Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

rule: Solarwinds SUPERNOVA web shell access #1312

Merged
merged 1 commit into from Dec 21, 2020
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
25 changes: 25 additions & 0 deletions rules/web/web_solarwinds_supernova_webshell.yml
@@ -0,0 +1,25 @@
title: Solarwinds SUPERNOVA Webshell Access
id: a2cee20b-eacc-459f-861d-c02e5d12f1db
status: experimental
description: Detects access to SUPERNOVA webshell as described in Guidepoint report
author: Florian Roth
date: 2020/12/17
references:
- https://www.guidepointsecurity.com/supernova-solarwinds-net-webshell-analysis/
tags:
- attack.persistence
- attack.t1505.003
logsource:
category: webserver
detection:
selection:
c-uri|contains|all:
- 'logoimagehandler.ashx'
- 'clazz'
condition: selection
fields:
- client_ip
- response
falsepositives:
- Unknown
level: critical