BUSHWALK is a web shell written in Perl that was inserted into the legitimate querymanifest.cgi file on compromised Ivanti Connect Secure VPNs during Cutting Edge.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1554 | 主机软件二进制文件妥协 |
BUSHWALK can embed into the legitimate |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
BUSHWALK can Base64 decode and RC4 decrypt malicious payloads sent through a web request’s command parameter.[1][2] |
|
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
BUSHWALK is a web shell that has the ability to execute arbitrary commands or write files.[1] |
| Enterprise | T1205 | 流量激活 |
BUSHWALK can modify the |
|
| Enterprise | T1027 | 混淆文件或信息 |
BUSHWALK can encrypt the resulting data generated from C2 commands with RC4.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
BUSHWALK can write malicious payloads sent through a web request’s command parameter.[1][2] |
|
| ID | Name | Description |
|---|---|---|
| C0029 | Cutting Edge |