WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.[1]
Name | Description |
---|---|
GIFTEDVISITOR |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
WIREFIRE can respond to specific HTTP |
Enterprise | T1554 | Compromise Host Software Binary |
WIREFIRE can modify the |
|
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
WIREFIRE can decode, decrypt, and decompress data received in C2 HTTP |
|
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
WIREFIRE can AES encrypt process output sent from compromised devices to C2.[1] |
Enterprise | T1105 | Ingress Tool Transfer |
WIREFIRE has the ability to download files to compromised devices.[1] |
|
Enterprise | T1505 | .003 | Server Software Component: Web Shell |
WIREFIRE is a web shell that can download files to and execute arbitrary commands from compromised Ivanti Connect Secure VPNs.[1] |
ID | Name | Description |
---|---|---|
C0029 | Cutting Edge |