47 lines
1.5 KiB
Text
47 lines
1.5 KiB
Text
|
|
||
|
rule MAL_ELF_ReverseShell_SSLShell_Jun23_1 {
|
||
|
meta:
|
||
|
description = "Detects reverse shell named SSLShell used in Barracuda ESG exploitation (CVE-2023-2868)"
|
||
|
author = "Florian Roth"
|
||
|
reference = "https://www.barracuda.com/company/legal/esg-vulnerability"
|
||
|
date = "2023-06-07"
|
||
|
score = 75
|
||
|
hash1 = "8849a3273e0362c45b4928375d196714224ec22cb1d2df5d029bf57349860347"
|
||
|
id = "91b34eb7-61d2-592e-a444-249da43994ca"
|
||
|
strings:
|
||
|
$sc1 = { 00 2D 63 00 2F 62 69 6E 2F 73 68 00 }
|
||
|
$s1 = "SSLShell"
|
||
|
condition:
|
||
|
uint32be(0) == 0x7f454c46
|
||
|
and uint16(0x10) == 0x0002
|
||
|
and filesize < 5MB
|
||
|
and all of them
|
||
|
}
|
||
|
|
||
|
rule MAL_ELF_SALTWATER_Jun23_1 {
|
||
|
meta:
|
||
|
description = "Detects SALTWATER malware used in Barracuda ESG exploitations (CVE-2023-2868)"
|
||
|
author = "Florian Roth"
|
||
|
reference = "https://www.barracuda.com/company/legal/esg-vulnerability"
|
||
|
date = "2023-06-07"
|
||
|
score = 80
|
||
|
hash1 = "601f44cc102ae5a113c0b5fe5d18350db8a24d780c0ff289880cc45de28e2b80"
|
||
|
id = "10a038f6-6096-5d3a-aaf5-db441685102b"
|
||
|
strings:
|
||
|
$x1 = "libbindshell.so"
|
||
|
|
||
|
$s1 = "ShellChannel"
|
||
|
$s2 = "MyWriteAll"
|
||
|
$s3 = "CheckRemoteIp"
|
||
|
$s4 = "run_cmd"
|
||
|
$s5 = "DownloadByProxyChannel"
|
||
|
$s6 = "[-] error: popen failed"
|
||
|
$s7 = "/home/product/code/config/ssl_engine_cert.pem"
|
||
|
condition:
|
||
|
uint16(0) == 0x457f and
|
||
|
filesize < 6000KB and (
|
||
|
( 1 of ($x*) and 2 of them )
|
||
|
or 3 of them
|
||
|
) or all of them
|
||
|
}
|