{"id":13133,"date":"2022-06-13T10:25:41","date_gmt":"2022-06-13T08:25:41","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=13133"},"modified":"2024-04-12T16:33:27","modified_gmt":"2024-04-12T14:33:27","slug":"follina-detection-with-thor-and-aurora","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/","title":{"rendered":"Follina CVE-2022-30190 Detection with THOR and Aurora"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The Follina 0day vulnerability (CVE-2022-30190) in Microsoft Windows is actively exploited in-the-wild and highly critical. This blog posts lists some important web resources and the signatures that detect exploitation attempts.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Kevin Beaumont&#8217;s Blog Post&#8221; url=&#8221;https:\/\/doublepulsar.com\/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e&#8221; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2022\/06\/Screenshot-2022-06-13-at-09.36.08.png&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Kevin&#8217;s post contains links to tweets of researchers that discovered the 0day exploit, information on the timeline, and mitigations<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Huntress Labs Blog Post&#8221; url=&#8221;https:\/\/www.huntress.com\/blog\/microsoft-office-remote-code-execution-follina-msdt-bug&#8221; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2022\/06\/Screenshot-2022-06-13-at-09.39.03.png&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Explains the exploit in more detail<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Counter Measures&#8221; url=&#8221;https:\/\/twitter.com\/gentilkiwi\/status\/1531384447219781634&#8243; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2022\/06\/Screenshot-2022-06-13-at-09.45.35.png&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Recommended counter measures by Benjamin Deplhy<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Signatures Detecting Follina \/ CVE-2022-30190 Attacks<\/h1>\n<p>Check for matches with the following rules:<\/p>\n<h3>YARA<\/h3>\n<p>Rules shared in the public <a href=\"https:\/\/github.com\/Neo23x0\/signature-base\">signature-base<\/a> and used in <a href=\"https:\/\/www.nextron-systems.com\/thor\/\">THOR<\/a> and THOR Lite<\/p>\n<ul>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_Doc_RTF_OLE2Link_Jun22\">SUSP_Doc_RTF_OLE2Link_Jun22<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_Doc_RTF_OLE2Link_EMAIL_Jun22\">SUSP_Doc_RTF_OLE2Link_EMAIL_Jun22<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_DOC_RTF_ExternalResource_EMAIL_Jun22\">SUSP_DOC_RTF_ExternalResource_EMAIL_Jun22<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_Msdt_Artefact_Jun22_2\">SUSP_Msdt_Artefact_Jun22_2<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_LNK_Follina_Jun22\">SUSP_LNK_Follina_Jun22<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_PS1_Msdt_Execution_May22\">SUSP_PS1_Msdt_Execution_May22<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_Doc_WordXMLRels_May22\">SUSP_Doc_WordXMLRels_May22<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_Doc_RTF_ExternalResource_May22\">SUSP_Doc_RTF_ExternalResource_May22<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22\">EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22<\/a> (previously: <a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/MAL_Msdt_MSProtocolURI_May22\">MAL_Msdt_MSProtocolURI_May22<\/a>)<\/li>\n<\/ul>\n<p>Only available in THOR<\/p>\n<ul>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_PS1_Obfusc_Combo_Base64_CharacterConcatenation_May22\">SUSP_PS1_Obfusc_Combo_Base64_CharacterConcatenation_May22<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_PS1_Nested_InvokeExpression_May22\">SUSP_PS1_Nested_InvokeExpression_May22<\/a><\/li>\n<li>SUSP_Office_Cloaked_MHT_Moniker_Jun22 (uses external vars; not in Valhalla)<\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_MAL_MalDoc_TemplateInjection_Jun22\">EXPL_MAL_MalDoc_TemplateInjection_Jun22<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_Encoded_Follina_CVE_2022_30190_Payloads_Jun22\">SUSP_Encoded_Follina_CVE_2022_30190_Payloads_Jun22<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_EXPL_Follina_CVE_2022_30190_Jun22_1\">SUSP_EXPL_Follina_CVE_2022_30190_Jun22_1<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_EXPL_Follina_CVE_2022_30190_Jun22_2\">SUSP_EXPL_Follina_CVE_2022_30190_Jun22_2<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Encoded_CVE_2022_30190_Payloads_Jun22_1\">EXPL_Encoded_CVE_2022_30190_Payloads_Jun22_1<\/a><\/li>\n<\/ul>\n<h3>Sigma<\/h3>\n<p>Public Sigma rules used in <a href=\"https:\/\/www.nextron-systems.com\/aurora\/\">Aurora<\/a>, <a href=\"https:\/\/www.nextron-systems.com\/thor\/\">THOR<\/a> and Aurora Lite<\/p>\n<ul>\n<li>Sdiagnhost Calling Suspicious Child Process &#8211; <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/process_creation\/proc_creation_win_sdiagnhost_susp_child.yml\">f3d39c45-de1a-4486-a687-ab126124f744<\/a><\/li>\n<li>New Lolbin Process by Office Applications &#8211;\u00a0<a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/process_creation\/proc_creation_win_lolbins_by_office_applications.yml\">23daeb52-e6eb-493c-8607-c4f0246cb7d8<\/a><\/li>\n<li>MSDT Executed with Suspicious Parent &#8211; <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/process_creation\/proc_creation_win_msdt_susp_parent.yml\">7a74da6b-ea76-47db-92cc-874ad90df734<\/a><\/li>\n<li>Execute Arbitrary Commands Using MSDT.EXE &#8211; <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/process_creation\/proc_creation_win_msdt.yml\">258fc8ce-8352-443a-9120-8a11e4857fa5<\/a><\/li>\n<li>Microsoft Outlook Product Spawning Windows Shell &#8211; <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/process_creation\/proc_creation_win_outlook_shell.yml\">208748f7-881d-47ac-a29c-07ea84bf691d<\/a><\/li>\n<\/ul>\n<p>Private Sigma rules only available in Aurora<\/p>\n<ul>\n<li>Sdiagnhost Loading System.Management.Automation.dll &#8211; 1a4a0e9c-e47d-492c-800f-545f83fac88a<\/li>\n<li>Sdiagnhost Calling Suspicious Descendant Process &#8211; 8655fa4b-e956-4ed4-b20d-151dfd8c802d<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Follina 0day vulnerability (CVE-2022-30190) in Microsoft Windows is actively exploited in-the-wild and highly critical. This blog posts lists some important web resources and the signatures that detect exploitation attempts.Kevin&#8217;s post contains links to tweets of researchers that discovered the 0day exploit, information on the timeline, and mitigationsExplains the exploit in more detailRecommended counter measures by Benjamin DeplhySignatures Detecting Follina \/ CVE-2022-30190 Attacks Check for matches with the following rules: YARA Rules shared in the public signature-base and used in THOR and THOR Lite SUSP_Doc_RTF_OLE2Link_Jun22 SUSP_Doc_RTF_OLE2Link_EMAIL_Jun22 SUSP_DOC_RTF_ExternalResource_EMAIL_Jun22 SUSP_Msdt_Artefact_Jun22_2 SUSP_LNK_Follina_Jun22 SUSP_PS1_Msdt_Execution_May22 SUSP_Doc_WordXMLRels_May22 SUSP_Doc_RTF_ExternalResource_May22 EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 (previously: MAL_Msdt_MSProtocolURI_May22) Only available in THOR SUSP_PS1_Obfusc_Combo_Base64_CharacterConcatenation_May22 SUSP_PS1_Nested_InvokeExpression_May22 SUSP_Office_Cloaked_MHT_Moniker_Jun22 (uses external vars; not in Valhalla) EXPL_MAL_MalDoc_TemplateInjection_Jun22 SUSP_Encoded_Follina_CVE_2022_30190_Payloads_Jun22 SUSP_EXPL_Follina_CVE_2022_30190_Jun22_1 SUSP_EXPL_Follina_CVE_2022_30190_Jun22_2 EXPL_Encoded_CVE_2022_30190_Payloads_Jun22_1 Sigma Public Sigma rules used in Aurora, THOR and Aurora Lite Sdiagnhost Calling Suspicious Child Process &#8211; f3d39c45-de1a-4486-a687-ab126124f744 New Lolbin Process by Office Applications &#8211;\u00a023daeb52-e6eb-493c-8607-c4f0246cb7d8 MSDT Executed with Suspicious Parent &#8211; 7a74da6b-ea76-47db-92cc-874ad90df734 Execute Arbitrary Commands Using MSDT.EXE &#8211; 258fc8ce-8352-443a-9120-8a11e4857fa5 Microsoft Outlook Product Spawning Windows Shell &#8211; 208748f7-881d-47ac-a29c-07ea84bf691d Private Sigma rules only available in Aurora Sdiagnhost Loading System.Management.Automation.dll &#8211; 1a4a0e9c-e47d-492c-800f-545f83fac88a Sdiagnhost Calling Suspicious Descendant Process &#8211; 8655fa4b-e956-4ed4-b20d-151dfd8c802d<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>The Log4Shell vulnerability (CVE-2021-44228) in log4j is actively exploited in-the-wild and highly critical. This blog posts lists some important web resources and the signatures that detect exploitation attempts.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_blurb title=\"Explanation of the Vulnerability\" url=\"https:\/\/www.lunasec.io\/docs\/blog\/log4j-zero-day\/\" url_new_window=\"on\" image=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-12.12.53.png\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>LunaSec reported first on the vulnerability.<\/p><p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_blurb title=\"Canary-based Vulnerability Detection\" url=\"https:\/\/twitter.com\/cyb3rops\/status\/1469405846010572816\" url_new_window=\"on\" image=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-11.45.25.png\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>Use this method to detect vulnerable applications and services in your organisation.<\/p><p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_blurb title=\"Grep \/ ZGrep Detection Ideas\" url=\"https:\/\/gist.github.com\/Neo23x0\/e4c8b03ff8cdf1fa63b7d15db6e3860b\" url_new_window=\"on\" image=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-11.53.40.png\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>Different detection patterns and idea to detect exploitation attempts in log files using grep and zgrep.<\/p><p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_blurb title=\"Log4Shell Detector Python Script\" url=\"https:\/\/github.com\/Neo23x0\/log4shell-detector\" url_new_window=\"on\" image=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/screen1.png\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>A python script that can be used to detect even the most obfuscated versions of the malicious payload.<\/p><p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_blurb title=\"List of Advisories by Vendors\" url=\"https:\/\/gist.github.com\/SwitHak\/b66db3a06c2955a9cb71a8718970c592\" url_new_window=\"on\" image=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-11.50.10.png\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>Big collection of advisories and statements by different vendors that use JAVA and log4j.<\/p><p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_blurb title=\"List of Vulnerable Software with PoCs\" url=\"https:\/\/github.com\/YfryTchsGD\/Log4jAttackSurface\" url_new_window=\"on\" image=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-13-at-11.38.45.png\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>Incomplete list of software products that have proven to be vulnerable.<\/p><p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_blurb title=\"Log4Shell Vulnerability Scanner (Local Files)\" url=\"https:\/\/github.com\/hillu\/local-log4j-vuln-scanner\" url_new_window=\"on\" image=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-17.16.33.png\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>Scans the file system of application servers for vulnerable versions of the log4j module.<\/p><p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_blurb title=\"Fenrir Log4Shell Release\" url=\"https:\/\/github.com\/Neo23x0\/Fenrir\/releases\" url_new_window=\"on\" image=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-13-at-13.29.51.png\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>A bash based IOC scanner that can be used on any Linux\/Unix system to detect traces of the attack and vulnerable log4j versions.<\/p><p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.14.2\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p><h1>Signatures Detecting Log4Shell Attacks<\/h1><p>Check for matches with the following rules:<\/p><h3>Exploitation<\/h3><p>YARA<\/p><ul><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Log4j_CVE_2021_44228_Dec21_Soft\">EXPL_Log4j_CVE_2021_44228_Dec21_Soft<\/a><\/li><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Log4j_CVE_2021_44228_Dec21_Hard\">EXPL_Log4j_CVE_2021_44228_Dec21_Hard<\/a><\/li><li><div><div><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Log4j_CVE_2021_44228_Dec21_OBFUSC\">EXPL_Log4j_CVE_2021_44228_Dec21_OBFUSC<\/a><\/div><\/div><\/li><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Log4j_CVE_2021_44228_JAVA_Exception_Dec21_1\">EXPL_Log4j_CVE_2021_44228_JAVA_Exception_Dec21_1<\/a><\/li><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_Base64_Encoded_Exploit_Indicators_Dec21\">SUSP_Base64_Encoded_Exploit_Indicators_Dec21<\/a><\/li><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_JDNIExploit_Indicators_Dec21\">SUSP_JDNIExploit_Indicators_Dec21<\/a><\/li><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_EXPL_OBFUSC_Dec21_1\">SUSP_EXPL_OBFUSC_Dec21_1<\/a><\/li><li><div><div><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_JNDI_Exploit_Patterns_Dec21_1\">EXPL_JNDI_Exploit_Patterns_Dec21_1<\/a><\/div><\/div><\/li><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Log4j_CallBackDomain_IOCs_Dec21_1\">EXPL_Log4j_CallBackDomain_IOCs_Dec21_1<\/a><\/li><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_EXPL_JAVA_Class_Dec21_1\"> SUSP_EXPL_JAVA_Class_Dec21_1 <\/a><\/li><\/ul><p>Sigma<\/p><ul><li><a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/web\/web_cve_2021_44228_log4j_fields.yml\">Log4j RCE CVE-2021-44228 in Fields<\/a><br \/>UUID: 9be472ed-893c-4ec0-94da-312d2765f654)<\/li><li><a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/web\/web_cve_2021_44228_log4j.yml\">Log4j RCE CVE-2021-44228 Generic<\/a><br \/>(UUID: 5ea8faa8-db8b-45be-89b0-151b84c82702)<\/li><li><a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/web\/web_jndi_exploit.yml\">JNDIExploit Kit Pattern<\/a><br \/>(UUID: 412d55bc-7737-4d25-9542-5b396867ce55)<\/li><\/ul><h3>Post-Exploitation<\/h3><p>Look for matches with the following rules that trigger on activity observer in-the-wild.<\/p><p>YARA<\/p><ul><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_LNX_SH_Cron_Wget_Apr21_1\">SUSP_LNX_SH_Cron_Wget_Apr21_1<\/a><\/li><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_LNX_Crontab_Wget_Oct21_1\">SUSP_LNX_Crontab_Wget_Oct21_1<\/a><\/li><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_ShellCommands_Oct19\">SUSP_ShellCommands_Oct19<\/a><\/li><li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/Pentest_FullShell_Commands\">Pentest_FullShell_Commands<\/a><\/li><\/ul><p>Sigma<\/p><ul><li><a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/linux\/builtin\/lnx_shell_susp_commands.yml\">Suspicious Activity in Shell Commands<\/a><br \/>(UUID: 2aa1440c-9ae9-4d92-84a7-a9e5f5e31695)<\/li><\/ul><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><h1>ASGARD Users<\/h1><p>It takes us few days to release new rules. The rules that we wrote over the weekend may not be available on Monday 13th of December. ASGARD users that want to use the signatures that are still in our QS, can activate the option for these signatures in \"Settings > Advanced > Show Signature SigDev Option\".<\/p><p>[\/et_pb_text][et_pb_image src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-17.08.08.png\" title_text=\"Screenshot 2021-12-12 at 17.08.08\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>After changing the setting, new scans show an additional option in the dropdown menu.<\/p><p>[\/et_pb_text][et_pb_image src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-17.08.53.png\" title_text=\"Screenshot 2021-12-12 at 17.08.53\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>Please contact our support in case of any questions.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.14.2\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><h1>THOR Users<\/h1><p>Users of our scanner THOR also need to use the signature version that's in development to get the newest signatures that detect log4j exploitation.<\/p><p>Retrieve that signature pack with:<\/p><p><strong>thor-util.exe update --sigdev<\/strong><\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","_et_gb_content_width":"","footnotes":""},"categories":[670,749,46,32],"tags":[650,676,675,674,62,59,101,5],"class_list":["post-13133","post","type-post","status-publish","format-standard","hentry","category-aurora","category-homepage","category-newsletter","category-thor","tag-aurora","tag-aurora-lite","tag-cve-2022-30190","tag-follina","tag-rules","tag-sigma","tag-signatures","tag-thor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Follina CVE-2022-30190 Detection with THOR and Aurora - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Follina CVE-2022-30190 Detection with THOR and Aurora\",\"datePublished\":\"2022-06-13T08:25:41+00:00\",\"dateModified\":\"2024-04-12T14:33:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/\"},\"wordCount\":653,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"Aurora\",\"Aurora Lite\",\"CVE-2022-30190\",\"Follina\",\"Rules\",\"Sigma\",\"signatures\",\"thor\"],\"articleSection\":[\"Aurora\",\"Homepage\",\"Newsletter\",\"THOR\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/\",\"name\":\"Follina CVE-2022-30190 Detection with THOR and Aurora - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2022-06-13T08:25:41+00:00\",\"dateModified\":\"2024-04-12T14:33:27+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Follina CVE-2022-30190 Detection with THOR and Aurora - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Follina CVE-2022-30190 Detection with THOR and Aurora","datePublished":"2022-06-13T08:25:41+00:00","dateModified":"2024-04-12T14:33:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/"},"wordCount":653,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["Aurora","Aurora Lite","CVE-2022-30190","Follina","Rules","Sigma","signatures","thor"],"articleSection":["Aurora","Homepage","Newsletter","THOR"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/","url":"https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/","name":"Follina CVE-2022-30190 Detection with THOR and Aurora - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2022-06-13T08:25:41+00:00","dateModified":"2024-04-12T14:33:27+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2022\/06\/13\/follina-detection-with-thor-and-aurora\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/13133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=13133"}],"version-history":[{"count":9,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/13133\/revisions"}],"predecessor-version":[{"id":13154,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/13133\/revisions\/13154"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=13133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=13133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=13133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}