New CHAINSHOT Malware Attack Carried Adobe Flash 0-day Exploit with Weaponized Microsoft Excel Documents


Newly discovered CHAINSHOT Malware attack using Adobe Flash 0-day vulnerability that carried by several Weaponized documents along with the encrypted malware payload.

Researchers successfully cracked the 512-bit RSA key and decrypted the payload also the attack contains the several steps that follow each and every steps input.

Attackers using the new toolkit that performed as downloader to drop the Adobe Flash exploit CVE-2018-5002.

A malicious Microsoft Excel document contains a tiny Shockwave Flash ActiveX object and the property called “Movie” contains a URL  to download the flash application.

Further analysis revealed that the Flash application is an obfuscated downloader which creates a random 512-bit RSA key pair in memory of the process.

In this case, the Private key remains in the memory and the public key will be sent to the attacker server to encrypt the AES key(used to encrypt the payload).

Later Encrypted payload send to the downloader and use the memory private key to decrypt the 128bit AES key and payload.

Since the attacker using 512-bit RSA key pair which is known to be insecure, researchers gain the private key using hardcoded exponent and public key.

Gain Encrypted Shellcode Payload

128-bit AES key has been decrypted using the private key that calculated by the small public tool to obtain the shellcode payload.


So once AES 128 bit key will be decrypted then the actual payload can be easily decrypted and the decrypted shellcode payload is additionally compressed with zlib.

Further analysis revealed that attacker using the exploit and the complexity of shellcode payload that contains own two PE payloads.

Finally, the researcher set the environment to analyze the different stages and the malware working functions.

According to the Palo Alto Researchers, After the exploit successfully gains RWE permissions, execution is passed to the shellcode payload. The shellcode loads an embedded DLL internally named FirstStageDropper.dll, which we call CHAINSHOT.

“FirstStageDropper.dll is responsible for injecting SecondStageDropper.dll into another process to execute it. While the shellcode payload only contains code to search for and bypass EMET, FirstStageDropper.dll also contains code for Kaspersky and Bitdefender.”

Final payload is responsible for fingerprinting the system, sending details about the user and the processes running on the machine.

Indicators of Compromise

Adobe Flash Downloader


Adobe Flash Exploit (CVE-2018-5002)


To read the original article:

Laisser un commentaire

Votre adresse de messagerie ne sera pas publiée. Les champs obligatoires sont indiqués avec *

Next Post

Hackers Launching GandCrab Ransomware via New Fallout Exploit Kit using Malvertising Campaign

Cybercriminals now using new Fallout Exploit Kit for launching GandCrab Ransomware via Malvertising Campaign that targets many victims around the world. This malvertising campaign mainly affected users in  Japan, Korea, the Middle East, Southern Europe, Asia Pacific region and other countries. Along with this Exploit kit, there are additional domains, regions, and […]