Fiesta Exploit Kit Delivers Double Payload

Status
Not open for further replies.

Petrovic

Level 64
Thread author
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355
In an attempt to evade detection, threat actors have modified the way Fiesta Exploit Kit (EK) delivers the payload to the target computer by sending two malicious files.

This sort of technique is not new and could be used to package different malware in order to increase the chances of a computer to get infected, as the security tool protecting the system may not detect both of them.

Security researcher Jerome Segura of Malwarebytes has analyzed this new behavior in Fiesta EK and found that the two malicious files are detected by the engines of many antivirus products from the VirusTotal service.

However, in some cases, only one of them is properly identified as malicious, which would put at risk the user relying on such a product.

A single file is downloaded on the computer, and when extracted, two executable files become available. As per Malwarebytes detection, one of them is a spyware and the other is a Trojan.

In his analysis, Segura noticed that the landing page for Fiesta EK contained various exploits, as well as a single malware file, with Java as the parent process. However, further investigation showed that two payloads were being dropped on the systems.
 
  • Like
Reactions: Malware1
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top