Home / malwarePDF  

Exploit:JS/Neclu.C


First posted on 14 May 2019.
Source: Microsoft

Aliases :

There are no other names known for Exploit:JS/Neclu.C.

Explanation :

This threat is a component of the Nuclear exploit kit. It is malicious JavaScript code embedded in an HTML page.

Installation

The threat checks to see if your PC is running a vulnerable version of Java or Adobe Reader.

We have seen it try to use the following vulnerabilities:

CVE-2010-0188 (Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1) CVE-2012-1723 (Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier) CVE-2013-1493 (Oracle Java SE 7 update 15 and earlier, 6 update 41 and earlier, and 5.0 update 40 and earlier) CVE-2013-2423 (Java SE 7 update 17 and earlier, and OpenJDK 7)

We have seen the threat hosted on pages at the following URLs:

http://mqs3sbee.polarquarterback.pw/_3-c89dff037-ee-19See1C0-f/202/86293d224dad755bb9bd0f13d34119f0.html http://exk8zn.wintercoach.pw/_a0ac04_8ac_a4-1Ncc8-c/187/33b2e12e14fbd7a7eaf380ef1437bc5d.html http://j46ix0.slipperyjavelin.pw/-4LaMa4096c3c_f32Rc_2-0_0Z/145/3438ee91374eac5ad5146f1ca848e85b.html

The landing page might look like the following:

 

Payload

Downloads malware

If your PC has vulnerable software installed this threat can download other malware, including:

Win32/Zbot Win32/Gamarue Win32/Tofsee Win32/Dofoil Win32/Neurevt Win32/Expiro Win32/Loktrom

Analysis by Shawn Wang

Last update 14 May 2019

 

TOP