rule EXPL_Log4j_CallBackDomain_IOCs_Dec21_1 { meta: description = "Detects IOCs found in Log4Shell incidents that indicate exploitation attempts of CVE-2021-44228" author = "Florian Roth (Nextron Systems)" reference = "https://gist.github.com/superducktoes/9b742f7b44c71b4a0d19790228ce85d8" date = "2021-12-12" score = 60 id = "474afa96-1758-587e-8cab-41c5205e245e" strings: $xr1 = /\b(ldap|rmi):\/\/([a-z0-9\.]{1,16}\.bingsearchlib\.com|[a-z0-9\.]{1,40}\.interact\.sh|[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}):[0-9]{2,5}\/([aZ]|ua|Exploit|callback|[0-9]{10}|http443useragent|http80useragent)\b/ condition: 1 of them } rule EXPL_JNDI_Exploit_Patterns_Dec21_1 { meta: description = "Detects JNDI Exploit Kit patterns in files" author = "Florian Roth (Nextron Systems)" reference = "https://github.com/pimps/JNDI-Exploit-Kit" date = "2021-12-12" score = 60 id = "a9127dd2-b818-5ca8-877a-3c47b1e92606" strings: $x01 = "/Basic/Command/Base64/" $x02 = "/Basic/ReverseShell/" $x03 = "/Basic/TomcatMemshell" $x04 = "/Basic/JettyMemshell" $x05 = "/Basic/WeblogicMemshell" $x06 = "/Basic/JBossMemshell" $x07 = "/Basic/WebsphereMemshell" $x08 = "/Basic/SpringMemshell" $x09 = "/Deserialization/URLDNS/" $x10 = "/Deserialization/CommonsCollections1/Dnslog/" $x11 = "/Deserialization/CommonsCollections2/Command/Base64/" $x12 = "/Deserialization/CommonsBeanutils1/ReverseShell/" $x13 = "/Deserialization/Jre8u20/TomcatMemshell" $x14 = "/TomcatBypass/Dnslog/" $x15 = "/TomcatBypass/Command/" $x16 = "/TomcatBypass/ReverseShell/" $x17 = "/TomcatBypass/TomcatMemshell" $x18 = "/TomcatBypass/SpringMemshell" $x19 = "/GroovyBypass/Command/" $x20 = "/WebsphereBypass/Upload/" $fp1 = "