21 lines
792 B
Text
21 lines
792 B
Text
|
// Copyright 2021 by FireEye, Inc.
|
||
|
// You may not use this file except in compliance with the license. The license should have been received with this file.
|
||
|
|
||
|
rule FE_APT_Webshell_PL_STEADYPULSE_1
|
||
|
{
|
||
|
meta:
|
||
|
author = "Mandiant"
|
||
|
date_created = "2021-04-16"
|
||
|
sha256 = "168976797d5af7071df257e91fcc31ce1d6e59c72ca9e2f50c8b5b3177ad83cc"
|
||
|
reference_url = "https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html"
|
||
|
strings:
|
||
|
$s1 = "parse_parameters"
|
||
|
$s2 = "s/\\+/ /g"
|
||
|
$s3 = "s/%(..)/pack("
|
||
|
$s4 = "MIME::Base64::encode($"
|
||
|
$s5 = "$|=1;"
|
||
|
$s6 = "RC4("
|
||
|
$s7 = "$FORM{'cmd'}"
|
||
|
condition:
|
||
|
all of them
|
||
|
}
|