#### Secu- # RIG Exploit Kit delivers WastedLoader malware www.bitdefender.com ----- ##### RIG Exploit Kit.................................................................................................................... 3 Distribution.............................................................................................................................. 3 Exploitation chain.................................................................................................................... 4 Hosts........................................................................................................................................ 4 Landing page........................................................................................................................... 4 ##### Exploits.............................................................................................................................. 6 CVE-2019-0752........................................................................................................................ 6 Post-exploitation command...................................................................................................7 CVE-2018-8174........................................................................................................................ 9 Post-exploitation shellcode....................................................................................................11 ##### WastedLoader................................................................................................................... 13 WastedLoader first stage........................................................................................................14 WastedLoader second stage.................................................................................................. 16 WastedLoader third stage.......................................................................................................17 WastedLoader fourth stage....................................................................................................24 ##### References........................................................................................................................ 25 Indicators of compromise................................................................................................ 26 **Authors:** **Mihai Neagu – Senior Security Researcher** **George Mihali – Security Researcher** **Aron Radu – Security Researcher** **Ștefan Trifescu – Security Researcher** ----- RIG Exploit Kit delivers WastedLoader malware Most of the alerts from this campaign were in Europe and the Americas: ----- RIG Exploit Kit delivers WastedLoader malware ### Exploitation chain The exploitation chain starts with a malicious ad delivered from a legitimate website. The malicious ad redirects to the landing page of “RIG EK”. That page then serves two exploits and, if one is successful, it executes the malware: ### Hosts The HTTP traffic before the exploitation looks like this (notice the 302 redirections): We have seen the following hosts redirecting to RIG EK: - traffic.allindelivery.net - myallexit.xyz - clickadusweep.vip - enter.testclicktds.xyz - zeroexit.xyz - zero.testtrack.xyz ### Landing page For the above example, the landing page is at 45.138.24.35, where the malicious host serves two JavaScript blocks, obfuscated in similar ways: function wrappers, random variable names, comments insertion. **** **** **** ----- RIG Exploit Kit delivers WastedLoader malware **