Follow:

 

Exploit:Win32/Pdfjsc.ADY


Exploit:Win32/Pdfjsc.ADY is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files, including malware from the following families:

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection

This malware exploits known vulnerabilities.

You should always install the latest updates available from Adobe to prevent reinfection from this threat, and possible infection from other threats.

Download updates for Adobe products from the following link:



What to do now

To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:

Update vulnerable PDF applications

This threat exploits known vulnerabilities in Adobe Acrobat and Adobe Reader. After removing this threat, make sure that you install the updates available from the vendor. You can read more about these vulnerabilities in PDF documents, as well as where to download the software update, from the following links:

Threat behavior

Exploit:Win32/Pdfjsc.ADY is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files, including malware from the following families:

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1

Installation

Exploit:Win32/Pdfjsc.ADY may be encountered when visiting a compromised webpage with a vulnerable computer, and has also been observed to be distributed via the "Blackhole exploit pack". The PDF file contains a malicious JavaScript that exploits a vulnerability, discussed in CVE-2010-0188.

Payload

Downloads arbitrary files

If Exploit:Win32/Pdfjsc.ADY successfully exploits a vulnerable computer, it attempts to download and install arbitrary files which may be detected as malware, including components from the following malware famlies:

In the wild, we have observed Exploit:Win32/Pdfjsc.ADY contacting the following sites for this purpose:

  • 02ret.mrslove.com
  • 0ilforumoggi.net
  • 106.187.94.91
  • 129.121.117.143
  • 129.121.140.245
  • 174.140.167.107
  • 188.165.95.15
  • 198.74.53.32
  • 199.175.48.188
  • 1stnewsliner.info
  • 4.kingcover.org
  • 4ftbb.4dq.com
  • 5.kotkiho.com
  • 5.kposs.com
  • 5.paispirata.com
  • 5.schwartz-investments.com
  • 5.turismohabitacaoacores.com
  • 50.116.10.16
  • 63.251.20.52
  • 65.75.146.203
  • 65.75.177.30
  • 66.150.164.66
  • 66.175.216.33
  • bhgty.asia
  • boxcr.onmypc.us
  • bwerd.asia
  • deoiu.asia
  • derjismutik.info
  • fidelocastroo.ru80
  • finitolaco.ru80
  • garynatyu.net
  • hapitaluniv.com
  • helpas.dnset.com
  • hotsecrete.net
  • ibaknews.biz
  • i-bak-news.info
  • i-bak-news.mobi
  • img.hardyalbum.com
  • jesrb.asia
  • jesuisdieu.riffmage.in
  • jwasd.asia
  • jyt6jghggh.biz.tm
  • ksenb.asia
  • kswer.asia
  • kwsan.asia
  • liouy.asia
  • loginauth-node2.redirectme.net
  • manekenppa.ru80
  • mzxui.asia
  • nbght.asia
  • nidssdo.net
  • nutyh.asia
  • one.mindin.info
  • oqawt.asia
  • ortyj.asia
  • puioa.asia
  • qretrr5.biz.tm
  • skodaturbovrx.org
  • skodavrxtunning.org
  • stat.gabwiz.in
  • stocvk.riffmaven.in
  • veolia-sluzby-voblastizivotneho-prostredia.tk
  • vmglezwychad.ddns.info
  • vztkgepmaydb.ddns.info
  • whediancipt.com

We have observed Exploit:Win32/Pdfjsc.ADY downloading the file to the %TEMP% folder with the file name "wpbt<random number>.dll"; for example:

%TEMP%\wpbt0.dll

Note: %TEMP% refers to a variable location that is determined by the malware by querying the operating system. The default location for the All Users Profile folder for Windows 2000, XP, and 2003 is "C:\DOCUME~1\<user>\LOCALS~1\Temp". For Windows Vista, 7, and W8, the default location is "C:\Users\<user name>\AppData\Local\Temp". 

Related encyclopedia entries

Analysis by Gilou Tenebro


Symptoms

There are no common symptoms associated with this threat. Alert notifications from installed antivirus software may be the only symptoms.


Prevention


Alert level: Severe
First detected by definition: 1.139.500.0
Latest detected by definition: 1.139.500.0 and higher
First detected on: Oct 24, 2012
This entry was first published on: Oct 24, 2012
This entry was updated on: Nov 15, 2012

This threat is also detected as:
  • CVE_2010_0188.A (Norman)
  • EXP/Pidief.dkm (Avira)
  • Exploit.JS.PDF.FD (BitDefender)
  • Exploit.JS.Pdfka.ggc (Kaspersky)
  • Exploit.PDF (Ikarus)
  • Exploit.PDF.3048 (Dr.Web)
  • Exploit-PDF!Blacole.o (McAfee)
  • JS/Exploit.Pdfka.PUS (ESET)
  • JS/Pdfka.HD (Command)
  • PDF/Dropper (AhnLab)
  • Troj/PDFJs-AAS (Sophos)