""ET CURRENT_EVENTS Webshell Landing Outbound - Possibly Iran-based""

SID: 2033416

Revision: 1

Class Type: trojan-activity

Metadata: attack_target Server, created_at 2021_07_25, deployment Perimeter, signature_severity Major, tag WebShell, updated_at 2021_07_25, mitre_tactic_id TA0003, mitre_tactic_name Persistence, mitre_technique_id T1505, mitre_technique_name Server_Software_Component

Reference:

Protocol: tcp

Source Network: [$HOME_NET,$HTTP_SERVERS]

Source Port: any

Destination Network: any

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "200"

  • Value: "filesystembrowser<|2f|title>"</p> </li> <li> <p>Value: "action=|22|?operation=upload|22|"</p> </li> <li> <p>Value: "<br>Auth|20|Key|3a|"</p> </li> </ul> <p><strong>Within:</strong> 100</p> <p><strong>PCRE:</strong> </p> <p><strong>Special Options:</strong></p> <ul> <li> <p>http_stat_code</p> </li> <li> <p>file_data</p> </li> <li> <p>fast_pattern</p> </li> </ul> <p><a href="https://github.com/magicsword-io/Magic-SigExplorer/tree/main/yaml/et/et_rule_2033416.yaml"><em>source</em></a></p> </div> </div><footer> <hr/> <div role="contentinfo"> <!-- Copyright etc --> </div> Built with <a href="https://www.mkdocs.org/">MkDocs</a> using a <a href="https://github.com/readthedocs/sphinx_rtd_theme">theme</a> provided by <a href="https://readthedocs.org">Read the Docs</a>. </footer> </div> </div> </section> </div> <div class="rst-versions" role="note" aria-label="Versions"> <span class="rst-current-version" data-toggle="rst-current-version"> </span> </div> <script src="../../../js/jquery-3.6.0.min.js"></script> <script>var base_url = "../../..";</script> <script src="../../../js/theme_extra.js"></script> <script src="../../../js/theme.js"></script> <script src="../../../search/main.js"></script> <script> jQuery(function () { SphinxRtdTheme.Navigation.enable(true); }); </script> </body> </html>