BUSHWALK

BUSHWALK is a web shell written in Perl that was inserted into the legitimate querymanifest.cgi file on compromised Ivanti Connect Secure VPNs during Cutting Edge.[1][2]

ID: S1118
Type: MALWARE
Platforms: Network
Version: 1.0
Created: 07 March 2024
Last Modified: 28 March 2024

Techniques Used

Domain ID Name Use
Enterprise T1554 主机软件二进制文件妥协

BUSHWALK can embed into the legitimate querymanifest.cgi file on compromised Ivanti Connect Secure VPNs.[1][2]

Enterprise T1140 反混淆/解码文件或信息

BUSHWALK can Base64 decode and RC4 decrypt malicious payloads sent through a web request’s command parameter.[1][2]

Enterprise T1505 .003 服务器软件组件: Web Shell

BUSHWALK is a web shell that has the ability to execute arbitrary commands or write files.[1]

Enterprise T1205 流量激活

BUSHWALK can modify the DSUserAgentCap.pm Perl module on Ivanti Connect Secure VPNs and either activate or deactivate depending on the value of the user agent in incoming HTTP requests.[2]

Enterprise T1027 混淆文件或信息

BUSHWALK can encrypt the resulting data generated from C2 commands with RC4.[1]

Enterprise T1105 输入工具传输

BUSHWALK can write malicious payloads sent through a web request’s command parameter.[1][2]

Campaigns

ID Name Description
C0029 Cutting Edge

[1][2]

References