Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
rules
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fact-depend
rules
Commits
e48f522e
Commit
e48f522e
authored
Jul 18, 2016
by
Vlad S
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Added fire2013.php and chinese spam files
parent
642e4150
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
61 additions
and
0 deletions
+61
-0
chinese-spam.yar
Webshells/chinese-spam.yar
+35
-0
fire2013.yar
Webshells/fire2013.yar
+26
-0
No files found.
Webshells/chinese-spam.yar
0 → 100644
View file @
e48f522e
/*
PHP file(s) (spreader) that, using multiple remote
servers, use file_get_contents() to get more PHP
content that it writes in files with random name
(echoers), file(s) which use file_get_contents()
to get and echo the HTML (chinese blog/shop/???).
*/
rule chinese_spam_spreader
{
meta:
author = "Vlad https://github.com/vlad-s"
date = "2016/07/18"
description = "Catches chinese PHP spam files (autospreaders)"
strings:
$a = "User-Agent: aQ0O010O"
$b = "<font color='red'><b>Connection Error!</b></font>"
$c = /if ?\(\$_POST\[Submit\]\) ?{/
condition:
all of them
}
rule chinese_spam_echoer
{
meta:
author = "Vlad https://github.com/vlad-s"
date = "2016/07/18"
description = "Catches chinese PHP spam files (printers)"
strings:
$a = "set_time_limit(0)"
$b = "date_default_timezone_set('PRC');"
$c = "$Content_mb;"
$d = "/index.php?host="
condition:
all of them
}
Webshells/fire2013.yar
0 → 100644
View file @
e48f522e
/*
Webshell "fire2013.php" - shell apended to PHP!Anuna code,
found in the wild both appended and single.
Shell prints a fake "404 not found" Apache message, while
the user has to post "pass=Fuck1950xx=" to enable it.
As written in the original (decoded PHP) file,
@define('VERSION', 'v4 by Sp4nksta');
Shell is also backdoored, it mails the shell location and
info on "h4x4rwow@yahoo.com" as written in the "system32()"
function.
*/
rule fire2013
{
meta:
author = "Vlad https://github.com/vlad-s"
date = "2016/07/18"
description = "Catches a webshell"
strings:
$a = "eval(\"\\x65\\x76\\x61\\x6C\\x28\\x67\\x7A\\x69\\x6E\\x66\\x6C\\x61"
$b = "yc0CJYb+O//Xgj9/y+U/dd//vkf'\\x29\\x29\\x29\\x3B\")"
condition:
all of them
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment