File tree Expand file tree Collapse file tree 4 files changed +119
-0
lines changed
Expand file tree Collapse file tree 4 files changed +119
-0
lines changed Original file line number Diff line number Diff line change 1+ # Reference: https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182?hl=en
2+ input :
3+ path : []
4+ content :
5+ grep :
6+ - " reactcdn.windowserrorapis.com"
7+ - " 82.163.22.139"
8+ - " 216.158.232.43"
9+ - " 45.76.155.14"
10+ yara :
11+ - " ./react2shell_compoond.yar"
12+ - " ./react2shell_minocat.yar"
13+ - " ./react2shell_snowlight.yar"
14+ checksum :
15+ - " 776850a1e6d6915e9bf35aa83554616129acd94e3a3f6673bd6ddaec530f4273"
16+ - " 7f05bad031d22c2bb4352bf0b6b9ee2ca064a4c0e11a317e6fedc694de37737a"
17+ - " 13675cca4674a8f9a8fabe4f9df4ae0ae9ef11986dd1dcc6a896912c7d527274"
18+ - " 0bc65a55a84d1b2e2a320d2b011186a14f9074d6d28ff9120cb24fcc03c3f696"
19+ - " 92064e210b23cf5b94585d3722bf53373d54fb4114dca25c34e010d0c010edf3"
20+ - " df3f20a961d29eed46636783b71589c183675510737c984a11f78932b177b540"
21+ options :
22+ contentMatchDependsOnPathMatch : true
23+ findInHardDrives : true
24+ findInRemovableDrives : true
25+ findInNetworkDrives : true
26+ findInCDRomDrives : true
27+ output :
28+ copyMatchingFiles : false
29+ base64Files : false
30+ filesCopyPath : ' '
31+ advancedparameters :
32+ yaraRC4Key : ' '
33+ maxScanFilesize : 2048
34+ cleanMemoryIfFileGreaterThanSize : 512
35+ eventforwarding :
36+ enabled : false
37+ buffer_size : 5
38+ flush_time_seconds : 10
39+ file :
40+ enabled : false
41+ directory_path : " ./event_logs"
42+ rotate_minutes : 1
43+ max_file_size_mb : 1
44+ retain_files : 5
45+ http :
46+ enabled : false
47+ url : " https://your-forwarder-url.com/api/events"
48+ ssl_verify : false
49+ timeout_seconds : 10
50+ headers :
51+ Authorization : " Bearer YOUR_API_KEY"
52+ MY-CUSTOM-HEADER : " My-Header-Value"
53+ retry_count : 3
54+ filters :
55+ event_types :
56+ - " error"
57+ - " warning"
58+ - " alert"
59+ - " info"
Original file line number Diff line number Diff line change 1+ rule G_Backdoor_COMPOOD_1 {
2+ meta :
3+ author = " Google Threat Intelligence Group (GTIG) "
4+ date_modified = " 2025-12-11 "
5+ rev = " 1 "
6+ md5 = " d3e7b234cf76286c425d987818da3304 "
7+ strings :
8+ $ strings_1 = " ShellLinux.Shell "
9+ $ strings_2 = " ShellLinux.Exec_shell "
10+ $ strings_3 = " ProcessLinux.sendBody "
11+ $ strings_4 = " ProcessLinux.ProcessTask "
12+ $ strings_5 = " socket5Quick.StopProxy "
13+ $ strings_6 = " httpAndTcp "
14+ $ strings_7 = " clean.readFile "
15+ $ strings_8 = " /sys/kernel/mm/transparent_hugepage/hpage_pmd_size "
16+ $ strings_9 = " /proc/self/auxv "
17+ $ strings_10 = " /dev/urandom "
18+ $ strings_11 = " client finished "
19+ $ strings_12 = " github.com/creack/pty.Start "
20+ condition :
21+ uint32 (0 ) == 0x464C457f and 8 of ($ strings_ * )
22+ }
Original file line number Diff line number Diff line change 1+ rule G_APT_Tunneler_MINOCAT_1 {
2+ meta :
3+ author = " Google Threat Intelligence Group (GTIG) "
4+ date_modified = " 2025-12-10 "
5+ rev = " 1 "
6+ md5 = " 533585eb6a8a4aad2ad09bbf272eb45b "
7+ strings :
8+ $ magic = { 7F 45 4C 46 }
9+ $ decrypt_func = { 48 85 F6 0F 94 C1 48 85 D2 0F 94 C0 08 C1 0F 85 }
10+ $ xor_func = { 4D 85 C0 53 49 89 D2 74 57 41 8B 18 48 85 FF 74 }
11+ $ frp_str1 = " libxf-2.9.644/main.c "
12+ $ frp_str2 = " xfrp login response: run_id: [%s], version: [%s] "
13+ $ frp_str3 = " cannot found run ID, it should inited when login! "
14+ $ frp_str4 = " new work connection request run_id marshal failed! "
15+ $ telnet_str1 = " Starting telnetd on port %d \n "
16+ $ telnet_str2 = " No login shell found at %s \n "
17+ $ key = " bigeelaminoacow "
18+ condition :
19+ $ magic at 0 and (1 of ($ decrypt_func , $ xor_func )) and (2 of ($ frp_str * )) and (1 of ($ telnet_str * )) and $ key
20+ }
Original file line number Diff line number Diff line change 1+ rule G_Hunting_Downloader_SNOWLIGHT_1 {
2+ meta :
3+ author = " Google Threat Intelligence Group (GTIG) "
4+ date_created = " 2025-03-25 "
5+ date_modified = " 2025-03-25 "
6+ md5 = " 3a7b89429f768fdd799ca40052205dd4 "
7+ rev = 1
8+ strings :
9+ $ str1 = " rm -rf $v "
10+ $ str2 = " &t=tcp&a= "
11+ $ str3 = " &stage=true "
12+ $ str4 = " export PATH=$PATH:$(pwd) "
13+ $ str5 = " curl "
14+ $ str6 = " wget "
15+ $ str7 = " python -c 'import urllib "
16+ condition :
17+ all of them and filesize < 5KB
18+ }
You can’t perform that action at this time.
0 commit comments