MALICIOUS URL (DOMAIN): EXPLOIT DotKaChef
DOMAIN:
http://gmc.yoyogames.com/
- https://www.virustotal.com/de/url/12e5110e14db3ce65d9aaf36b49b9384c72b562ce1064580ecb8e049d51768e5/analysis/1393259505/
- https://www.virustotal.com/de/file/1a95707e9ea74da8b9199ac18b76548e4890d278a541e51384cb1d24b2008e9f/analysis/1393259871/
http://gmc.yoyogames.com/index.php?showtopic=479246
- https://www.virustotal.com/de/url/93917974f72f15f40bb77746b50bbd3993b4ea2ed5987ed985044afc42293dfc/analysis/1393259414/
- https://www.virustotal.com/de/file/d8178b94ffba61ff7365005c105aadd795c7f2872c94fb4a0db0461ec4ddf7fd/analysis/
--->DOMAIN:
http://alnera.eu/
- https://www.virustotal.com/de/url/d56d95917506e3446ed65d011174cf24dee73b9812fac409112c5c7b785bb2d4/analysis/1393260526/
http://alnera.eu/B1D7AA56.js?cp=gmc.yoyogames.com
- https://www.virustotal.com/de/url/af2c5eddfbfc5a4873cd9e8f463992b4537e5b16410d01070cad5c665b51c8d3/analysis/1393249461/
- https://urlquery.net/report.php?id=9628606
- https://urlquery.net/report.php?id=9628608
- https://urlquery.net/report.php?id=9628612
- https://urlquery.net/report.php?id=9630211
- https://urlquery.net/report.php?id=9630215
Possible Redkit 1-4 char JNLP request
- https://urlquery.net/report.php?id=7843788
DotkaChef EK initial landing from Oct 02 2013 mass-site compromise EK campaign
- https://urlquery.net/report.php?id=6995999
FOR MORE ON THIS TREAT, SEE:
http://community.websense.com/blogs/securitylabs/archive/2014/02/03/dotkachef-exploit-kit-comeback.aspx
Weitere Informationen dieses Exploits finden Sie unter dem folgenden Link:
http://www.datev.de/portal/ShowPage.do?pid=dpi&nid=159813
Keine Kommentare:
Kommentar veröffentlichen