2019-08-01 - NEWLY-DISCOVERED LORD EXPLOIT KIT

NOTICE:

ASSOCIATED FILES:

NOTES:

 


Shown above:  Traffic from the 1st run filtered in Wireshark (no payload).

 


Shown above:  Traffic from the 2nd run filtered in Wireshark (njRAT payload).

 


Shown above:  Start of Lord EK landing page.

 


Shown above:  End of Lord EK landing page.

 


Shown above:  HTTP requests from Lord EK after the landing page (1 of 2).

 


Shown above:  HTTP requests from Lord EK after the landing page (2 of 2).

 


Shown above:  Lord EK sends Flash exploit.

 


Shown above:  Lord EK sends malware payload, an njRAT executable.

 


Shown above:  njRAT infection traffic (1 of 4).

 


Shown above:  njRAT infection traffic (2 of 4).

 


Shown above:  njRAT infection traffic (3 of 4).

 


Shown above:  njRAT infection traffic (4 of 4).

 

Click here to return to the main page.