New Campaign - BPFDoor
This commit is contained in:
Родитель
bc38d4f2c6
Коммит
c9e7755ad0
|
@ -0,0 +1,21 @@
|
||||||
|
id: bfb8eaed-941c-4866-a2cc-d5d4465bfc2a
|
||||||
|
name: RedMenshen-BPFDoor-backdoor
|
||||||
|
description: |
|
||||||
|
This query was originally published by PWC Security Research Team.
|
||||||
|
BPFDoor is custom backdoor malware used by Red Menshen. The BPFDoor allows an adversary to backdoor a system and remotely execute codes without opening any new network ports or firewall rules.
|
||||||
|
References:
|
||||||
|
https://doublepulsar.com/bpfdoor-an-active-chinese-global-surveillance-tool-54b078f1a896
|
||||||
|
https://elastic.github.io/security-research/intelligence/2022/05/04.bpfdoor/article/
|
||||||
|
requiredDataConnectors:
|
||||||
|
- connectorId: MicrosoftThreatProtection
|
||||||
|
dataTypes:
|
||||||
|
- DeviceProcessEvents
|
||||||
|
tactics:
|
||||||
|
- Execution
|
||||||
|
relevantTechniques:
|
||||||
|
- T1095
|
||||||
|
- TT1059.004
|
||||||
|
- T1070
|
||||||
|
query: |
|
||||||
|
DeviceProcessEvents
|
||||||
|
| where InitiatingProcessCommandLine has ("/dev/shm/kdmtmpflush") or FileName has ("haldrund.pid", "kdevrund.pid")
|
Загрузка…
Ссылка в новой задаче