ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool WIREFIRE

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: WIREFIRE

NamesWIREFIRE
CategoryMalware
TypeBackdoor
Description(Mandiant) WIREFIRE is a web shell written in Python that exists as trojanized logic to a component of the Connect Secure appliance. WIREFIRE supports downloading files to the compromised device and executing arbitrary commands. It contains logic inserted before authentication that responds to specific HTTP POST requests to /api/v1/cav/client/visits. If formdata entry “file” exists, the web shell saves the content to the device with a specified filename; if not, the web shell attempts to decode, decrypt, and zlib decompress any raw data existing after a GIF header to execute as a subprocess. The output of the executed process will be zlib compressed, AES-encrypted with the same key, and Base64-encoded before being sent back as JSON with a “message” field via an HTTP 200 OK.
Information<https://www.mandiant.com/resources/blog/suspected-apt-targets-ivanti-zero-day>

Last change to this tool card: 17 January 2024

Download this tool card in JSON format

All groups using tool WIREFIRE

ChangedNameCountryObserved

APT groups

 UNC5221, UTA0178[Unknown]2023 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]