Analysis report for http://peninsula.co.nz/x.html

Sample Overview

URLhttp://peninsula.co.nz/x.html
MD5a237ffa8d4140ea856e10f2e3f1542b9
Analysis Started2010-08-06 07:18:43
Report Generated2010-08-06 07:19:09
Jsand version1.02.02

See the report for domain peninsula.co.nz.

Detection results

DetectorResult
Jsand 1.02.02malicious

Exploits

NameDescriptionReference
Adobe util.printf overflowStack-based buffer overflow in Adobe Acrobat and Reader via crafted format string argument in util.printfCVE-2008-2992
Adobe getIconStack-based buffer overflow in Adobe Reader and Acrobat via the getIcon method of a Collab objectCVE-2009-0927

Deobfuscation results

Evals

Writes

Network Activity

Requests

URLStatusContent Type
http://peninsula.co.nz/x.html200text/javascript
about:blank200text/html
http://yummyeyes.ru:8080/index.php?pid=10200text/html
http://yummyeyes.ru:8080/jquery.jxx?v=5.3.4200text/javascript
http://yummyeyes.ru:8080/Notes10.pdf200application/pdf
http://spruceteam.com200text/html
http://spruceteam.com/themes/card.js200text/html

Redirects

No redirects.

ActiveX controls

Shellcode and Malware

No shellcode was identified.

No additional malware was retrieved.