Skip to content

Commit 85fd595

Browse files
Merge PR #5261 from @swachchhanda000 - Add Suspicious CrushFTP Child Process
new: Suspicious CrushFTP Child Process --------- Co-authored-by: Nasreddine Bencherchali <nasreddineb@splunk.com>
1 parent 3d17247 commit 85fd595

1 file changed

Lines changed: 45 additions & 0 deletions

File tree

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
title: Suspicious CrushFTP Child Process
2+
id: 459628e3-1b00-4e9b-9e5b-7da8961aea35
3+
status: experimental
4+
description: |
5+
Detects suspicious child processes spawned by the CrushFTP service that may indicate exploitation of remote code execution vulnerabilities such as
6+
CVE-2025-31161, where attackers can achieve RCE through crafted HTTP requests.
7+
The detection focuses on commonly abused Windows executables (like powershell.exe, cmd.exe etc.) that attackers typically use post-exploitation to execute malicious commands.
8+
references:
9+
- https://nvd.nist.gov/vuln/detail/CVE-2025-2825
10+
- https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update
11+
- https://outpost24.com/blog/crushftp-auth-bypass-vulnerability/
12+
- https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis
13+
- https://projectdiscovery.io/blog/crushftp-authentication-bypass
14+
author: Craig Sweeney, Matt Anderson, Jose Oregon, Tim Kasper, Faith Stratton, Samantha Shaw, Swachchhanda Shrawan Poudel (Nextron Systems)
15+
date: 2025-04-10
16+
tags:
17+
- attack.initial-access
18+
- attack.execution
19+
- attack.t1059.001
20+
- attack.t1059.003
21+
- attack.t1190
22+
- cve.2025-31161
23+
- detection.emerging-threats
24+
logsource:
25+
category: process_creation
26+
product: windows
27+
detection:
28+
selection_parent:
29+
ParentImage|endswith: '\crushftpservice.exe'
30+
selection_child:
31+
Image|endswith:
32+
- '\bash.exe'
33+
- '\cmd.exe'
34+
- '\cscript.exe'
35+
- '\mshta.exe'
36+
- '\powershell.exe'
37+
- '\powershell_ise.exe'
38+
- '\pwsh.exe'
39+
- '\sh.exe'
40+
- '\wscript.exe'
41+
condition: all of selection_*
42+
falsepositives:
43+
- Legitimate CrushFTP administrative actions
44+
- Software updates
45+
level: medium

0 commit comments

Comments
 (0)