Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Windows defender flagging RESPONSE-955-WEB-SHELLS.conf as malware Backdoor:PHP/Dirtelti.MTJ #3603

Closed
ouhwebteam opened this issue Mar 6, 2024 · 19 comments · Fixed by #3687
Closed

Comments

@ouhwebteam
Copy link

ouhwebteam commented Mar 6, 2024

I use the ruleset on mod_security IIS. I just tried to upload the latest ruleset to our web server and Windows Defender flagged the file RESPONSE-955-WEB-SHELLS.conf as containing Backdoor:PHP/Dirtelti.MTJ.

I scanned the file with Sophos locally before uploading and it did not alert. I've subsequently run the file through A number of vendors and the only one alerting is Microsoft. Are to able to confirm this is a false positive.

For now I'll continue to run V3.3.5.

Thanks

@ouhwebteam ouhwebteam changed the title Windows defender flagging RESPONSE-955-WEB-SHELLS.conf and malware Backdoor:PHP/Dirtelti.MTJ Windows defender flagging RESPONSE-955-WEB-SHELLS.conf as malware Backdoor:PHP/Dirtelti.MTJ Mar 6, 2024
@dune73
Copy link
Member

dune73 commented Mar 6, 2024

Is there a "not" missing in the sentence with Sophos?

The file is cool, but I'm not surprised that one of the webshell patterns is flagged as backdoor ...

@azurit
Copy link
Member

azurit commented Mar 6, 2024

@ouhwebteam Hi. Thanks for reporting this but this is normal behavior. Files RESPONSE-955-WEB-SHELLS.conf and web-shells-php.data contains signatures of varions PHP web shells, backdoors, file managers and so on.

It is safe to use it. I recommend to whitelist that file in Windows Defender (or other antivirus software).

@dune73
Copy link
Member

dune73 commented Mar 6, 2024

I doubt there is something we can do.

What you could try to help us is to play around with the patterns in question and tell you which string exactly triggers the alert.

@ouhwebteam
Copy link
Author

Is there a "not" missing in the sentence with Sophos?

The file is cool, but I'm not surprised that one of the webshell patterns is flagged as backdoor ...

indeed apologies. I'll edit the issue

@ouhwebteam
Copy link
Author

I doubt there is something we can do.

What you could try to help us is to play around with the patterns in question and tell you which string exactly triggers the alert.

I'll see what I can do. We've cleared all the files from the server, but I'll see if server team have kept the alert message that came through.

@ouhwebteam
Copy link
Author

@ouhwebteam Hi. Thanks for reporting this but this is normal behavior. Files RESPONSE-955-WEB-SHELLS.conf and web-shells-php.data contains signatures of varions PHP web shells, backdoors, file managers and so on.

It is safe to use it. I recommend to whitelist that file in Windows Defender (or other antivirus software).

Thanks for replying, I'll see what the cyber team say, they might allow that.

@azurit
Copy link
Member

azurit commented Mar 6, 2024

What you could try to help us is to play around with the patterns in question and tell you which string exactly triggers the alert.

@ouhwebteam It was probably one of these patterns:

Mini Shell web shell
GRP WebShell
PhpSpy web shell

@ouhwebteam
Copy link
Author

I've emailed the central team to see if they have access to any more detail on the alert and to see if we can look into whitelisting the file

What you could try to help us is to play around with the patterns in question and tell you which string exactly triggers the alert.

@ouhwebteam It was probably one of these patterns:

Mini Shell web shell
GRP WebShell
PhpSpy web shell

I've emailed the central team to see if they have access to any more detail on the alert and to see if we can look into whitelisting the file

@azurit
Copy link
Member

azurit commented Apr 7, 2024

@ouhwebteam Any news? Thanks.

@ouhwebteam
Copy link
Author

@ouhwebteam Any news? Thanks.

Apologies for not updating this thread.

The National Cyber Security Operation Centre (CSOC). They agree that this is appears to be a false positive and have replied with some possibilities about setting up exclusions, but, given the infrastructure, they don't look simple, so I've referred the email onto out cyber team for comment.

At the moment we will not be able to upgrade the ruleset, but I'm hopeful this might change in the future.

@azurit
Copy link
Member

azurit commented Apr 9, 2024

@ouhwebteam Would be it possible to get more information about which pattern was detected by antivirus software? We will probably be able to modify it so it's not doing such problems. Thanks.

@fzipi fzipi added the ⏳ awaiting feedback CRS dev asked feedback label Apr 21, 2024
@yshupletsov
Copy link

Good day, I also receive malware response from Windows Defender:

Backdoor:PHP/Remoteshell.B
coreruleset-4.2.0.zip->coreruleset-4.2.0/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933190.yaml

Backdoor:PHP/Chopper.B!dha
coreruleset-4.2.0.zip->coreruleset-4.2.0/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933111.yaml

Backdoor:PHP/Dirtelti.MTJ

using latest 4.2.0 version

@azurit
Copy link
Member

azurit commented Apr 29, 2024

@yshupletsov
Copy link

@azurit , no problems with that file

@dune73
Copy link
Member

dune73 commented May 2, 2024

Honestly, I'm surprised we do not get more reports like this.

There is little we can do outside of trying to work around the detection by changing our patterns so the engine will no longer detect our payload. Sounds a bit too familiar to me. But I also think this is a futile endeavor since we would be running after the malware detection engines with our patterns. I think it's better they create exclusions for CRS.

Either way, I suggest we close this.

@azurit
Copy link
Member

azurit commented May 2, 2024

Will be closed automatically after merging #3687.

@yshupletsov
Copy link

Good day, any updates on this task?

@azurit azurit removed the ⏳ awaiting feedback CRS dev asked feedback label May 16, 2024
@ouhwebteam
Copy link
Author

We still haven't managed to configure our security measures to whitelist the files yet due to complications this end. As far as I am concerned, everything has been answered here so this can be closed, unless someone feels the need to keep it open.

@azurit
Copy link
Member

azurit commented May 17, 2024

@ouhwebteam Thanks for reporting back. This will be closed automatically probably today (after fix is merged).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
5 participants