Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Source code of Phoenix Exploit Kit


diazromero

Recommended Posts

Source code of Phoenix Exploit Kit Version 2.3

This is the hidden content, please

 

 

PEK (Phoenix Exploit’s Kit) has become one of the

most used by those who flood the Internet every day

with different types of malicious code. The sale of this

version began in July 2010 at a cost of $2200.

The default exploits for this version are:

 

Adobe Reader newPlayer CVE-2009-4324

Adobe Reader LibTiff CVE-2010-0188

Adobe PDF SWF CVE-2010-1297

Adobe Reader/Foxit Reader PDF OPEN CVE-

2009-0836

Java HsbParser.getSoundBank (GSB) CVE-2009-

3867

Java Runtime Environment (JRE) CVE-2008-5353

Java SMB CVE-2010-0746

IE iepeers CVE-2010-0806

Windows Help Center (HCP) CVE-2010-1885

IE SnapShot Viewer ActiveX CVE-2008-2463

 

One of the most important changes in this release was

PDF libtiff support the use of bypass ASLR, DEP more

for PDF file reader Adobe Reader on your version 8.0-

9.3.0 for Windows Vista and Windows7.

 

Generally we have seen the spread executable binary

as a variant of the trojan generated with the private

constructor SpyEye: exe.exe (014678ec0f5e2b92d7f0

89a20ffe77fa).

 

Once executed, the malware establishes a

connection to the domain clandestine fordkaksosat.info

(193.105.207.45 – AS50793 ALFAHOSTNET) from

which you download and run malware automatically a

rogue type.

 

This malware is also promoted through a website

from which, using social engineering, simulates the sale

of an antivirus program through a file called PCDefend

erSilentSetup.msi (ecff63c1f983858dfd7fb926738cb47

8), which represents the so-called rogue PC Defender

Antivirus. The cost is typically USD 59.95.

PEK has been around since mid-2007.

 

 

 

This is the hidden content, please

This is the hidden content, please

Edited by diazromero
Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.