GLASSES
Description
(Citizen Lab) The dropped executable connects to a website and downloads a single HTML page. The site appears to be part of a legitimate website for an eyeglasses company, suggesting that it has been compromised.
The accessed page contains an anchor with an encoded command in it. The malware looks for the string in the anchor tag with the target NewRef, and then decodes it to a command. The link itself is empty, so that there is nothing to click on and it is invisible on the page. Another page on the same site, aboutus.htm, contains a different command although the URL is not apparently used by this binary.
Looking through the malware code, it is evident that this is a simple downloader with only two commands.
Names
Name |
---|
GLASSES |
Wordpress Bruteforcer |
Category
Malware
Type
- Downloader
Information
Malpedia
Other Information
Uuid
36aef054-c9d1-43e1-bdcd-973f18961dda
Last Card Change
2022-12-28