43 lines
1.1 KiB
YAML
43 lines
1.1 KiB
YAML
title: Linux Webshell Indicators
|
|
id: 818f7b24-0fba-4c49-a073-8b755573b9c7
|
|
status: experimental
|
|
description: Detects suspicious sub processes of web server processes
|
|
references:
|
|
- https://www.acunetix.com/blog/articles/web-shells-101-using-php-introduction-web-shells-part-2/
|
|
date: 2021/10/15
|
|
author: Florian Roth
|
|
tags:
|
|
- attack.persistence
|
|
- attack.t1100 # an old one
|
|
- attack.t1505.003
|
|
logsource:
|
|
product: linux
|
|
category: process_creation
|
|
detection:
|
|
selection_general:
|
|
ParentImage|endswith:
|
|
- '/httpd'
|
|
- '/lighttpd'
|
|
- '/nginx'
|
|
- '/apache2'
|
|
- '/node'
|
|
selection_tomcat:
|
|
ParentCommandLine|contains|all:
|
|
- '/bin/java'
|
|
- 'tomcat'
|
|
selection_websphere: # ? just guessing
|
|
ParentCommandLine|contains|all:
|
|
- '/bin/java'
|
|
- 'websphere'
|
|
selection_sub_processes:
|
|
Image|endswith:
|
|
- '/whoami'
|
|
- '/ifconfig'
|
|
- '/usr/bin/ip'
|
|
- '/bin/uname'
|
|
condition: selection_sub_processes and ( selection_general or selection_tomcat )
|
|
falsepositives:
|
|
- Web applications that invoke Linux command line tools
|
|
level: critical
|
|
|