WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.[1]
| Name | Description |
|---|---|
| GIFTEDVISITOR |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1554 | 主机软件二进制文件妥协 |
WIREFIRE can modify the |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
WIREFIRE can AES encrypt process output sent from compromised devices to C2.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
WIREFIRE can decode, decrypt, and decompress data received in C2 HTTP |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
WIREFIRE can respond to specific HTTP |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
WIREFIRE is a web shell that can download files to and execute arbitrary commands from compromised Ivanti Connect Secure VPNs.[1] |
| Enterprise | T1105 | 输入工具传输 |
WIREFIRE has the ability to download files to compromised devices.[1] |
|
| ID | Name | Description |
|---|---|---|
| C0029 | Cutting Edge |