Home / Companies / Crowdstrike / Blog / Post Details
Content Deep Dive

BadRabbit MS17-010 Exploitation Part One: Leak and Control

Blog post from Crowdstrike

Post Details
Company
Date Published
Author
BadRabbit
Word Count
5,393
Language
English
Hacker News Points
-
Summary

In a detailed technical analysis, CrowdStrike examines the BadRabbit ransomware, which utilizes specific vulnerabilities in the MS17-010 security bulletin to spread through networks. Initially masquerading as an Adobe Flash update, BadRabbit requires user interaction to execute and propagate. It exploits vulnerabilities like race conditions and out-of-bounds (OOB) writes within the Server Message Block (SMB) protocol to leak kernel memory and escalate privileges. The analysis outlines how BadRabbit builds SMB packets to exploit these vulnerabilities, manually constructing them to achieve its malicious objectives. It further highlights the use of leaked transaction data to manipulate memory addresses and gain control over network resources, employing techniques similar to those used in other notable cyberattacks like NotPetya and WannaCry. The document also references external resources and analyses by security researchers to provide a comprehensive understanding of BadRabbit's exploitation mechanisms.