{"id":83861,"date":"2017-01-19T18:21:18","date_gmt":"2017-01-19T12:51:18","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=83861"},"modified":"2017-01-19T18:35:39","modified_gmt":"2017-01-19T13:05:39","slug":"ddos-attacks-spreading-godmode-exploit-cve-2014-6332","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/ddos-attacks-spreading-godmode-exploit-cve-2014-6332\/","title":{"rendered":"DDoS attacks spreading through \u2018GodMode\u2019 exploit &#8211; CVE-2014-6332"},"content":{"rendered":"<p>We have recently observed an increase in the exploitation of the famous \u2018GodMode\u2019 exploit of the vulnerability <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6332\">CVE-2014-6332<\/a>. The reliable proof of concept (POC) or exploit code for CVE-2016-6332 is readily available on the Internet. This makes it easy for attackers to integrate the exploit in various campaigns. They just have to flip the malware payload to start a new campaign. Most of the active Exploit Kits (EKs) such \u2018RIG\u2019 and \u2018Sundown\u2019 have integrated exploits for CVE-2014-6332. Apart from EKs, the exploit is also spreading through various compromised, malicious websites.<\/p>\n<p>In this blog post, we will take a look at the one such attack where exploitation of the \u2018GodMode\u2019 vulnerability CVE-2014-06332 was dropping a malware payload called DDoS <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=DDoS:Win32\/Nitol.A\">Nitol<\/a>.<\/p>\n<p><strong>Exploitation Cycle<\/strong><\/p>\n<p>The exploit was being dropped from domain \u20181128[.]me\u2019 and was resolving to IP 43.249.8[.]78. The exploit domain is registered in \u2018Panama\u2019 as per <a href=\"https:\/\/www.whois.com\/whois\/1128.me\">whois lookup<\/a>. The <a href=\"https:\/\/db-ip.com\/43.249.8.78\">Geo-location<\/a> of the IP lies in \u2018China\u2019. The domain names observed in the DDoS campaigns were short in length and had numerical values as part of the domain name.<\/p>\n<figure id=\"attachment_83862\" aria-describedby=\"caption-attachment-83862\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83862 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/lifecycle-1024x249.png\" alt=\"Fig 1. Exploitation Cycle\" width=\"1024\" height=\"249\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/lifecycle-1024x249.png 1024w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/lifecycle-300x73.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/lifecycle-768x187.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/lifecycle-789x192.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/lifecycle.png 1250w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-83862\" class=\"wp-caption-text\">Fig 1. Exploitation Cycle<\/figcaption><\/figure>\n<p><strong>Exploit Analysis<\/strong><\/p>\n<p>The exploit first does version checking of Windows OS and Internet Explorer to check the compatibility. The exploit code only gets loaded on 32 bit Windows OS and on Internet Explorer.<\/p>\n<figure id=\"attachment_83863\" aria-describedby=\"caption-attachment-83863\" style=\"width: 774px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83863 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/Version_check_1.png\" alt=\"Fig 2. Version Checking of Windows OS and Internet Explorer\" width=\"774\" height=\"283\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Version_check_1.png 774w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Version_check_1-300x110.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Version_check_1-768x281.png 768w\" sizes=\"(max-width: 774px) 100vw, 774px\" \/><figcaption id=\"caption-attachment-83863\" class=\"wp-caption-text\">Fig 2. Version Checking of Windows OS and Internet Explorer<\/figcaption><\/figure>\n<p>After version checking, the exploit code moves ahead and the function \u2018Over\u2019 is called. The type confusion vulnerability is triggered when resizing of array \u2018aa\u2019 is done. The detailed analysis of the vulnerability can be found <a href=\"https:\/\/global.ahnlab.com\/global\/upload\/download\/documents\/1506262920811527.pdf\">here<\/a>.<\/p>\n<figure id=\"attachment_83864\" aria-describedby=\"caption-attachment-83864\" style=\"width: 955px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83864 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/Vuln_trigger.png\" alt=\"Fig 3. Vulnerability (CVE-2014-06332) trigger code\" width=\"955\" height=\"835\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Vuln_trigger.png 955w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Vuln_trigger-300x262.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Vuln_trigger-768x671.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Vuln_trigger-789x690.png 789w\" sizes=\"(max-width: 955px) 100vw, 955px\" \/><figcaption id=\"caption-attachment-83864\" class=\"wp-caption-text\">Fig 3. Vulnerability (CVE-2014-06332) trigger code<\/figcaption><\/figure>\n<p><strong>Disabling \u2018safemode\u2019 Flag<\/strong><\/p>\n<p>By default, the usage of VBScript functionality in browsers is restricted. This restriction is a controlled by \u2018safemode\u2019 flag. The default value of \u2018safemode\u2019 flag is always \u20180xE\u2019. If the default value of \u2018safemode\u2019 flag is changed then using VBScript, malicious activity can be performed. Controlling of \u2018safemode\u2019 flag using VBScript in web browsers has been called \u2018GodMode\u2019. Thus, this exploit is famously known as \u2018GodMode\u2019 exploit.<\/p>\n<figure id=\"attachment_83865\" aria-describedby=\"caption-attachment-83865\" style=\"width: 770px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83865 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/safemode.png\" alt=\"Fig 4. \u2018setnotsafemode\u2019 function\" width=\"770\" height=\"398\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/safemode.png 770w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/safemode-300x155.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/safemode-768x397.png 768w\" sizes=\"(max-width: 770px) 100vw, 770px\" \/><figcaption id=\"caption-attachment-83865\" class=\"wp-caption-text\">Fig 4. \u2018setnotsafemode\u2019 function<\/figcaption><\/figure>\n<p>The exploit code shown in Fig 4 changes the \u2018safemode\u2019 flag value to \u20180\u2019 using \u2018setnotsafemode\u2019 function.<\/p>\n<figure id=\"attachment_83866\" aria-describedby=\"caption-attachment-83866\" style=\"width: 915px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83866 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/safemode_disable.png\" alt=\"Fig 5. \u2018safemode\u2019 flag value changed\" width=\"915\" height=\"102\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/safemode_disable.png 915w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/safemode_disable-300x33.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/safemode_disable-768x86.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/safemode_disable-789x88.png 789w\" sizes=\"(max-width: 915px) 100vw, 915px\" \/><figcaption id=\"caption-attachment-83866\" class=\"wp-caption-text\">Fig 5. \u2018safemode\u2019 flag value changed<\/figcaption><\/figure>\n<p>After \u2018safemode\u2019 flag is disabled, the \u2018runmumaa\u2019 function is called which downloads the malware from the URL \u2018hxxp:\/\/98.126.14[.]54\/api\/ax.exe\u2019 and executes it using \u2018wscript\u2019.<\/p>\n<figure id=\"attachment_83867\" aria-describedby=\"caption-attachment-83867\" style=\"width: 1280px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83867 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/run_payload.png\" alt=\"Fig 5. Payload and execution\" width=\"1280\" height=\"349\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/run_payload.png 1280w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/run_payload-300x82.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/run_payload-768x209.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/run_payload-1024x279.png 1024w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/run_payload-789x215.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/run_payload-304x84.png 304w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><figcaption id=\"caption-attachment-83867\" class=\"wp-caption-text\">Fig 6. Payload and execution<\/figcaption><\/figure>\n<p><strong>Payload Analysis<\/strong><\/p>\n<p>The payload \u2018ax.exe\u2019 is executed by the exploit code and performs the activities mentioned below.<\/p>\n<ul>\n<li>Connects to a remote Command and Control (CnC) server to report its installation &amp; infected system OS version, computer name, etc.<\/li>\n<li>Receives commands from CnC and executes them.<\/li>\n<li>Downloads and execute arbitrary files from a CnC\u00a0server.<\/li>\n<li>Copies itself to \u2018C:\\WINDOWS\\\u2019 and adds an autorun entry with a random service name in order to execute at system restart.\n<ul>\n<li>Dropped file name is \u2018C:\\WINDOWS\\jaxdaw.exe\u2019<\/li>\n<li>Service created with random name like \u2018Jklmno Qrstuvwx Abc\u2019<\/li>\n<\/ul>\n<\/li>\n<li>Once the autorun entries are added, the malware deletes itself with the command \u2018ShellExecuteExA \u2018\/c del %Sampl_dir%\\\\ax.exe &gt; nul\\0\u2019<\/li>\n<\/ul>\n<p>Important activities observed:<\/p>\n<ul>\n<li>The malware spreads on the network.<\/li>\n<li>The malware launches DDoS attacks on websites specified by the CnC server.<\/li>\n<\/ul>\n<p><strong>Network Spreading Activity<\/strong><\/p>\n<p>For spreading on shared drives on the victim\u2019s system, it uses a quick dictionary attack using all possible combinations from the usernames and passwords mentioned below.<\/p>\n<figure id=\"attachment_83868\" aria-describedby=\"caption-attachment-83868\" style=\"width: 651px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83868 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/usernames_passwords.png\" alt=\"Fig 6. Dictionary of usernames and passwords\" width=\"651\" height=\"150\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/usernames_passwords.png 651w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/usernames_passwords-300x69.png 300w\" sizes=\"(max-width: 651px) 100vw, 651px\" \/><figcaption id=\"caption-attachment-83868\" class=\"wp-caption-text\">Fig 7. Dictionary of usernames and passwords<\/figcaption><\/figure>\n<p>The malware tries to connect to each shared drive using API \u2018WNetAddConnection2A\u2019.<\/p>\n<figure id=\"attachment_83869\" aria-describedby=\"caption-attachment-83869\" style=\"width: 1055px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83869 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/WnetConnection_DictionaryAttack.jpg\" alt=\"Fig 7. Connection to shared drives\" width=\"1055\" height=\"151\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/WnetConnection_DictionaryAttack.jpg 1055w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/WnetConnection_DictionaryAttack-300x43.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/WnetConnection_DictionaryAttack-768x110.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/WnetConnection_DictionaryAttack-1024x147.jpg 1024w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/WnetConnection_DictionaryAttack-789x113.jpg 789w\" sizes=\"(max-width: 1055px) 100vw, 1055px\" \/><figcaption id=\"caption-attachment-83869\" class=\"wp-caption-text\">Fig 8. Connection to shared drives<\/figcaption><\/figure>\n<p>Once access to any shared drive is gained using the dictionary attack, the malware copies itself to that shared drive using API \u2018CopyFileA\u2019.<\/p>\n<figure id=\"attachment_83870\" aria-describedby=\"caption-attachment-83870\" style=\"width: 595px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83870 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/NetWoekSPreading_CpoyFileA.jpg\" alt=\"Fig 8. Copying to shared drives\" width=\"595\" height=\"87\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/NetWoekSPreading_CpoyFileA.jpg 595w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/NetWoekSPreading_CpoyFileA-300x44.jpg 300w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><figcaption id=\"caption-attachment-83870\" class=\"wp-caption-text\">Fig 9. Copying to shared drives<\/figcaption><\/figure>\n<p>Once copied, it executes the copied malware using command \u2018at\u2019 on a specified scheduled time such as \u201813:11\u2019 shown in Fig 10.<\/p>\n<figure id=\"attachment_83871\" aria-describedby=\"caption-attachment-83871\" style=\"width: 833px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83871 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/WinExec_at_Remote.jpg\" alt=\"Fig 9. Execution on shared drives\" width=\"833\" height=\"51\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/WinExec_at_Remote.jpg 833w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/WinExec_at_Remote-300x18.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/WinExec_at_Remote-768x47.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/WinExec_at_Remote-789x48.jpg 789w\" sizes=\"(max-width: 833px) 100vw, 833px\" \/><figcaption id=\"caption-attachment-83871\" class=\"wp-caption-text\">Fig 10. Execution on shared drives<\/figcaption><\/figure>\n<p><strong>DDoS Activity<\/strong><\/p>\n<p>The malware receives commands from the CnC\u00a0server in order to initiate DDoS attacks. The CnC\u00a0server sends commands of various combinations with the parameters mentioned below.<\/p>\n<p><em>DDoS command parameters:<br \/>\nCommand Code, Target webiste, Port Number, IE version, NT version, User-Agent, Referrer, etc.<\/em><\/p>\n<p>At the time of analysis, the CnC server was inactive, so we did not receive actual commands from the server. The unidentified CnC parameters in the commands listed below are mentioned with \u2018%s\u2019 or \u2018%d\u2019. The malware supports 22 commands which specify the type of DDoS attacks to be carried out on the target website. The CnC commands also access various types of resources such as text, image, etc., for the attack. They also use different user agents such as \u2018Baiduspider\u2019. Below are some of the DDoS commands.<\/p>\n<p><strong>DDoS Commands<\/strong><\/p>\n<figure id=\"attachment_83872\" aria-describedby=\"caption-attachment-83872\" style=\"width: 697px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83872 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/CnC-commands.png\" alt=\"Fig 10. DDoS commands\" width=\"697\" height=\"756\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/CnC-commands.png 697w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/CnC-commands-277x300.png 277w\" sizes=\"(max-width: 697px) 100vw, 697px\" \/><figcaption id=\"caption-attachment-83872\" class=\"wp-caption-text\">Fig 11. DDoS commands<\/figcaption><\/figure>\n<p>The following figure shows the loop for DDoS attacks carried out through \u2018send\u2019 API request.<\/p>\n<figure id=\"attachment_83873\" aria-describedby=\"caption-attachment-83873\" style=\"width: 937px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83873 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/Dddos.jpg\" alt=\"Fig 11. DDoS Attack Loop\" width=\"937\" height=\"518\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Dddos.jpg 937w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Dddos-300x166.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Dddos-768x425.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Dddos-789x436.jpg 789w\" sizes=\"(max-width: 937px) 100vw, 937px\" \/><figcaption id=\"caption-attachment-83873\" class=\"wp-caption-text\">Fig 12. DDoS Attack Loop<\/figcaption><\/figure>\n<p>Also, you can see many branches coming to the same code at the top, as shown in Fig 12. This is because commands are different but many of them use same \u2018send\u2019 API for the attack.<\/p>\n<p>The CnC server address is kept in an encrypted form in malware payload; a two-level encryption is used. The first level is base64 and second level is custom ADD + XOR encryption as shown in Fig 13.<\/p>\n<figure id=\"attachment_83874\" aria-describedby=\"caption-attachment-83874\" style=\"width: 465px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83874 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/DecryptionLoop.jpg\" alt=\"Fig 12. CnC URL encryption\/decryption\" width=\"465\" height=\"146\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/DecryptionLoop.jpg 465w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/DecryptionLoop-300x94.jpg 300w\" sizes=\"(max-width: 465px) 100vw, 465px\" \/><figcaption id=\"caption-attachment-83874\" class=\"wp-caption-text\">Fig 13. CnC URL encryption\/decryption<\/figcaption><\/figure>\n<p><strong>DDoS.Nitol Hits Trend<\/strong><\/p>\n<p>As observed in Quick Heal Labs, below is the trend of the DDoS Nitol over the last month.<\/p>\n<figure id=\"attachment_83877\" aria-describedby=\"caption-attachment-83877\" style=\"width: 1087px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83877 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/01\/Nitol-monthly_count.png\" alt=\"Fig 11. DDoS Nitol hits trend\" width=\"1087\" height=\"167\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Nitol-monthly_count.png 1087w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Nitol-monthly_count-300x46.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Nitol-monthly_count-768x118.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Nitol-monthly_count-1024x157.png 1024w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/01\/Nitol-monthly_count-789x121.png 789w\" sizes=\"(max-width: 1087px) 100vw, 1087px\" \/><figcaption id=\"caption-attachment-83877\" class=\"wp-caption-text\">Fig 14. DDoS Nitol hits trend<\/figcaption><\/figure>\n<p><strong>Indicator of Compromise<\/strong><\/p>\n<table style=\"height: 200px\" width=\"515\">\n<tbody>\n<tr>\n<td width=\"198\">Exploit Server IP<\/td>\n<td width=\"444\">43.249.8[.]78<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">Exploit URL<\/td>\n<td width=\"444\">1128[.]me<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">Payload MD5<\/td>\n<td width=\"444\">0B15E700EE99383BAD9915F0FB939D3D<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">Payload Filename<\/td>\n<td width=\"444\">ax.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">Paylaod CnC URLs<\/td>\n<td width=\"444\">hack.1128[.]me:520<br \/>\nip.yototoo[.]com<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Conclusion<\/strong><\/p>\n<p>By using reliable exploit codes available on the Internet for CVE-2014-6332, it\u2019s becoming easier for attackers to launch various types of mass infection campaigns. As we have seen in this case, a DDoS attack can be launched by dropping the DDoS malware Nitol. With the network spreading functionality inside, Nitol makes it for a deadlier attack as it can compromise mass machines present on the network. We strongly recommend users to update the Windows Operating Systems and use a multilayered security software such as <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security\">Quick Heal<\/a>.<strong>\u00a0<\/strong><\/p>\n<p><strong>ACKNOWLEDGMENT<\/strong><\/p>\n<p><u>Subject Matter Experts<\/u><\/p>\n<ul>\n<li>Pallavi Pangavhane<\/li>\n<li>Prakash Galande<\/li>\n<li>Pradeep Kulkarni<br \/>\n&#8211; Threat Research and Response Team<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We have recently observed an increase in the exploitation of the famous \u2018GodMode\u2019 exploit of the vulnerability CVE-2014-6332. The reliable proof of concept (POC) or exploit code for CVE-2016-6332 is readily available on the Internet. This makes it easy for attackers to integrate the exploit in various campaigns. They just have to flip the malware [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":82398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,5,36],"tags":[],"class_list":["post-83861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-security","category-security-patch"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83861"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=83861"}],"version-history":[{"count":10,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83861\/revisions"}],"predecessor-version":[{"id":83890,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83861\/revisions\/83890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/82398"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=83861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=83861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=83861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}