Skip to content

Commit bd5cc8b

Browse files
committed
Add React2Shell configuration and YARA rules for threat detection
1 parent aee2491 commit bd5cc8b

File tree

4 files changed

+119
-0
lines changed

4 files changed

+119
-0
lines changed
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
# Reference: https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182?hl=en
2+
input:
3+
path: []
4+
content:
5+
grep:
6+
- "reactcdn.windowserrorapis.com"
7+
- "82.163.22.139"
8+
- "216.158.232.43"
9+
- "45.76.155.14"
10+
yara:
11+
- "./react2shell_compoond.yar"
12+
- "./react2shell_minocat.yar"
13+
- "./react2shell_snowlight.yar"
14+
checksum:
15+
- "776850a1e6d6915e9bf35aa83554616129acd94e3a3f6673bd6ddaec530f4273"
16+
- "7f05bad031d22c2bb4352bf0b6b9ee2ca064a4c0e11a317e6fedc694de37737a"
17+
- "13675cca4674a8f9a8fabe4f9df4ae0ae9ef11986dd1dcc6a896912c7d527274"
18+
- "0bc65a55a84d1b2e2a320d2b011186a14f9074d6d28ff9120cb24fcc03c3f696"
19+
- "92064e210b23cf5b94585d3722bf53373d54fb4114dca25c34e010d0c010edf3"
20+
- "df3f20a961d29eed46636783b71589c183675510737c984a11f78932b177b540"
21+
options:
22+
contentMatchDependsOnPathMatch: true
23+
findInHardDrives: true
24+
findInRemovableDrives: true
25+
findInNetworkDrives: true
26+
findInCDRomDrives: true
27+
output:
28+
copyMatchingFiles: false
29+
base64Files: false
30+
filesCopyPath: ''
31+
advancedparameters:
32+
yaraRC4Key: ''
33+
maxScanFilesize: 2048
34+
cleanMemoryIfFileGreaterThanSize: 512
35+
eventforwarding:
36+
enabled: false
37+
buffer_size: 5
38+
flush_time_seconds: 10
39+
file:
40+
enabled: false
41+
directory_path: "./event_logs"
42+
rotate_minutes: 1
43+
max_file_size_mb: 1
44+
retain_files: 5
45+
http:
46+
enabled: false
47+
url: "https://your-forwarder-url.com/api/events"
48+
ssl_verify: false
49+
timeout_seconds: 10
50+
headers:
51+
Authorization: "Bearer YOUR_API_KEY"
52+
MY-CUSTOM-HEADER: "My-Header-Value"
53+
retry_count: 3
54+
filters:
55+
event_types:
56+
- "error"
57+
- "warning"
58+
- "alert"
59+
- "info"
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
rule G_Backdoor_COMPOOD_1 {
2+
meta:
3+
author = "Google Threat Intelligence Group (GTIG)"
4+
date_modified = "2025-12-11"
5+
rev = "1"
6+
md5 = "d3e7b234cf76286c425d987818da3304"
7+
strings:
8+
$strings_1 = "ShellLinux.Shell"
9+
$strings_2 = "ShellLinux.Exec_shell"
10+
$strings_3 = "ProcessLinux.sendBody"
11+
$strings_4 = "ProcessLinux.ProcessTask"
12+
$strings_5 = "socket5Quick.StopProxy"
13+
$strings_6 = "httpAndTcp"
14+
$strings_7 = "clean.readFile"
15+
$strings_8 = "/sys/kernel/mm/transparent_hugepage/hpage_pmd_size"
16+
$strings_9 = "/proc/self/auxv"
17+
$strings_10 = "/dev/urandom"
18+
$strings_11 = "client finished"
19+
$strings_12 = "github.com/creack/pty.Start"
20+
condition:
21+
uint32(0) == 0x464C457f and 8 of ($strings_*)
22+
}
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
rule G_APT_Tunneler_MINOCAT_1 {
2+
meta:
3+
author = "Google Threat Intelligence Group (GTIG)"
4+
date_modified = "2025-12-10"
5+
rev = "1"
6+
md5 = "533585eb6a8a4aad2ad09bbf272eb45b"
7+
strings:
8+
$magic = { 7F 45 4C 46 }
9+
$decrypt_func = { 48 85 F6 0F 94 C1 48 85 D2 0F 94 C0 08 C1 0F 85 }
10+
$xor_func = { 4D 85 C0 53 49 89 D2 74 57 41 8B 18 48 85 FF 74 }
11+
$frp_str1 = "libxf-2.9.644/main.c"
12+
$frp_str2 = "xfrp login response: run_id: [%s], version: [%s]"
13+
$frp_str3 = "cannot found run ID, it should inited when login!"
14+
$frp_str4 = "new work connection request run_id marshal failed!"
15+
$telnet_str1 = "Starting telnetd on port %d\n"
16+
$telnet_str2 = "No login shell found at %s\n"
17+
$key = "bigeelaminoacow"
18+
condition:
19+
$magic at 0 and (1 of ($decrypt_func, $xor_func)) and (2 of ($frp_str*)) and (1 of ($telnet_str*)) and $key
20+
}
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
rule G_Hunting_Downloader_SNOWLIGHT_1 {
2+
meta:
3+
author = "Google Threat Intelligence Group (GTIG)"
4+
date_created = "2025-03-25"
5+
date_modified = "2025-03-25"
6+
md5 = "3a7b89429f768fdd799ca40052205dd4"
7+
rev = 1
8+
strings:
9+
$str1 = "rm -rf $v"
10+
$str2 = "&t=tcp&a="
11+
$str3 = "&stage=true"
12+
$str4 = "export PATH=$PATH:$(pwd)"
13+
$str5 = "curl"
14+
$str6 = "wget"
15+
$str7 = "python -c 'import urllib"
16+
condition:
17+
all of them and filesize < 5KB
18+
}

0 commit comments

Comments
 (0)