Home > Cyber News > Fallout EK Spreads GandCrab, Leverages CVE-2018-4878, CVE-2018-8174
CYBER NEWS

Fallout EK Spreads GandCrab, Leverages CVE-2018-4878, CVE-2018-8174

MIcrosoft Office CVE-2017-0199 Exploit

New security reports have landed indicating that the infamous GandCrab ransomware is currently being distributed by a new exploit kit known as Fallout. The Fallout EK is pushing the ransomware alongside downloader Trojans and potentially unwanted programs. The EK was unearthed by security researcher nao_sec at the end of August 2018.




Fallout Exploit Kit Malicious Operations

It appears that the Fallout EK is installed on compromised websites and is attempting to exploit vulnerabilities present in the potential victim’s system. So far, the EK is leveraging two known exploits – one for Adobe Flash Player (CVE-2018-4878) and one for the Windows VBScript engine (CVE-2018-8174).

CVE-2018-4878 Technical Details

As per MITRE’s advisory, the vulnerability is “a use-after-free vulnerability” which was discovered in Adobe Flash Player prior to version 28.0.0.161. The vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. CVE-2018-4878 was exploited in the wild in January and February 2018.

CVE-2018-8174 Technical Details

The vulnerability is of the remote code execution kind, existing in the way that the VBScript engine handles objects in memory, such as “Windows VBScript Engine Remote Code Execution Vulnerability.” The flaw affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

Upon its discovery, the EK was caught downloading and installing the so-caled SmokeLoader, a malware instance known for downloading more malware on the compromised host. At that particular moment CoalaBot was being downloaded alongside other undisclosed malware pieces.

According to the researcher, the exe file executed by shellcode is “Nullsoft Installer self-extracting archive””, which will then run the SmokeLoader and will download two additional exe files.

FireEye researchers were previously able to determine that the very same exploit kit has been deployed by cybercriminals to install the GandCrab ransomware on both Windows and macOS systems. The EK is also known for redirecting victims to pages promoting fake anti-virus programs and fake Adobe Flash players.

It should be noted that researchers say that if the Fallout EK fails to exploit the CVE-2018-8174 VBScript vulnerability, and if scripting is disabled on the targeted host, it will then try to exploit Adobe Flash Player vulnerability, CVE-2018-4878.

Upon successful exploit, the Windows OS in particular would download and install a Trojan which will then check for the following processes:

vmwareuser.exe
vmwareservice.exe
vboxservice.exe
vboxtray.exe
Sandboxiedcomlaunch.exe
procmon.exe
regmon.exe
filemon.exe
wireshark.exe
netmon.exe
vmtoolsd.exe

In case those processes are found, the Trojan would enter an infinite loop without performing further malicious activities, the researchers noted.

If those processes are not found, the Trojan will download and execute a DLL that installs the GandCrab ransomware, which will proceed in its typical manner of infection.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree