Mitigate Microsoft Exchange Server Vulnerabilities | CISA
Common Information
Type Value
UUID c6579bc9-6200-4213-a492-e4e673544ae6
Fingerprint b611f851bf2791e3
Analysis status DONE
Considered CTI value 2
Text language
Published March 3, 2021, midnight
Added to db Sept. 26, 2022, 9:33 a.m.
Last updated Nov. 17, 2024, 7:44 p.m.
Headline Alert (AA21-062A)
Title Mitigate Microsoft Exchange Server Vulnerabilities | CISA
Detected Hints/Tags/Attributes 98/3/87
Attributes
Details Type #Events CTI Value
Details CVE 184
cve-2021-26855
Details CVE 90
cve-2021-26857
Details CVE 92
cve-2021-26858
Details CVE 126
cve-2021-27065
Details Domain 154
us-cert.cisa.gov
Details Domain 145
www.us-cert.gov
Details Domain 22
duckduckgo.com
Details Domain 335
www.facebook.com
Details Domain 46
www.baidu.com
Details Domain 88
www.bing.com
Details Domain 454
www.google.com
Details Domain 5
help.yahoo.com
Details Domain 155
yandex.com
Details Domain 4
www.googlebot.com
Details Domain 7
volexity.com
Details Domain 4127
github.com
Details Domain 339
system.net
Details Domain 46
datetime.now
Details Domain 3
accessdata.com
Details Domain 1
kape.zip
Details Domain 34
msrc-blog.microsoft.com
Details Domain 397
www.microsoft.com
Details Email 4
threatintel@volexity.com
Details File 3
test-proxylogon.ps1
Details File 2
eomt.ps1
Details File 3
logon.css
Details File 2
owafont_ja.css
Details File 2
lgnbotl.gif
Details File 2
owafont_ko.css
Details File 1
timeoutlogoff.aspx
Details File 4
duckduckbot.html
Details File 5
externalhit_uatext.php
Details File 6
spider.html
Details File 85
www.bin
Details File 6
bingbot.htm
Details File 12
bot.html
Details File 17
main.css
Details File 7
tunnel.aspx
Details File 1
imager.pdf
Details File 1
imager.exe
Details File 1
kape.zip
Details File 4
gkape.exe
Details Github username 24
sensepost
Details sha256 2
893cd3583b49cb706b3e55ecb2ed0757b977a21f5c72e041392d1256f31166e2
Details sha256 2
406b680edc9a1bb0e2c7c451c56904857848b5f15570401450b73b232ff38928
Details sha256 2
2fa06333188795110bba14a482020699a96f76fb1ceb80cbfa2df9d3008b5b0a
Details sha256 4
b75f163ca9b9240bf4b37ad92bc7556b40a17e27c2b8ed5c8991385fe07d17d0
Details sha256 3
097549cf7d0f76f0d99edf8b2d91c60977fd6a96e4b8c3c94b0b1733dc026d3e
Details sha256 3
2b6f1ebb2208e93ade4a6424555d6a8341fd6d9f60c25e44afe11008f5c1aad1
Details sha256 4
65149e036fff06026d80ac9ad4d156332822dc93142cf1a122b1841ec8de34b5
Details sha256 4
511df0e2df9bfa5521b588cc4bb5f8c5a321801b803394ebc493db1ef3c78fa1
Details sha256 4
4edc7770464a14f54d17f36dc9d0fe854f68b346b27b35a6f5839adf1f13f8ea
Details sha256 4
811157f9c7003ba8d17b45eb3cf09bef2cecd2701cedb675274949296a6a183d
Details sha256 3
1631a90eb5395c4e19c7dbcbf611bbe6444ff312eb7937e286e4637cb9e72944
Details IPv4 619
0.0.0.0
Details IPv4 4
103.77.192.219
Details IPv4 4
104.140.114.110
Details IPv4 4
104.250.191.110
Details IPv4 4
108.61.246.56
Details IPv4 4
149.28.14.163
Details IPv4 6
157.230.221.198
Details IPv4 6
167.99.168.251
Details IPv4 4
185.250.151.72
Details IPv4 4
192.81.208.169
Details IPv4 4
203.160.69.66
Details IPv4 4
211.56.98.146
Details IPv4 4
5.254.43.18
Details IPv4 3
5.2.69.14
Details IPv4 4
80.92.205.81
Details IPv4 3
91.192.103.43
Details Url 4
http://duckduckgo.com/duckduckbot.html
Details Url 5
http://www.facebook.com/externalhit_uatext.php
Details Url 5
http://www.baidu.com/search/spider.html
Details Url 6
http://www.bing.com/bingbot.htm
Details Url 12
http://www.google.com/bot.html
Details Url 4
http://help.yahoo.com/help/us/ysearch/slurp
Details Url 4
http://yandex.com/bots
Details Url 3
http://www.googlebot.com/bot.html
Details Url 4
https://github.com/sensepost/regeorg/blob/master/tunnel.aspx
Details Url 1
https://accessdata.com/product-download/.
Details Url 1
https://www.kroll.com/en/services/cyber-risk/investigate-and-respond/kroll-artifact-parser-extractor-kape.
Details Url 2
https://msrc-blog.microsoft.com/2021/03/02/multiple-security-updates-released-for-exchange-server
Details Url 8
https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers
Details Url 3
https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities
Details Url 2
https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021
Details Yara rule 1
rule webshell_aspx_simpleseesharp : Webshell Unclassified {
	meta:
		author = "threatintel@volexity.com"
		date = "2021-03-01"
		description = "A simple ASPX Webshell that allows an attacker to write further files to disk."
		hash = "893cd3583b49cb706b3e55ecb2ed0757b977a21f5c72e041392d1256f31166e2"
	strings:
		$header = "<%@ Page Language=\"C#\" %>"
		$body = "<% HttpPostedFile thisFile = Request.Files[0];thisFile.SaveAs(Path.Combine"
	condition:
		$header at 0 and $body and filesize < 1KB
}
Details Yara rule 1
rule webshell_aspx_sportsball : Webshell Unclassified {
	meta:
		author = "threatintel@volexity.com"
		date = "2021-03-01"
		description = "The SPORTSBALL webshell allows attackers to upload files or execute commands on the system."
		hash = "2fa06333188795110bba14a482020699a96f76fb1ceb80cbfa2df9d3008b5b0a"
	strings:
		$uniq1 = "HttpCookie newcook = new HttpCookie(\"fqrspt\", HttpContext.Current.Request.Form"
		$uniq2 = "ZN2aDAB4rXsszEvCLrzgcvQ4oi5J1TuiRULlQbYwldE="
		$var1 = "Result.InnerText = string.Empty;"
		$var2 = "newcook.Expires = DateTime.Now.AddDays("
		$var3 = "System.Diagnostics.Process process = new System.Diagnostics.Process();"
		$var4 = "process.StandardInput.WriteLine(HttpContext.Current.Request.Form[\""
		$var5 = "else if (!string.IsNullOrEmpty(HttpContext.Current.Request.Form[\""
		$var6 = "<input type=\"submit\" value=\"Upload\" />"
	condition:
		any of ($uniq*) or all of ($var*)
}