lazarusholic

Everyday is lazarus.dayβ

CVE-2018-4878: An Analysis of the Flash Player Hack

2018-02-08, Morphisec
https://blog.morphisec.com/cve-2018-4878-an-analysis-of-the-flash-player-hack
#CVE-2018-4878

Contents

Before diving into the analysis of CVE-2018-4878, a quick reminder that this is the continuation of our previous post, which provided background on CVE-2018-4878, including a video of how Morphisec prevents any attacks leveraging this Flash vulnerability. Morphisec prevents the attack at all phases and components in the attack chain – during the exploit, the shellcode, as well as the malware which is executed using wbscript.exe with additional in-memory command control code.
At the time of the previous post, the vulnerability was still a zero-day. Adobe released a new version that fixed the flaw yesterday. With that fix available, Morphisec is now free to release technical details of the attack.
FLASH wrapper Analysis
Although in this overview we focus mainly on the 32 bit exploitation flow, the original exploit was implemented to support both 32 and 64 bit browsers. The exploit included adaptation of offsets for shellcode to cope with the difference in …

IoC

533ac371b995230540509c809e6fbdc3d3d39d2c950783cfad5cb872243986fa
53fa83d02cc60765a75abd0921f5084c03e0b7521a61c4260176e68b6a402834