alert http any any -> $HOME_NET any (msg:"ET EXPLOIT ThinkPHP? Attempted Bypass and Payload Retrieval"; flow:to_server,established; content:"GET"; http_method; content:"/public/hydra.php?xcmd=cmd.exe"; http_uri; metadata: former_category EXPLOIT; reference:url,forums.juniper.net/t5/Threat-Research/Anatomy-of-the-Bulehero-Cryptomining-Botnet/ba-p/458787; classtype:attempted-user; sid:2027518; rev:1; metadata:attack_target Server, deployment Perimeter, signature_severity Major, created_at 2019_06_26, performance_impact Moderate, updated_at 2019_06_26;)

Added 2019-06-26 19:54:25 UTC


Topic revision: r1 - 2019-06-26 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats