Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. BUSHWALK

BUSHWALK

BUSHWALK is a web shell written in Perl that was inserted into the legitimate querymanifest.cgi file on compromised Ivanti Connect Secure VPNs duringCutting Edge.[1][2]

ID: S1118
Type: MALWARE
Platforms: Network Devices
Version: 1.1
Created: 07 March 2024
Last Modified: 15 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1554Compromise Host Software Binary

BUSHWALK can embed into the legitimatequerymanifest.cgi file on compromised Ivanti Connect Secure VPNs.[1][2]

EnterpriseT1140Deobfuscate/Decode Files or Information

BUSHWALK can Base64 decode and RC4 decrypt malicious payloads sent through a web request’s command parameter.[1][2]

EnterpriseT1105Ingress Tool Transfer

BUSHWALK can write malicious payloads sent through a web request’s command parameter.[1][2]

EnterpriseT1027Obfuscated Files or Information

BUSHWALK can encrypt the resulting data generated from C2 commands with RC4.[1]

EnterpriseT1505.003Server Software Component:Web Shell

BUSHWALK is a web shell that has the ability to execute arbitrary commands or write files.[1]

EnterpriseT1205Traffic Signaling

BUSHWALK can modify theDSUserAgentCap.pm Perl module on Ivanti Connect Secure VPNs and either activate or deactivate depending on the value of the user agent in incoming HTTP requests.[2]

Campaigns

IDNameDescription
C0029Cutting Edge

[1][2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp