Follow:

 

Exploit:JS/Axpergle.E


Microsoft security software detects and removes this threat.

It uses vulnerabilities in recent versions of Internet ExplorerMicrosoft Silverlight, Adobe Flash Player, and Java to install malware on your PC. We have seen it try to install Trojan:Win32/Reveton.

You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.

Find out ways that malware can get on your PC.



What to do now

The following free Microsoft software detects and removes this threat:

Even if we've already detected and removed this particular threat, running a full scan might find other malware that is hiding on your PC.

You can also visit the Microsoft virus and malware community for more help.

Update Internet Explorer, Java, Adobe Flash, and Microsoft Silverlight

Make sure you install all available updates:

You should remove older versions of Java, as keeping old and unsupported versions of Java on your PC is a serious security risk:

If you continue to get alerted about this threat, deleting your temporary Java files can help:

Threat behavior

Installation

The threat determines what browser, operating system and the version of various applications you are using.

It checks if you have vulnerable versions of Internet Explorer, Microsoft Silverlight, Adobe Flash Player, or Java.

Payload

Exploits vulnerabilities in Internet Explorer and Microsoft Silverlight

If you're using Internet Explorer, the threat tries to exploit the vulnerability referred to as CVE-2013-2551.

The threat also checks if the Microsoft Silverlight plugin is installed and enabled. If it is, it tries to exploit the vulnerability referred to as CVE-2013-0074, which we detect as Exploit:MSIL/CVE-2013-0074.

Exploits vulnerabilities in Adobe Flash Player

The threat checks for vulnerabilities in Adobe Flash Player and tries to exploit the vulnerabilities referred to as CVE-2013-0634 (we detect this as Exploit:SWF/CVE-2013-0634) and CVE-2013-5329.

Exploits vulnerabilities in the Java Runtime Environment

The threat checks for vulnerabilities in Java. We have observed it trying to exploit the vulnerability CVE-2013-2460, which we detect as Exploit:Java/CVE-2013-2460.

Downloads malware

If the threat successfully exploits a vulnerability, it tries to download malware onto your PC. We have observed this threat trying to download files from the following URLs:

  • 9p0knmgx8e.gijacquvoe.com/<removed>/
  • pointrail.rehobothkitchens.com/<removed>/
  • ygolotno.rehobothkitchens.com/<removed>/

We have seen it try to download Ransom:Win32/Reveton.

Additional information

This threat is part of the exploit kit called "Angler". See our page on exploits for more information.

Analysis by Stefan Sellmer


Symptoms

Alerts from your security software may be the only symptom.


Prevention


Alert level: Severe
First detected by definition: 1.167.1445.0
Latest detected by definition: 1.169.2417.0 and higher
First detected on: Mar 08, 2014
This entry was first published on: Mar 26, 2014
This entry was updated on: Jun 16, 2014

This threat is also detected as:
  • Angler exploit kit (other)