Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

upstyle malware detect add #9586

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

Kazgangap
Copy link
Contributor

Template / PR Information

During its investigation, Volexity observed that UTA0218 attempted to install a custom Python backdoor, which Volexity calls UPSTYLE, on the firewall. The UPSTYLE backdoor allows the attacker to execute additional commands on the device via specially crafted network requests. Details on this backdoor are included further on in this report.

I tried to write a template based on the YARA rule below.

References:

Template Validation

I've validated this template locally?

  • YES
  • NO

Additional Details (leave it blank if not applicable)

Additional References:

@GeorginaReeder
Copy link

Thanks as always for your contributions @Kazgangap !

@pussycat0x pussycat0x self-assigned this Apr 21, 2024
@Kazgangap
Copy link
Contributor Author

hi @pussycat0x @DhiyaneshGeek

This file method was my first template. I don't know how variable values work in nuclei and the template is probably wrong. I have a few questions. Can we introduce a file to nuclei with hash? If the file generates variables when it runs, how can we templatize it.

If it's not going to be fixed and the template for this pest is not going to be written, this PR can be closed.

@pussycat0x
Copy link
Contributor

"Hi @Kazgangap, using the -svd -v flags will assist you in locating variables." also you can try below method to match file with hash values.

file:
  - extensions:
      - all

    matchers:
      - type: dsl
        dsl:
          - "sha256(raw) == '00014d16d21d21d00042d41d00041df1e57cd0b3bf64d18696fb4fce056610'"

@Kazgangap
Copy link
Contributor Author

hi @pussycat0x Is it true what I wrote according to this wound rule?

https://github.com/volexity/threat-intel/blob/main/2024/2024-04-12%20Palo%20Alto%20Networks%20GlobalProtect/indicators/rules.yar

id: upstyle-malware
info:
  name: Upstyle Malware - Detect
  author: Kazgangap
  severity: info
  reference:
    - https://unit42.paloaltonetworks.com/cve-2024-3400/
    - https://github.com/volexity/threat-intel/blob/main/2024/2024-04-12%20Palo%20Alto%20Networks%20GlobalProtect/indicators/rules.yar
  tags: malware,cve-2024-3400

file:
  - extensions:
      - all

    matchers:
      - type: dsl
        dsl:
          - "sha256(raw) == '3de2a4392b8715bad070b2ae12243f166ead37830f7c6d24e778985927f9caac'"
          - "sha256(raw) == '0d59d7bddac6c22230187ef6cf7fa22bca93759edc6f9127c41dc28a2cea19d8'"
          - "sha256(raw) == '4dd4bd027f060f325bf6a90d01bfcf4e7751a3775ad0246beacc6eb2bad5ec6f'"
        condition: or

@pussycat0x
Copy link
Contributor

Hi @Kazgangap yeah its fine,
We must address the issue of large files regardless. Currently, we halt reading once the maximum size is reached, compromising the reliability of the signature. Feel free to join our Discord server! Once you're in, just shoot me a DM(pussycat0xpd) so we can discuss together.

@pussycat0x pussycat0x added the Status: In Progress This issue is being worked on, and has someone assigned. label May 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Status: In Progress This issue is being worked on, and has someone assigned.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants