Malicious MIDI files lead to rootkit malware

A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets’ computer, warns Trend Micro.

The victims are lured to a malicious web page (http://images.{BLOCKED}, which hosts a specially crafted MIDI file and JavaScript.

The page’s HTML file calls upon the MIDI file to trigger the exploit, and the JavaScript decodes shellcode that is already embedded in the HTML file. Upon execution, the shellcode downloads an encrypted binary from another site.

“This binary is then decrypted and executed as a malware detected as TROJ_DLOAD.QYUA,” says Trend Micro’s engineer. “We’re still conducting further analysis on TROJ_DLOAD.QYUA, but so far we’ve been seeing some serious payload, including rootkit capabilities.”

All this happens without the victims being none the wiser – they simply see (and hear?) the MIDI file being played as they expect it to.

To protect themselves from such attacks, users of Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 are advised to to patch their systems as soon as possible.