threat-intel/yara.yar at main · volexity/threat-intel
Tags
Common Information
Type | Value |
---|---|
UUID | 4df5c8e0-2c5e-4c5e-a1e9-5f70855310f5 |
Fingerprint | 4452ac7d4d27f065 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Aug. 10, 2022, midnight |
Added to db | Sept. 11, 2022, 12:44 p.m. |
Last updated | Nov. 17, 2024, 7:44 p.m. |
Headline | UNKNOWN |
Title | threat-intel/yara.yar at main · volexity/threat-intel |
Detected Hints/Tags/Attributes | 10/0/19 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 29 | cve-2022-27925 |
|
Details | Domain | 7 | volexity.com |
|
Details | Domain | 4127 | github.com |
|
Details | Domain | 224 | unit42.paloaltonetworks.com |
|
Details | Domain | 37 | java.security |
|
Details | 4 | threatintel@volexity.com |
||
Details | File | 34 | license.txt |
|
Details | File | 8 | tunnel.jsp |
|
Details | Github username | 7 | volexity |
|
Details | Github username | 6 | beichendream |
|
Details | Github username | 5 | secwiki |
|
Details | sha256 | 1 | 2786d2dc738529a34ecde10ffeda69b7f40762bf13e7771451f13a24ab7fc5fe |
|
Details | sha256 | 1 | 4935f0c50057e28efa7376c734a4c66018f8d20157b6584399146b6c79a6de15 |
|
Details | sha256 | 1 | f9b20324f4239a8c82042d8207e35776d6777b6305974964cd9ccc09d431b845 |
|
Details | Url | 3 | https://github.com/volexity/threat-intel/blob/main/license.txt |
|
Details | Url | 4 | https://github.com/beichendream/godzilla |
|
Details | Url | 3 | https://unit42.paloaltonetworks.com/manageengine-godzilla-nglite-kdcsponge |
|
Details | Url | 1 | https://github.com/secwiki/webshell-2/blob/master/regeorg-master/tunnel.jsp |
|
Details | Yara rule | 1 | rule webshell_jsp_general_runtime_exec_req : General Webshells { meta: author = "threatintel@volexity.com" description = "Looks for a common design pattern in webshells where a request attribute is passed directly to exec()." date = "2022-02-02" hash1 = "4935f0c50057e28efa7376c734a4c66018f8d20157b6584399146b6c79a6de15" license = "See license at https://github.com/volexity/threat-intel/blob/main/LICENSE.txt" memory_suitable = 1 strings: $s1 = "Runtime.getRuntime().exec(request." condition: $s1 } |