ID | Name |
---|---|
T1505.001 | SQL Stored Procedures |
T1505.002 | Transport Agent |
T1505.003 | Web Shell |
T1505.004 | IIS Components |
T1505.005 | Terminal Services DLL |
T1505.006 | vSphere Installation Bundles |
Adversaries may abuse vSphere Installation Bundles (VIBs) to establish persistent access to ESXi hypervisors. VIBs are collections of files used for software distribution and virtual system management in VMware environments. Since ESXi uses an in-memory filesystem where changes made to most files are stored in RAM rather than in persistent storage, these modifications are lost after a reboot. However, VIBs can be used to create startup tasks, apply custom firewall rules, or deploy binaries that persist across reboots. Typically, administrators use VIBs for updates and system maintenance.
VIBs can be broken down into three components:[1]
.vgz
archive containing the directories and files to be created and executed on boot when the VIBs are loaded. esxcli
command line interface. Additionally, VIBs are able to be installed regardless of acceptance level by using the esxcli software vib install --force
command. Adversaries may leverage malicious VIB packages to maintain persistent access to ESXi hypervisors, allowing system changes to be executed upon each bootup of ESXi – such as using esxcli
to enable firewall rules for backdoor traffic, creating listeners on hard coded ports, and executing backdoors.[2] Adversaries may also masquerade their malicious VIB files as PartnerSupported by modifying the XML descriptor file.[2]
ID | Mitigation | Description |
---|---|---|
M1047 | Audit |
Periodically audit ESXi hosts to ensure that only approved VIBs are installed. The command |
M1046 | Boot Integrity |
Enabling secure boot allows ESXi to validate software and drivers during initial system boot.[3] |
M1045 | Code Signing |
Enabling the |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0015 | Application Log | Application Log Content |
Monitor ESXi hosts for suspicious installation of new VIBs. The Analytic 1 - Detection bypassing signatures
|
DS0017 | Command | Command Execution |
Monitor command-line arguments that may involve installing new VIBs, such as Analytic 1 - Detect VIB installation
|