Update yara/volt_typhoon_cisa.md
This commit is contained in:
@ -1,6 +1,7 @@
|
||||
|
||||
```
|
||||
rule ShellJSP {
|
||||
meta:
|
||||
reference="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a"
|
||||
strings:
|
||||
$s1 = "decrypt(fpath)"
|
||||
$s2 = "decrypt(fcontext)"
|
||||
@ -15,6 +16,8 @@ filesize < 50KB and 4 of them
|
||||
|
||||
```
|
||||
rule EncryptJSP {
|
||||
meta:
|
||||
reference="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a"
|
||||
strings:
|
||||
$s1 = "AEScrypt"
|
||||
$s2 = "AES/CBC/PKCS5Padding"
|
||||
@ -32,6 +35,7 @@ filesize < 50KB and 6 of them
|
||||
```
|
||||
rule CustomFRPClient {
|
||||
meta:
|
||||
reference="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a"
|
||||
description=”Identify instances of the actor's custom FRP tool based
|
||||
on unique strings chosen by the actor and included in the tool”
|
||||
strings:
|
||||
@ -49,6 +53,7 @@ all of them
|
||||
```
|
||||
rule HACKTOOL_FRPClient {
|
||||
meta:
|
||||
reference="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a"
|
||||
description=”Identify instances of FRP tool (Note: This tool is
|
||||
known to be used by multiple actors, so hits would not necessarily imply
|
||||
activity by the specific actor described in this report)”
|
||||
@ -62,3 +67,77 @@ condition:
|
||||
3 of them
|
||||
}
|
||||
```
|
||||
|
||||
```
|
||||
rule CrowdStrike_VANGUARD_PANDA_timewarp_webshell : webshell vanguard_panda
|
||||
{
|
||||
meta:
|
||||
copyright = "(c) 2023 CrowdStrike Inc."
|
||||
description = "Timewarp Java webshell in malicious Tomcat module"
|
||||
version = "202306131008"
|
||||
last_modified = "2023-06-13"
|
||||
actor = "VANGUARD PANDA"
|
||||
strings:
|
||||
$ = "setKey"
|
||||
$ = "ProcessBuilder"
|
||||
$ = "AES/ECB/PKCS5Padding"
|
||||
$ = "tmp.log"
|
||||
$ = "byteKey"
|
||||
$ = "method0"
|
||||
$ = "failed to read output from process"
|
||||
condition:
|
||||
filesize<50KB and 4 of them
|
||||
}
|
||||
```
|
||||
|
||||
```
|
||||
rule CrowdStrike_VANGUARD_PANDA_timewarp_webshell_jar : java vanguard_panda
|
||||
{
|
||||
meta:
|
||||
copyright = "(c) 2023 CrowdStrike Inc."
|
||||
description = "JAR file containing Timewarp webshell"
|
||||
version = "202306131011"
|
||||
last_modified = "2023-06-13"
|
||||
actor = "VANGUARD PANDA"
|
||||
reference = "https://www.crowdstrike.com/en-us/blog/falcon-complete-thwarts-vanguard-panda-tradecraft/"
|
||||
strings:
|
||||
$WsSci = "/WsSci.class"
|
||||
$abc1 = "/A.class"
|
||||
$abc2 = "/B.class"
|
||||
$abc3 = "/C.class"
|
||||
$timewarp1 = "/Timewarp.class"
|
||||
$timewarp2 = "/Timewarp2.class"
|
||||
$timewarp3 = "/Timewarp3.class"
|
||||
condition:
|
||||
uint16(0)==0x4b50 and filesize<1MB and $WsSci and (all of ($abc*) or all of ($timewarp*))
|
||||
}
|
||||
```
|
||||
|
||||
```
|
||||
rule CrowdStrike_VANGUARD_PANDA_webshell_installer : java vanguard_panda
|
||||
{
|
||||
meta:
|
||||
copyright = "(c) 2023 CrowdStrike Inc."
|
||||
description = "ClassLoader - Java webshell install and execute script"
|
||||
version = "202306131012"
|
||||
last_modified = "2023-06-13"
|
||||
actor = "VANGUARD PANDA"
|
||||
reference = "https://www.crowdstrike.com/en-us/blog/falcon-complete-thwarts-vanguard-panda-tradecraft/"
|
||||
strings:
|
||||
$ = ""
|
||||
$ = "customEndpoint1"
|
||||
$ = "move true
|
||||
"
|
||||
$ = "inject true
|
||||
"
|
||||
$ = "ListName_jsp"
|
||||
$ = "photohelp_jsp"
|
||||
$ = "photoparse_jsp"
|
||||
$ = "Timewarp.class"
|
||||
$ = "WsSci.class"
|
||||
$ = "/A.class"
|
||||
$ = "srcZipfs.getPath"
|
||||
condition:
|
||||
filesize<50KB and 4 of them
|
||||
}
|
||||
```
|
||||
|
Reference in New Issue
Block a user