da-gondadGong Da CVE-2013-0633 exploit-pack-add-flash-cve-2013-0633-support/ 02-'13 http://malware.dontneedcoffee. Popads com/2013/02/jre17u15unpatchedvuln.html 02-'13 http://blogs.mcafee.com/mcafee-labs/red-kit-an-emergingRedkit CVE-2012-1723 exploit-pack 01--'13 http://malware.dontneedcoffee.com/2012/11/meet-critxpackCritXPack previously-vintage-pack.html 03-'13 http://www.malwaresigs.com/2013/02/09/critxpack-adds-cveCritXpack CVE-2012-4792 2012-4792/ 03-'13 Sweet Orange @kafeine: CVE-2013https://twitter. 0431. No Serialization. com/kafeine/status/306519884894973953/photo/1 02-'13 http://pastebin.com/WXtgUHA6 KAFEINE ON JAN 25TH, Coolpack cve-2012-1876,1889,4792 2013 01-'13 http://malware.dontneedcoffee.com/2013/03/hello-neutrinoNeutrino just-one-more-exploit-kit.html 03-'13 http://malware.dontneedcoffee.com/2013/01/news-bullets-cve2012-0775-cve-2012.html http://malware.dontneedcoffee.com/2013/03/cve-2013-0634Coolpack CVE-2013-0634 adobe-flash-player.html 03-'13 http://malware.dontneedcoffee.com/2013/03/cve-2013-1493Coolpack CVE-2013-1493 jre17u15-jre16u41.html 03-'13 http://www.invincea.com/2013/02/popular-site-speedtest-netG01pack compromised-by-exploitdrive-by-stopped-by-invincea/ 02-.13 http://malware.dontneedcoffee.com/2013/04/meet-safe-packSafe Pack v2.0 v20-again.html 04-'13 http://malware.dontneedcoffee.com/2013/04/cve-2013-2423Coolpack CVE-2013-2423 integrating-exploit-kits.html 04-'13 https://twitter. Whitehole CVE-2013-1493 com/PhysicalDrive0/status/327108913797402624 04-'13 CVE-2013-2423 in CritX,CrimeBoss , Cool https://twitter.com/TimoHirvonen/status/327052978127269888 04-'13 http://1.bp.blogspot.com/Alpha pack NBeH_NIZFEE/UKZfCZvF3bI/AAAAAAAAMTE/FC9u0HKypcM/s1600/16-11-2012+16-42-07.jpg 10-'12 http://www.kahusecurity.com/page/2/? CVE-2013-0422 in Impact Pack wptouch_redirect=uyjxqcte 01-'13 SPL pack http://ondailybasis.com/blog/?p=1774 01-'13 https://urlquery.net/report.php?id=1229289 Serenity pack http://www.xylibox.com/2012/11/serenity-exploit-kit.html 11-'12 http://eromang.zataz.com/2013/02/26/gong-da-gondadGong Da CVE-2013-0634 exploit-pack-add-flash-cve-2013-0634-support/ 02-'13 Gong Da CVE-2013-1493 , CVE-2012http://eromang.zataz.com/2013/04/15/gong-da-gondad4792,CVE-2012-4969 exploit-kit-add-java-cve-2013-1493-ie-cve-2012-4969-support/ 04-'13 http://www.symantec.com/connect/blogs/java-exploit-cveremoved 04-25-2013 Kafeine confirmed that Symantec and F-Secure Redkit CVE-2013-2423 2013-2423-coverage 04-'13 reports are incorrect Redkit, Sibhost, nuclear, Cool CVE-2012- http://malware.dontneedcoffee.com/2012/11/cve-2012-50765076 massively-adopted.html 11-'12 http://eromang.zataz.com/2012/12/02/cool-exploit-kit-removeCool CVE-2012-1723 support-of-java-cve-2012-1723/ 12-'12 http://eromang.zataz.com/2012/12/05/kaixin-exploit-kitKaixin evolutions/ 12-'12 http://malware.dontneedcoffee.com/2013/02/cve-2013-0431CVE-2013-0431 java-17-update-11.html 02-.13 Crimeboss http://ondailybasis.com/blog/?p=1890 03-'13 http://community.websense. com/blogs/securitylabs/archive/2013/03/25/how-are-javaStyx attacks-getting-through.aspx 03-'13 Neutrino cve-2013-2423 https://twitter.com/kafeine/status/328099177106112513 04-.13 Sweet Orange cve-2013-2423 https://twitter.com/kafeine/status/328155237233852416 04-.13 Sakura cve-2013-2423 https://twitter.com/kafeine/status/328116559161741313 04-.13 Styx cve-2013-2423 https://twitter.com/kafeine/status/328220568883167232 04-.13 https://twitter. Whitehole cve-2013-2423 com/PhysicalDrive0/status/327108913797402624 04-.13 RedKit CVE-2013-2423 https://gist.github.com/jurg/8c49b2f11da4753a1174 04-.13 http://malware.dontneedcoffee.com/2013/03/hello-neutrinoNeutrino CVE-2013-1493 just-one-more-exploit-kit.html 3/13/2013 http://malware.dontneedcoffee.com/2013/08/cve-2013-2465CVE-2013-2465 integrating-exploit-kits.html?q=Neutrino 08-13 http://malwageddon.blogspot.nl/2013/09/unknown-ek-by-wayLightsOut how-much-is-fish.html 09-'13 http://blogs.cisco.com/security/watering-hole-attacks-targetLightsOut energy-sector/ 09-'13 https://blog.avast.com/2013/11/20/fallout-from-nuclear-packNuclear exploit-kit-highly-toxic-for-windows-machines/ 11-'13 http://vrt-blog.snort.org/2013/11/im-calling-this-goon-exploitGoon kit-for-now.html 11-'13 http://blog.fox-it.com/2013/03/06/seen-in-the-wild-updatedNice Pack exploit-kits/ 03-'13 Redkit http://www.kahusecurity.com/2013/digging-deeper-into-redkit/ 05-'13 http://nakedsecurity.sophos.com/2013/05/09/redkit-exploit-kitRedkit part-2/ 05-'13 http://www.kahusecurity.com/2013/analyzing-dotkachefDotkaChef exploit-pack/ 12-'13 http://blog.fox-it.com/2013/08/01/analysis-of-maliciousFlimkit advertisements-on-telegraaf-nl/ 08-'13 http://malware.dontneedcoffee.com/2013/08/cve-2013-2465Flimkit integrating-exploit-kits.html 08-'13 http://www.kahusecurity.com/2013/deobfuscating-magnitudeMagnitude / Death Touch exploit-kit/ 11-'13 Magnitude / Death Touch http://malware.dontneedcoffee.com/2013/10/Magnitude.html 10-'13 http://malware.dontneedcoffee.com/2013/11/cve-2013-2551Magnitude / Death Touch and-exploit-kits.html 11-'13 http://malware.dontneedcoffee.com/2013/07/pep-new-bep. Private EK html 07-'13 http://malware.dontneedcoffee.com/2013/09/jre7u21-andPrivate EK cve-2013-2460 earlier-click-2-play.html 09-'13 http://malware.dontneedcoffee.com/2013/07/a-styxy-cool-ek. Cool/Styxy html 07-'13 Sweet orange Sweet orange Grandsoft Crimeboss Neosploit Nuclear pack 2.0
Cool/Styxy Styx (aka Kein) Styx Styx CVE-2013-2472 Styx CVE-2012-1723, CVE-2013-2463, CVE-2013-2460 Angler Angler CVE-2013-2551 Angler CVE-2013-0634 Himan EK 2013-2551 in many Neutrino Neutrino Neutrino Fiesta Fiesta CVE-2010-0188 Fiesta CVE-2013-0634 Nuclear Flashpack Flashpack CK CK CK CK Zuponcic Kore
http://blog.trendmicro.com/trendlabs-security-intelligence/styxexploit-pack-how-it-works/ http://malware.dontneedcoffee.com/2013/11/inside-the-simdaaffiliate-podmena.html http://malforsec.blogspot.com/2013/04/styx-exploit-kitanalysis-building.html https://twitter.com/kafeine/status/382544788664221696 http://eternal-todo.com/blog/styx-exploit-kit-simda http://malware.dontneedcoffee.com/2013/11/cve-2013-0074silverlight-integrates.html http://malware.dontneedcoffee.com/2013/11/cve-2013-2551and-exploit-kits.html http://malware.dontneedcoffee.com/2013/03/cve-2013-0634adobe-flash-player.html http://malware.dontneedcoffee.com/2013/10/HiMan.html http://malware.dontneedcoffee.com/2013/11/cve-2013-2551and-exploit-kits.html?q=neutrino http://malware.dontneedcoffee.com/2013/09/jre7u21-andearlier-click-2-play.html?q=neutrino http://malware.dontneedcoffee.com/2013/08/cve-2013-2465integrating-exploit-kits.html?q=neutrino http://malforsec.blogspot.com/2013/09/neutrino-exploit-kit-notso-exploity.html http://malware.dontneedcoffee.com/search?q=Fiesta http://malware.dontneedcoffee.com/2013/07/urausyransomware-07-y-2013-design.html?q=Fiesta http://malware.dontneedcoffee.com/2013/03/cve-2013-0634adobe-flash-player.html?q=Fiesta https://blog.avast.com/tag/exploit-kit/ http://malware.dontneedcoffee.com/2013/04/meet-safe-packv20-again.html http://malware.dontneedcoffee.com/2013/11/cve-2013-2551and-exploit-kits.html http://www.cysecta.com/2013/12/16/ck-exploit-kit-in-late-2013/ http://www.cysecta.com/2013/04/14/the-ck-exploit-kit-netbooms-metamorphosis/ CK http://www.kahusecurity.com/2013/deobfuscating-the-ckexploit-kit/ http://www.cysecta.com/2013/05/22/ck-exploit-kit-in-early2013/ http://blog.fox-it.com/2013/12/19/not-quite-the-averageexploit-kit-zuponcic/ http://www.kahusecurity.com/2013/kore-exploit-kit/
09-'13 11-'13 04-'13 09-'13 10-'13 11-'13 11-'13 03-'13 10-'13 11-'13 09-'13 08-'13 09-'13 01-'14 08-'13 03-'13 11-'13 04-'13 11-'13 12-'13 04-'13 09-'13 05-'13 12-'13 07-'13
http://malware.dontneedcoffee.com/2013/08/cve-2013-2465integrating-exploit-kits.html 08-'13 http://malware.dontneedcoffee.com/2013/09/FinallyGrandSoft. html 09-'13 Sakura http://malware.dontneedcoffee.com/2013/09/jre7u21Sakura and-earlier-click-2-play.html 09-'13 http://malware.dontneedcoffee.com/2013/08/cve-2013-2465Sakura integrating-exploit-kits.html?q=sakura 08-'13 http://malware.dontneedcoffee.com/2013/08/cve-2013-2465Cool EK (Kore-ish) integrating-exploit-kits.html 08-'13 Topic http://www.malwaresigs.com/2013/05/31/topic-exploit-kit/ 05-'13 http://malware.dontneedcoffee.com/2013/08/cve-2013-2465Glazunov integrating-exploit-kits.html 08-'13 Rawin http://pastebin.com/KU70Mkth 08-'13 White Lotus http://archive.is/N2YwZ 11-'13 http://webcache.googleusercontent.com/search?q=cache:http: //comments.gmane.org/gmane.comp.security.ids.snort. White Lotus CVE-2013-2551 emerging-sigs/20321 11-'13 http://malware.dontneedcoffee.com/2013/08/cve-2013-2465Sweet Orange CVE-2013-2471 integrating-exploit-kits.html 08-'13 http://www.cysecta.com/2013/03/30/the-last-net-boom-exploitNetboom packs/ 03-'13 http://malware.dontneedcoffee.com/2013/04/cve-2013-2423Sibhost integrating-exploit-kits.html?q=sibhost 04-'13 http://malware.dontneedcoffee.com/2013/09/jre7u21-andKore CVE-2013-2460 earlier-click-2-play.html 09-'13 Kore Exploit Kit in action (CVE-2013-2423) http://www.youtube.com/watch?v=_NvOR-Wm2s0 08-'13 http://blogs.technet.com/b/mmpc/archive/2013/05/07/cve2012-1876-recent-update-to-the-cool-exploit-kit-landing-page. Cool EK aspx 05-'13 http://www.youtube.com/watch? Nuclear 3 v=6RFHMEZTA1k&list=PLhQcVYGWsmtBuswBbQNH2xwqhc-kVwuzf&index=4 07-'13 Fiesta http://malware-traffic-analysis.net/2014/01/01/index.html 01-'13 http://malware.dontneedcoffee.com/2013/04/cve-2013-2423StampEK CVE-2013-2423 integrating-exploit-kits.html?q=Stamp 04-'13 http://malware.dontneedcoffee.com/2013/09/FinallyGrandSoft. Grandsoft CVE-2013-0422 html?q=Stamp 09-'13 http://malware.dontneedcoffee.com/2013/09/FinallyGrandSoft. Grandsoft CVE-2013-2463 html?q=Stamp 09-'13 http://malware.dontneedcoffee.com/2013/09/FinallyGrandSoft. Grandsoft CVE-2013-0188 html?q=Stamp 09-'13 http://malware.dontneedcoffee.com/2013/09/FinallyGrandSoft. Grandsoft CVE-2011-3544 html?q=Stamp 09-'13 Topic http://www.malwaresigs.com/2013/05/31/topic-exploit-kit/ 05-'13 http://malware.dontneedcoffee.com/2013/04/cve-2013-2423Sweet Orange CVE-2013-2423 integrating-exploit-kits.html?q=sweet+orange 04-'13 http://malware.dontneedcoffee.com/2013/11/cve-2013-0074Fiesta silverlight-integrates.html?q=fiesta 01-'14 x2o http://malware.dontneedcoffee.com/search?q=x2o 08-'13 Redkit http://www.kahusecurity.com/2014/the-resurrection-of-redkit/ 01-'14 http://malforsec.blogspot.com/2013/12/merry-christmasGondad / Gong da cve-2013-3897 gondad-style.html 12-'12 http://nakedsecurity.sophos.com/2012/11/16/blackholeBlackhole copycats and versions confusion-custom-builds-or-copycats/ http://malware.dontneedcoffee.com/2014/01/cve-2013-3918Nuclear CVE-2013-3918 integrates-exploit-kits.html 01-'14 Crimeboss https://twitter.com/TimoHirvonen/status/385849185376808960 10-'13 x2o (Redkit Light) Grandsoft
Legend Black - Francois Paget Red - Gunther Blue - Mila Green - L0NGC47 Purple - Fibon
CVE
slang/shorthand Exploit via / (CLICK ON filetype / CELLS 2 SEE product TEXT)
Exploit Description
Pack Release Date CVE-20000495 CVE-20030111 CVE-20041043 CVE-20040549 CVE-20040636 CVE-20040380 CVE-20052127 CVE-20052265 CVE-20050055 CVE-20060003 CVE-20060003/20064704 CVE-20060005 CVE-20061359 CVE-20063643 CVE-20063677 CVE-20063730 CVE-20064704 CVE-20064777 CVE-20064868 CVE-20065559 CVE-20065650 CVE-20065745 CVE-20065820 CVE-20066884 CVE-20070015 CVE-20070018 CVE-20070024 CVE-20070038 CVE-20070071 CVE-20072222 CVE-20070243 CVE-20073147/3148 CVE-20074034 CVE-20074336 CVE-20075327 CVE-20075659/20080655 CVE-20075755 CVE-20075779 CVE-20076250 CVE-20080015 CVE-20080624 CVE-20081309 CVE-20081472 CVE-20082463 CVE-20082992 CVE-20083008 CVE-20084844 CVE-20085178 CVE-20085353 CVE-20090075/0076 CVE-20090355 CVE-20090836 CVE-20090927 CVE-20091136 CVE-20091148 CVE-20091149 CVE-20091150 CVE-20091151 CVE-20091538 CVE-20091671 CVE-20091862 CVE-20091869 CVE-20092477 CVE-20093269 CVE-20093867
MS WME
AOL Instant Messenger
Zero ( Merry Black Phoenix Open Eleonore EleoNore EleonoreEleonore1.4.4 Eleonore Eleonore PhoenixPhoenix PhoenixPhoenix PhoenixPhoenixPhoenixFragusFragus Christmas hole 2.8 Source LinuQ 1.6.5 1.6.4 1.6.3a Mod 1.4.1 1.3.2 2.7 2.5 2.4 2.3 2.2 2.1 2.0 Black 1 PEK v2. 1.0.0 mini kit 3 mod mod?)
12-'1109-'1104-'1108-'1005-'11? 02-'11 02-'11
07-'09
0? -'10
07-'10
2011 07-'0902-'11? 08-'11 07-'11 07-'11 06-'11 old
YES YES
IE
MS IE _ MSHTML IE6
AOL
AOL _ Instant Messenger goaway Overflow MS OUTLOOK EXPRESS MHTML URL Processing Vulnerability COM Object Instantation Memory Corruption (Msdssdll) FIREFOX MOZILLA NETSCAPE MFSA2005-50 - Firefox Install VersioncompareTo IE 5.01, 5.5, and 6 DHTML Method Heap Memory Corruption Vulnerability MS06-014 for lE6/Microsoft Data Access Components (MDAC) Remote Code Execution
FF
IE IE MS WMP
YES YES YES YES
YES
YES
YES
YES
YES
YES
YES
YES
Internet Explorer COM CreateObject Code Execution MS06-006 - Windows Media Player plug-in vulverabiIity for Firefox & Opera
YES
YES
YES
YES
YES
YES
YES
YES
YES
?
MS06-013 - CreateTextRange Microsoft Management Console (MMC) Redirect CrossSite Scripting (XSS) vulnerability (IE) Firefox -js navigator Object Code
YES
YES
YES YES
YES
YES
NO
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES YES YES
YES
YES
NO
YES
YES YES
YES
YES
YES
YES
YES
YES YES
YES
Javad0—JRECalendar Java Deserialize
YES
YES
IE 7
MS09-002 - lE7 Memory Corruption Firefox Components/sessionstore/src/nsSessionStore.js
YES
YES
FIREFOX PDF ADOBE/FOXIT
JAVA GSB JAVA Sun Java JRE AWT SetDiff ICM Buffer Overflow JAVA
CVE-20093958
download mgr
NOS Microsystems
YES
YES
YES
YES YES
YES
YES YES YES
YES
YES YES YES
YES
YES
YES
YES
YES YES YES NO Removed YES YES
YES YES YES
YES YES YES
YES
YES
YES
YES YES
YES
YES
optional optional YES
YES
NORemoved YES YES YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES YES YES
YES
YES YES YES
YES
YES
YES
YES YES YES
YES
YES
YES YES
NO
YES YES YES
YES
YES YES
YES
YES YES YES
YES
YES
YES
YES YES YES
NO removed YES
YES
YES
YES
YES
YES
YES
YES YES YES/Generator
YES
YES
YES YES YES
YES YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES YES YES
YES
YES
YES
YES
YES YES YES
YES YES YES
YES YES
YES
YES YES YES
YES
YES
YES YES YES
YES YES
YES YES
YES
YES
YES
YES
YES
YES YES
YES
YES YES YES
YES
YES
YES YES YES
YES
YES YES
YES
YES
YES
YES
YES
YES YES
YES
YES YES
YES YES
YES YES
YES (?) YES (?) YES (?) YES YES
YES YES
YES YES YES
Firefox - Font tags | Firefox 3.5 escape() Return Value Memory Corruption
YES
Telnet for Opera Th3270
YES
Sun Java JRE AWT SetDiff ICM Buffer Overflow buffer overflows in the NOS Microsystems getPlus Helper ActiveX control before 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat
YES
YES
Adobe Reader - Foxit Reader PDF OPEN
Java Runtime Env. getSoundBank Stack BOF
YES YES
YES
firefoxdiffer
CVE-20093869
YES
YES
IE7 MEMCOR
SWF
YES
YES
YES
Flash 10 SWF Mozilla FF 3.5 Exploit / font tags | FF escape retval FIREFOX TELNET - for OPERA 9.0 9.25 or OPERA OPERA
YES
YES YES YES
YES
Static code injection vulnerability in setup.php MS09-028 Microsoft DirectShow Remote Code Execution. Java buffer overflows in the Deployment Toolkit ActiveX control in deploytk.dll Memory corruption via a crafted Flash application in a .pdf file or a crafted .swf file (authplay.dll) Integer overflow in the AVM2 abcFile parser in Adobe Flash Player
YES
YES
YES
Heap-based buffer overflow in Opera 9.62
JAVA
YES
YES YES YES
Internet Explorer 7 XML Exploit
QUICKTIME
YES
YES
Windows Media Encoder Buffer Overrun Vulnerability
PHPMYADMIN
YES
YES
YES
IE 7
CRLF injection vulnerability Multiple cross-site scripting (XSS) vulnerabilities in the export page
YES
YES
MS WME
PHPMYADMIN
YES
YES
YES YES
Opera 9.62 OPERA JAVA JRE / Javad0 / Javado / Java Calendar / javaold/JavaSr0 JAVA
PHPMYADMIN
YES
YES YES YES
PDF Exploit• util.printf
Directory traversal vuln in bs_disp_as_mime_type.php
YES
YES YES
PHPMYADMIN
YES
YES
YES
IE - MSACCESS M508-041 - MS Access Snapshot Viewer
IE
YES
YES
YES
util.printf
spreadsheet PMA phpmyadmin PMA phpmyadmin PMA phpmyadmin PMA phpmyadmin
YES
YES
AOL Radio AmpX Buffer Overflow Buffer overflow in the GomManager (GomWeb Control) ActiveX control in GomWeb3.dll 1.0.0.12 in Gretech Online Movie Player (GOM Player) AOL Radio AmpX (AOLMediaPlaybackControl) ActiveX control vulnerability
PDF Exploit- collab.getlcon MSO9-043 - lE OWC Spreadsheet ActiveX control Memory Corruption
YES
YES
YES
YES
YES
YES
m_Cor_n / MS Office Snapshot/IE snapshot or activexbundle
PDFOPEN PDF collab. getIcon / pdf-gi
YES
YES YES YES
DirectX - DirectTransform FlashPix ActiveX (IE) CA BrightStor ARCserve Backup Multiple VulnerabiIities
BrightStor ARCserve Backup R11.5
YES
YES
DirectX
ARCSERVE
YES YES
YES
Java GIF file parsing vulnerability
REAL PLAYER
YES YES YES
YES
YES
ACTIVEX
YES
YES
Integer overflow in Adobe Flash Player 9 IE -buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls
MS09-032 DirectX DirectShow (IE) Buffer overflow in the YMP Datagrid ActiveX control (datagrid.dll) in Yahoo! JukeBox RealPlayer ActiveX Control Console Property Memory Corruption
YES YES
YES YES
YES
IE6/IE7 DSHOW IE
YES
YES
Yahoo! Widgets YDP (IE)
AOL
YES
YES YES
YES
Yahoo! Messenger Webcam (IE)
ACTIVEX
YES YES YES
YES
Vector Markup Language Vulnerability (IE) Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow
PDF Exploit -collab, collectEmaillnfo
YES
YES
YAHOO
AOL
YES
YES
YAHOO
collab, collectEmaillnfo PDF
YES
YES
Apple QuickTime RTSP URI (lE) NCTsoft NCTAudioFile2 ActiveX Control Remote Buffer Overflow Vulnerability
ARCSERVE
YES YES
YES YES
QUICKTIME
IE
YES
YES
YES
JAVA GIF PARSE JAVA
YES
YES
Winzip FileView ActiveX (IE)
SWF
YES YES
YES
WINZIP
IE
YES
YES
AOL
FLASH 9
YES
YES
YES
Windows ANI LoadAniIcon
YES
YES
Microsoft XML Core Services Vulnerability AOL SuperBuddy ActiveX Control LinkSBlcons() Vulnerability
IE
YES
YES YES
WebViewFolderlcon (IE) Cross-zone scripting vulnerability in the WMI Object Broker (WMIScriptUtils.WMIObjectBroker2) DirectAnimation ActiveX Controls Memory Corruption Vulnerability MSO6-055 - Windows Vector Markup Language IE + OUTLOOK Vulnerability MS07-009- lE6/Microsoft Data Access Components IE (MDAC) Remote Code Execution America Online ICQ ActiveX Control Arbitrary File AOL Download and Execute
NCTsoft
YES YES YES
YES
MS VSTUDIO
IE
YES?
YES
IE
iexml
40360 05-'10 05-'10 09-'09 09-'09 06-'0902-'0909-'09
YES
IE
AOL
2010 2010 07-'1005-'1004-'1003-'10
YES
Firefox Jno / JNO FF
DirectX
05-'1105-'11 03-'112010 01-'11 08-'11
Unique Impassioned YES Liberty Pack Liberty EL Framework Salo Exploit 2.1.0 JustExploit ZopackiPack IcepackMpackWebattack Sploit 1.0.7 Fiiesta 1.0 3.0RC * 2.1
MS IE _ MSOS-001 HTML vulnerabilities
IE
IE6 MDAC America Online ICQ ActiveX
Open "Dloader" BleedingBleeding SEO Zombie Best mushroom Crimepack Crimepack Crimepack Crimepack T- Tornado Siberia BombaPapka Source Robopak ? Katrin Life Life DragonNuclear Sploit Infection Lupit Pack unkNOwn 3.1.3 3.0 2.2.8 2.2.1 Iframer(Incomplete) /MetaPack UkNOwnname 3.0 2.0 pack kit
IE
IE
WMI Object Broker
Sava / Pay0C
MS VM
IE
IE COM CreateObject FF EMBED / MS06-006
Black hole 1.1.0
YES
IE
mdac
Black hole 1.2.0
MS WME Malformed Windows Media Encoder Request MS VM M503-O11 - ByteCode Verifier component flaw in Microsoft VM
MS OUTLOOK
FF CompareTo
Black hole 1.2.1
YES
YES
YES
YES
YES
YES
YES
YES
YES YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES ?
YES NO removed YES
YES
YES
YES
YES
YES
YES YES
YES
YES YES YES
NO
YES YES YES
YES
YES YES
YES
YES YES
YES (temp off) YES YES
YES
YES
CVE-20094324 CVE-20100188 CVE-20100249 CVE-20100094 CVE-20100483 CVE-20100806 CVE-20100805
PDF mediaNewPlayer / pdf-mp PDF PDF Libtiff / Lib
Aurora
IE
javarmi JAVA IE Winhlp32.exe MsgBox IE
CVE-20100840
IEPeers msiemc IE IE Tabular Data Control ActiveX IE JAVA TC (?) javagetval OBE Java invoke / Java Trust JAVA
CVE-20100842
JAVA MIDI Java OBE
CVE-20100886
JAVA SMB / JAVA JDT JAVA
CVE-20101240 CVE-20101297 CVE-20101423 CVE-20101818 CVE-20101885 CVE-20102883 CVE-20102884 CVE-20103552 CVE-20103653 CVE-20103654 CVE-20103962 CVE-20103971 CVE-20104452 OSVDB61964
PDFOPEN
PDF SWF
SWF
javanew JWS
JAVA
QuickTime 6.x, 7.x
QUICKTIME
hcp PDF FONT / Cooltype
CVE-20110611 CVE-20111255 CVE-20112110 CVE-20112140 CVE-20112462 CVE-20113521 CVE-20113544 CVE-20120003 CVE-20120507
MS HCP PDF PDF
JAVA SKYLINE
JAVA SHOCKWAVE
FlashPlayer Button
SWF
CSS Clip
IE
IE-8 css parser Java Codebase Trust
IE
AOL
AOL
EDB-11175 Java Signed Applet CVE-20110558 CVE-20110559
JAVA
JAVA
MS WMP Signed Applet Social Engineering Code Exec
JAVA
Flash <10.2
SWF
Flash 10 by exm SWF
PDF Exploit - docmedianewPlayer PDF Exploit - LibTiff Integer Overflow se-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 Java Runtime Environment component in Oracle Java SE Internet Explorer Winhlp32.exe MsgBox Code Execution IEPeers Remote Code Execution IE7 Unitialized Memory Corruption Internet Explorer Tabular Data Control ActiveX Memory Corruption
Microsoft Office document with an embedded .swf file IE Time Element Memory Corruption
SWF
Flash memory corruption June - 2011
SWF
Flash memory corruption August-2011
U3D onject memory corruption December 2011
JAVA
Type confusion vulnerability in Oracle Java Update 27
Java Rhino
JAVA
WMP MIDI
MS WMP
Vulnerability in the Rhino Script Engine vulnerability in winmm.dll in Windows Multimedia Library in Windows Media Player (WMP)
Java Atomic "Java JSM"
JAVA JAVA JAVA - SWF
YES YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
NO
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES (added)
YES
YES YES
YES
YES YES YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES YES
YES
YES
YES
YES
YES YES
YES
YES
YES
YES
YES
YES
YES YES
YES
YES
YES
YES
NO
YES YES YES
YES
YES
YES
YES YES YES
YES
YES
YES
YES
YES YES
YES YES
YES YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES YES
YES
YES
YES YES (?)
YES
YES?
YES
YES
YES
YES
YES?
YES
YES
YES YES
YES
YES
YES
YES
YES YES
YES
(YES either this or CVE2009-1869)
YES
YES
maybe means JMS CVE-2010-4438 ? unpecified Java and Flash
YES ? at least 3 4? YES
8+
10
Price Exploit Description
YES YES
YES
incl.expired "zero-day"exploit generators unspecified old IE exploits (Salo pack is rare and old) unspecified IE-"0day"
Number of exploits included
CVE
YES
YES
www.metasploit. com/modules/exploit/multi/browser/java_signed_applet Integer overflow in Adobe Flash Player before 10.2.152.26 Denial of service (memory corruption) via crafted parameters
IE
YES
YES
YES
Help Center URL Validation Vulnerability YES PDF Exploit Adobe Reader Stack-based buffer overflow in CoolType.dll Adobe authplay.dll ActionScript AVM2 memory corruption Vulnerability – Adobe Reader < 9.4.0 – ALL Windows Unspecified vulnerability in the New Java Plug-in – Java 6 < Update 22 – IE Only – ALL Windows NO The Director module (dirapi.dll) in Adobe Shockwave Player memory corruption and application crash via crafted SWF content October 2010. mem cor Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 Use-after-free vulnerability in the CSharedStyleSheet:: Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll Sun Java Applet2ClassLoader Remote Code Execution Exploit AOL 9.5 Phobos.Playlist (Phobos.dll) ActiveX Control Import Windows Media Player 11 ActiveX launchURL() files download
SWF -OFC
slang/shorthand (CLICK ON CELLS 2 SEE TEXT)
YES
Adobe PDF SWF Java Deployment Toolkit Remote Argument Injection Vulnerability (Taviso) QuickTime 6.x, 7.x Read function in QTPlugin.ocx allows remote attackers to execute arbitrary code via the _Marshaled_pUnk attribute
IE 6-8
IE IE IE
YES
Generator
Trusted Method Chaining - Java getValue Remote Code Execution NO Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an uncontrolled array index that allows remote attackers to execute arbitrary code via a MIDI file with a crafted MixerSequencer object, related to the GM_Song structure. YES Java SMB / Java JDT in Oracle Java SE and Java for Business JDK and JRE 6 Upd 10-19 * Requires xtra components NO Open/Launch embedded exe via built in functionality, ability to change user prompt text. Reported by Didier Stevens.
Flash 10
PDF U3D
YES YES
Black hole 1.2.1
Black hole 1.2.0
9 10 1500 $1500/year Black hole 1.1.0
11
9
10 15/16
$2,000 $2,000
6
12
7
12
15 15/16 15/16
14
10
14
14
10
62
16
4 25+/-
$2,200
Zero ( Merry Black Phoenix Open Eleonore EleoNore EleonoreEleonore1.4.4 Eleonore Eleonore PhoenixPhoenix PhoenixPhoenix PhoenixPhoenixPhoenixFragusFragus Christmas hole 2.8 Source LinuQ 1.6.5 1.6.4 1.6.3a Mod 1.4.1 1.3.2 2.7 2.5 2.4 2.3 2.2 2.1 2.0 Black 1 PEK v2. 1.0.0 mini kit 3 mod mod?)
Sava / Pay0C
Need to confirm list of CVE here
8
6
8
12
12
9 8 12 10 $150 250/800$ rent /$500-wk/month wk/mo $25/day $1,000
8
8
9
15
14
16
16
7
10
7
11
12
6
10
7
7
4
4
12
9
6
7
$900
Open "Dloader" BleedingBleeding SEO Zombie Best mushroom Crimepack Crimepack Crimepack Crimepack T- Tornado Siberia BombaPapka Source Robopak ? Katrin Life Life DragonNuclear Sploit Infection Lupit Pack unkNOwn 3.1.3 3.0 2.2.8 2.2.1 Iframer(Incomplete) /MetaPack UkNOwnname 3.0 2.0 pack kit
Unique Impassioned YES Liberty Pack Liberty EL Framework Salo Exploit 2.1.0 JustExploit ZopackiPack IcepackMpackWebattack Sploit 1.0.7 Fiiesta 1.0 3.0RC * 2.1
"No Name" Best Pack Blackhole Exploit kit Bleeding Life Bomba Cool CRIMEPACK Dragon CritXPack EL Fiiesta Eleonore Fragus Black Gong Da Grandsoft Hierarchy Exploit Pack Icepack Impassioned Framework 1.0 Incognito iPack JustExploit Katrin Liberty LinuQ Lupit Merry Christmas Mpack mushroom /unknown Neosploit Nuclear Nucsoft Neutrino Open Source /MetaPack Papka Phoenix Redkit Dloader ? Red Dot Robopak Safe Pack
Sakura Exploit Pack Salo
Sava / Pay0C SEO Sploit pack Siberia SofosFO aka Stamp EK Siberia Private Sweet Orange T-Iframer Techno Tornado Uknownname Unique Pack Sploit 2.1 Webattack Whitehole XPack Yang Pack Yes Exploit Zero Zhi Zhu Zombie Infection kit Zopack LightsOut
This sheet shows colors indicating original contributors. The table grew large and is more confusing and hard to read. This page (v. 16, 2012) will stay as is for historical reasons -for the credits and reference. In the future, please see the References tab for the pack information contributions. I want to thank you all for helping and sending information. Black - Francois Paget Red - Gunther Blue - Mila CVE
slang/shorthand (CLICK ON CELLS 2 SEE TEXT)
CVE-2000-0495 CVE-2003-O111 CVE-2004-1043 CVE-2004-0549 CVE-2004-0636 CVE-2004-0380 CVE-2005-2127 CVE-2005-2265 CVE-2005-0055 CVE-2006-0003 CVE-2006-0003/20064704 CVE-2006-0005 CVE-2006-1359
Gong Da
F
MSHTML IE6
Yes
Yes
MFSA2005-50 - Firefox Install VersioncompareTo
FLASH 9
Integer overflow in Adobe Flash Player 9 IE -buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls
JAVA GIF PARSE
Java GIF file parsing vulnerability
Yes
Yes
Yes
Yes
Yes
Yes
Yes
no
Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
?
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
?
Yes
PDF Exploit• util.printf
Yes
?
Yes
?
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes Yes
Yes Yes
Yes Yes Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes Yes Yes
Yes Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
no
Yes
Yes Yes
NoRemoved Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes Yes Yes Yes Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes
Yes Yes
Yes Yes
Yes
Yes Yes
Yes Yes Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes No Removed Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
optionaloptionalYes Yes Yes Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes Yes Yes Yes
Yes Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No Yes
Yes Yes
Yes Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes
Yes
Yes Yes
Yes Yes
Yes
Yes
Yes
Yes
yes
Javad0—JRECalendar Java Deserialize MS09-002 - lE7 Memory Corruption
?
firefoxdiffer
Firefox - Components/sessionstore/src/nsSessionStore.js
PDFOPEN PDF collab.getIcon / pdf-gi
Adobe Reader - Foxit Reader PDF OPEN
No removed Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes
PDF Exploit- collab.getlcon
Yes
?
Yes
?
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes
Yes Yes
Yes Yes
Yes Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes
Yes Yes
Yes
Yes Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
yes
Yes
Yes
Yes
Java buffer overflows in the Deployment Toolkit ActiveX control in deploytk.dll Memory corruption via a crafted Flash application in a .pdf file or a crafted .swf file (authplay.dll)
Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes no
Yes Yes
Yes
Yes
Yes
PDF Exploit - LibTiff Integer Overflow se-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 Java Runtime Environment component in Oracle Java SE
IEPeers msiemc IE Tabular Data Control ActiveX
IEPeers Remote Code Execution IE7 Unitialized Memory Corruption
yes
No removed Yes
Yes Yes
Yes Yes
Yes Yes
Yes
Yes
Yes
QuickTime 6.x, 7.x hcp
Help Center URL Validation Vulnerability
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes (one file w rhino)
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes (added)
Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
no
no
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
no
no
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes
yes
Yes Yes Yes
Yes
Yes
Yes Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
yes
Yes
Yes
Yes
no
no
Yes
Yes
Yes
Yes
Yes
?
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes
memory corruption and application crash via crafted SWF content October 2010. mem cor Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll
Java Codebase Trust
Sun Java Applet2ClassLoader Remote Code Execution Exploit
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes
Yes?
Yes
Yes
Yes
Yes?
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes
Yes
AOL 9.5 Phobos.Playlist (Phobos.dll) ActiveX Control Import Windows Media Player 11 ActiveX launchURL() files download
Yes
Signed Applet Social Engineering Code Exec
www.metasploit.com/modules/exploit/multi/browser/java_signed_applet
Flash <10.2
Integer overflow in Adobe Flash Player before 10.2.152.26
Flash 10 by exm
enial of service (memory corruption) via crafted parameters
CVE-2011-0611
Flash 10
Microsoft Office document with an embedded .swf file
CVE-2011-1255 CVE-2011-2110 CVE-2011-2140 CVE-2011-2462 CVE-2011-3521 CVE-2011-3544
IE 6-8
IE Time Element Memory Corruption
CVE-2012-0003 CVE-2012-0507
WMP MIDI
Yes Yes
Yes
Flash memory corruption August-2011
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
(Yes either this or CVE20091869)
Yes
Yes Yes
Type confusion vulnerability in Oracle Java Update 27
Yes
Yes
Yes
Yes Yes Yes
U3D onject memory corruption December 2011 Vulnerability in the Rhino Script Engine vulnerability in winmm.dll in Windows Multimedia Library in Windows Media Player (WMP)
Yes Yes
Yes Yes Yes
Flash memory corruption June - 2011
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Java Atomic maybe means JMS CVE-2010-4438 ?
Yes
unpecified Java and Flash
?
at least 3
incl.expired "zero-day"exploit generators
4?
unspecified old IE exploits (Salo pack is rare and old)
Yes
unspecified IE-"0day"
Number of exploits included
3
Pack Release date/update
03-2012
8 5
4?
$900 ZhuZhu
9 9
032010 02-2012 2012 2010 2012
Price Description
Yes (temp off)
Yes
Yes
yes
Yes
Yes
Yes
Yes (?)
IE-8 css parser
Yes
No
Yes
The Director module (dirapi.dll) in Adobe Shockwave Player CSS Clip
Yes
Yes
Yes
PDF FONT / Cooltype PDF Exploit Adobe Reader Stack-based buffer overflow in CoolType.dll Adobe authplay.dll ActionScript AVM2 memory corruption Vulnerability – Adobe Reader < 9.4.0 – ALL Windows Unspecified vulnerability in the New Java Plug-in – Java 6 < Update 22 – IE Only – ALL JAVA SKYLINE Windows FlashPlayer Button
Yes
Yes ? Yes
Yes
Internet Explorer Tabular Data Control ActiveX Memory Corruption
Java Deployment Toolkit Remote Argument Injection Vulnerability (Taviso) QuickTime 6.x, 7.x Read function in QTPlugin.ocx allows remote attackers to execute arbitrary code via the _Marshaled_pUnk attribute
Yes
Yes
Yes
Yes Yes
Generator
JAVA TC (?) javagetval OBE Java invoke / Java Trust Trusted Method Chaining - Java getValue Remote Code Execution Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an uncontrolled array index that allows remote attackers to execute arbitrary code via a MIDI file with a JAVA MIDI Java OBE crafted MixerSequencer object, related to the GM_Song structure. Java SMB / Java JDT in Oracle Java SE and Java for Business JDK and JRE 6 Upd 10-19 * JAVA SMB / JAVA JDT Requires xtra components Open/Launch embedded exe via built in functionality, ability to change user prompt PDFOPEN text. Reported by Didier Stevens. javanew JWS
yes
Yes Yes Yes
Adobe PDF SWF
Yes
Yes
Yes
Yes
Yes
Internet Explorer Winhlp32.exe MsgBox Code Execution
PDF SWF
Yes
Yes
Yes
Sun Java JRE AWT SetDiff ICM Buffer Overflow buffer overflows in the NOS Microsystems getPlus Helper ActiveX control before download mgr 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat PDF mediaNewPlayer / pdf-mp PDF Exploit - docmedianewPlayer
javarmi IE Winhlp32.exe MsgBox
yes
Yes Yes
Yes
Yes
Yes
Java Runtime Env. getSoundBank Stack BOF
Aurora
Yes
Yes
Yes
Telnet for Opera Th3270
PDF Libtiff / Lib
Yes
Yes (?) Yes (?) Yes (?) Yes
Static code injection vulnerability in setup.php
"Java JSM"
Yes
Yes/Generator
Yes
MS09-028 Microsoft DirectShow Remote Code Execution.
slang/shorthand
Yes
Yes
Yes
CVE-2010-3971 CVE-2010-4452 OSVDB-61964 EDB-11175
CVE
Yes
Yes
M508-041 - MS Access Snapshot Viewer
Heap-based buffer overflow in Opera 9.62
Java Rhino
Yes
Yes
Yes
MS09-032 DirectX DirectShow (IE)
Internet Explorer 7 XML Exploit
PDF U3D
Yes
Yes Yes Yes Yes Yes Yes
Windows Media Encoder Buffer Overrun Vulnerability
AOL
Yes
yes
Yes
Yes
AOL Radio AmpX Buffer Overflow Buffer overflow in the GomManager (GomWeb Control) ActiveX control in GomWeb3. dll 1.0.0.12 in Gretech Online Movie Player (GOM Player)
Opera 9.62 JAVA JRE / Javad0 / Javado / Java Calendar / javaold/JavaSr0
JAVA GSB Sun Java JRE AWT SetDiff ICM Buffer Overflow
Yes
Yes
PDF Exploit -collab, collectEmaillnfo
iexml
PMA phpmyadmin
Yes
Yes
Yes Yes
BrightStor ARCserve Backup R11.5
IE7 MEMCOR in IE7 MS09-002
Yes
Yes
Yes Yes
RealPlayer ActiveX Control Console Property Memory Corruption
util.printf
Yes
Yes
Buffer overflow in the YMP Datagrid ActiveX control (datagrid.dll) in Yahoo! JukeBox
m_Cor_n / MS Office Snapshot/IE snapshot or activexbundle
Yes
Yes Yes
Yes
AOL Radio AmpX (AOLMediaPlaybackControl) ActiveX control vulnerability IE6/IE7 DSHOW
Yes
Yes ?
CA BrightStor ARCserve Backup Multiple VulnerabiIities
AOL
Yes Yes Yes
Yes
DirectX - DirectTransform FlashPix ActiveX (IE)
CVE-2010-3962
Java Signed Applet CVE-2011-0558 CVE-2011-0559
Yes
Yahoo! Widgets YDP (IE)
collab, collectEmaillnfo
TELNET - for OPERA 9.0 - 9.25 or OPERA
CVE-2010-3552 CVE-2010-3653 CVE-2010-3654
Yes
Yes
CVE-2009-3269
CVE-2010-2884
Yes
Yahoo! Messenger Webcam (IE) DirectX
Yes Liberty Liberty EL Exploit JustExploit Zopack iPack Icepack Mpack Webattack 2.1.0* 1.0.7 Fiiesta 3.0RC
Yes
CVE-2009-2477
CVE-2010-1818 CVE-2010-1885 CVE-2010-2883
Yes
Yes
Flash 10 Integer overflow in the AVM2 abcFile parser in Adobe Flash Player Mozilla FF 3.5 Exploit / font tags | FF escape retval Firefox - Font tags | Firefox 3.5 escape() Return Value Memory Corruption
CVE-2010-1240 CVE-2010-1297 CVE-2010-1423
Yes
Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow
Multiple cross-site scripting (XSS) vulnerabilities in the export page
CVE-2010-0886
Yes
Vector Markup Language Vulnerability (IE)
CRLF injection vulnerability
CVE-2010-0842
Yes
Apple QuickTime RTSP URI (lE)
PMA phpmyadmin
CVE-2010-0840
Yes
NCTsoft NCTAudioFile2 ActiveX Control Remote Buffer Overflow Vulnerability
PMA phpmyadmin
CVE-2010-0805
Yes
Winzip FileView ActiveX (IE)
CVE-2009-1150 CVE-2009-1151 CVE-2009-1538 CVE-2009-1671
CVE-2010-0483 CVE-2010-0806
Yes
AOL SuperBuddy ActiveX Control LinkSBlcons() Vulnerability
CVE-2009-1149
CVE-2010-0249 CVE-2010-0094
Yes
America Online ICQ ActiveX Control Arbitrary File Download and Execute
Directory traversal vuln in bs_disp_as_mime_type.php
CVE-2009-4324 CVE-2010-0188
Yes
Microsoft XML Core Services Vulnerability
MSO9-043 - lE OWC Spreadsheet ActiveX control Memory Corruption
CVE-2009-3958
Yes
MSO6-055 - Windows Vector Markup Language Vulnerability
PMA phpmyadmin
CVE-2009-3869
Yes
MS07-009- lE6/Microsoft Data Access Components (MDAC) Remote Code Execution
spreadsheet
CVE-2009-3867
Yes
Yes
CVE-2009-1148
CVE-2009-1862 CVE-2009-1869
Yes
DirectAnimation ActiveX Controls Memory Corruption Vulnerability
CVE-2008-1472
CVE-2009-0927 CVE-2009-1136
Yes
Yes
MS06-013 - CreateTextRange Microsoft Management Console (MMC) Redirect Cross-Site Scripting (XSS) vulnerability (IE)
CVE-2008-1309
CVE-2009-0075/0076 CVE-2009-0355 CVE-2009-0836
Yes
IE COM CreateObject Internet Explorer COM CreateObject Code Execution FF EMBED / MS06006 MS06-006 - Windows Media Player plug-in vulverabiIity for Firefox & Opera
Windows ANI LoadAniIcon
Unique Impassioned Pack Framework Salo Sploit 1.0 2.1
Yes Yes
Yes
MS06-014 for lE6/Microsoft Data Access Components (MDAC) Remote Code Execution
WMI Object Broker
CVE-2008-5353
Yes
IE 5.01, 5.5, and 6 DHTML Method Heap Memory Corruption Vulnerability
IE6 MDAC America Online ICQ ActiveX
Open "Dloader" SEO Zombie mushroom Bleeding Bleeding CRIMEPACK CRIMEPACK CRIMEPACK CRIMEPACK TTornado Bomba Papka Source Robopak ? Katrin Sploit Infection Lupit /unknown Life 3.0 Life 2.0 3.1.3 3.0 2.2.8 2.2.1 Iframer (Incomplete) /MetaPack Uknownname pack kit
Yes Yes Yes
Yes?
COM Object Instantation Memory Corruption (Msdssdll)
mdac
Best Pack
Yes
MHTML URL Processing Vulnerability FF CompareTo
Sava / Pay0C
Yes
CVE-2006-4704 CVE-2006-4777 CVE-2006-4868 CVE-2006-5559
CVE-2008-2463 CVE-2008-2992 CVE-2008-3008 CVE-2008-4844 CVE-2008-5178
Zero Merry Hierarchy (perhaps Fragus Fragus Christmas Exploit Open LinuQ Black 1 PEK v2.3 Pack Source mod kit mod)
AOL Instant Messenger goaway Overflow
WebViewFolderlcon (IE) Cross-zone scripting vulnerability in the WMI Object Broker (WMIScriptUtils. WMIObjectBroker2)
CVE-2007-5779 CVE-2007-6250 CVE-2008-0015 CVE-2008-0624
Siberia
MSOS-OO1 HTML vulnerabilities AOL Instant Messenger
Firefox -js navigator Object Code
CVE-2007-5755
Siberia Private
Yes Yes Yes
Firefox Jno / JNO
CVE-2007-2222 CVE-2007-0243 CVE-2007-3147/3148 CVE-2007-4034 CVE-2007-4336 CVE-2007-5327 CVE-2007-5659/20080655
Techno XPack
Malformed Windows Media Encoder Request
CVE-2006-3677 CVE-2006-3730
CVE-2007-0038 CVE-2007-0071
BlackholeBlackholeBlackholeBlackholeBlackholeSakura Phoenix Eleonore Phoenix Phoenix Phoenix Phoenix Phoenix Phoenix Phoenix Exploit Exploit Exploit Exploit Exploit Exploit EleonoreEleonoreEleonoreEleonore Eleonore Eleonore "Yang 2.8 1.4.4 2.7 2.5 2.4 2.3 2.2 2.1 2.0 kit kit kit kit kit Pack 1.8.91 1.6.5 1.6.4 1.6.3a 1.4.1 1.3.2 Pack" mini Moded 1.2.3 1.2.1 1.2.0 1.1.0 1.0.0 1.0
M503-O11 - ByteCode Verifier component flaw in Microsoft VM
CVE-2006-3643
CVE-2006-5650 CVE-2006-5745 CVE-2006-5820 CVE-2006-6884 CVE-2007-0015 CVE-2007-0018 CVE-2007-0024
Dragon Nuclear Incognito Phoenix Zhi Zhu Nuclear Incognito pack v.2 v.2 3.1
Dragon
ZhuZhu
8
Feb-11
14
Mar-12
$900
nuclear Incognito Phoenix nuclear Incognito 2 2 3.1
7
12
15 15/16 15/16 07-y, October 2010 $2,200
14
10 before07-y 2010
14 10
8+
10
9
10
Dec'11 Dec'11 Sep'11 apr'11 Aug'10 Jan'12 1-2K 1500 /mo $1500/year rent
4
14
11
9
10 15/16
May'11?40585 40585
6
40299
12 4 8 Dec162009 Jan'12 Jan'12
6 10
10
Jan'12
old
Jan'12
14
2011
10
62
07-09 Feb'11?
16
4 25+/-
aug-11 07-'11 07-'11
8
8
Jun11
12
9
8
12
10
MayJan11 May-11 Mar201140513 2011
8
15 14 16 16 07y, May, Apr, Mar, 2010 2010 2010 2010
7
?
10
40360
7
11
May- May10 10
12
10
7
7
Sep09 sep'0907--09
6
Feb09
Sep09
4
4
12
9
6
7
$150 /$500- 250/800$ rent wk/monthwk/mo $25/day $1,000
$2,000 $2,000
BlackholeBlackholeBlackholeBlackholeBlackhole Phoenix Sakura Eleonore Phoenix Phoenix Phoenix Phoenix Phoenix Phoenix Phoenix Exploit Exploit Exploit Exploit Exploit EleonoreEleonoreEleonoreEleonore Eleonore Eleonore "Yang 2.8 Exploit 1.4.4 2.7 2.5 2.4 2.3 2.2 2.1 2.0 kit kit kit kit kit 1.8.91 1.6.5 1.6.3a 1.6.3a 1.4.1 1.3.2 Pack" mini Kit Moded 1.2.3 1.2.1 1.2.0 1.1.0 1.0.0
12
Techno XPack
Siberia Private
Siberia
Hierarchy Fragus Fragus Exploit Black 1 Pack
Zero
Merry Christmas LinuQ PEK v2.3 mod Need to confirm list of CVE here
Sava / Pay0C
Best Pack
Bomba papka
Open Dloader SEO Zombie Source mushroom Bleeding Bleeding CRIMEPACK CRIMEPACK CRIMEPACK CRIMEPACK TTornado Robopak or ? Katrin Sploit Infection Lupit /Metasploit /unknown Life 3.0 Life 2.0 3.1.3 3.0 2.2.8 2.2.1 Iframer (Incomplete) uknownname pack kit Pack
Unique Impassioned Pack Framework Salo Sploit 1.0 2.1
Yes Liberty LIBERTY EL Exploit JUSTEXPLOIT ZOPACKiPACK ICEPACKMPACK WEBATTACKER 2.1.0* 1.0.7 FIESTA 3.0RC