WIREFIRE
Description
(Mandiant) WIREFIRE is a web shell written in Python that exists as trojanized logic to a component of the Connect Secure appliance. WIREFIRE supports downloading files to the compromised device and executing arbitrary commands. It contains logic inserted before authentication that responds to specific HTTP POST requests to /api/v1/cav/client/visits. If formdata entry “file” exists, the web shell saves the content to the device with a specified filename; if not, the web shell attempts to decode, decrypt, and zlib decompress any raw data existing after a GIF header to execute as a subprocess. The output of the executed process will be zlib compressed, AES-encrypted with the same key, and Base64-encoded before being sent back as JSON with a “message” field via an HTTP 200 OK.
Names
Name |
---|
WIREFIRE |
GIFTEDVISITOR |
Category
Malware
Type
- Backdoor
Information
- https://www.mandiant.com/resources/blog/suspected-apt-targets-ivanti-zero-day
- https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/
- https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/
Mitre Attack
Malpedia
Other Information
Uuid
adb432fe-3ebe-4a40-9b59-6f71f67d90c6
Last Card Change
2024-12-27