Sneed-Reactivity/yara-Neo23x0/mal_lnx_barracuda_cve_2023_2868.yar

47 lines
1.5 KiB
Text
Raw Permalink Normal View History

rule MAL_ELF_ReverseShell_SSLShell_Jun23_1 {
meta:
description = "Detects reverse shell named SSLShell used in Barracuda ESG exploitation (CVE-2023-2868)"
author = "Florian Roth"
reference = "https://www.barracuda.com/company/legal/esg-vulnerability"
date = "2023-06-07"
score = 75
hash1 = "8849a3273e0362c45b4928375d196714224ec22cb1d2df5d029bf57349860347"
id = "91b34eb7-61d2-592e-a444-249da43994ca"
strings:
$sc1 = { 00 2D 63 00 2F 62 69 6E 2F 73 68 00 }
$s1 = "SSLShell"
condition:
uint32be(0) == 0x7f454c46
and uint16(0x10) == 0x0002
and filesize < 5MB
and all of them
}
rule MAL_ELF_SALTWATER_Jun23_1 {
meta:
description = "Detects SALTWATER malware used in Barracuda ESG exploitations (CVE-2023-2868)"
author = "Florian Roth"
reference = "https://www.barracuda.com/company/legal/esg-vulnerability"
date = "2023-06-07"
score = 80
hash1 = "601f44cc102ae5a113c0b5fe5d18350db8a24d780c0ff289880cc45de28e2b80"
id = "10a038f6-6096-5d3a-aaf5-db441685102b"
strings:
$x1 = "libbindshell.so"
$s1 = "ShellChannel"
$s2 = "MyWriteAll"
$s3 = "CheckRemoteIp"
$s4 = "run_cmd"
$s5 = "DownloadByProxyChannel"
$s6 = "[-] error: popen failed"
$s7 = "/home/product/code/config/ssl_engine_cert.pem"
condition:
uint16(0) == 0x457f and
filesize < 6000KB and (
( 1 of ($x*) and 2 of them )
or 3 of them
) or all of them
}