2020-12-17 08:05:08 +00:00
|
|
|
title: Solarwinds SUPERNOVA Webshell Access
|
|
|
|
id: a2cee20b-eacc-459f-861d-c02e5d12f1db
|
|
|
|
status: experimental
|
|
|
|
description: Detects access to SUPERNOVA webshell as described in Guidepoint report
|
|
|
|
author: Florian Roth
|
|
|
|
date: 2020/12/17
|
2020-12-22 09:36:34 +00:00
|
|
|
modified: 2020/12/22
|
2020-12-17 08:05:08 +00:00
|
|
|
references:
|
|
|
|
- https://www.guidepointsecurity.com/supernova-solarwinds-net-webshell-analysis/
|
2020-12-22 09:36:34 +00:00
|
|
|
- https://www.anquanke.com/post/id/226029
|
2020-12-17 08:05:08 +00:00
|
|
|
tags:
|
|
|
|
- attack.persistence
|
|
|
|
- attack.t1505.003
|
|
|
|
logsource:
|
|
|
|
category: webserver
|
|
|
|
detection:
|
2020-12-22 09:36:34 +00:00
|
|
|
selection1:
|
2020-12-17 08:05:08 +00:00
|
|
|
c-uri|contains|all:
|
|
|
|
- 'logoimagehandler.ashx'
|
|
|
|
- 'clazz'
|
2020-12-22 09:36:34 +00:00
|
|
|
selection2:
|
|
|
|
c-uri|contains:
|
|
|
|
- 'logoimagehandler.ashx'
|
|
|
|
sc-status: 500
|
|
|
|
condition: selection1 or selection2
|
2020-12-17 08:05:08 +00:00
|
|
|
fields:
|
|
|
|
- client_ip
|
|
|
|
- response
|
|
|
|
falsepositives:
|
|
|
|
- Unknown
|
|
|
|
level: critical
|