Solarwinds SUPERNOVA Webshell Access

Detects access to SUPERNOVA webshell as described in Guidepoint report

Sigma rule (View on GitHub)

 1title: Solarwinds SUPERNOVA Webshell Access
 2id: a2cee20b-eacc-459f-861d-c02e5d12f1db
 3status: test
 4description: Detects access to SUPERNOVA webshell as described in Guidepoint report
 5references:
 6    - https://www.guidepointsecurity.com/supernova-solarwinds-net-webshell-analysis/
 7    - https://www.anquanke.com/post/id/226029
 8author: Florian Roth (Nextron Systems)
 9date: 2020/12/17
10modified: 2023/01/02
11tags:
12    - attack.persistence
13    - attack.t1505.003
14    - detection.emerging_threats
15logsource:
16    category: webserver
17detection:
18    selection1:
19        cs-uri-query|contains|all:
20            - 'logoimagehandler.ashx'
21            - 'clazz'
22    selection2:
23        cs-uri-query|contains: 'logoimagehandler.ashx'
24        sc-status: 500
25    condition: selection1 or selection2
26fields:
27    - client_ip
28    - response
29falsepositives:
30    - Unknown
31level: critical

References

Related rules

to-top