Files
blue-team-tools/rules/web/web_unc2546_dewmode_php_webshell.yml
T
2023-01-02 18:45:50 +01:00

33 lines
798 B
YAML

title: DEWMODE Webshell Access
id: fdf96c90-42d5-4406-8a9c-14a2c9a016b5
status: test
description: Detects access to DEWMODE webshell as described in FIREEYE report
references:
- https://www.fireeye.com/blog/threat-research/2021/02/accellion-fta-exploited-for-data-theft-and-extortion.html
author: Florian Roth
date: 2021/02/22
modified: 2023/01/02
tags:
- attack.persistence
- attack.t1505.003
logsource:
category: webserver
detection:
selection1:
cs-uri-query|contains|all:
- '?dwn='
- '&fn='
- '.html?'
selection2:
cs-uri-query|contains|all:
- '&dwn='
- '?fn='
- '.html?'
condition: 1 of selection*
fields:
- client_ip
- response
falsepositives:
- Unknown
level: high