Rule Category

MALWARE-BACKDOOR -- Snort has detected suspicious communication traffic unrelated to commands, such as exfiltration of data from the infected machine, especially larger chunks of data.

Alert Message

MALWARE-BACKDOOR Win.Trojan.BumbleBee webshell access detected

Rule Explanation

This rule will look for patterns used in the malicious BumbleBee webshell when any access attempt to is detected in the local network. This webshell allows an attacker to control a remote windows server with the execution of commands and the upload and download of files.

What To Look For

This rule will alert when there's an attempt to access a malicious webshell called BumbleBee

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

None

Additional Links

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None

MITRE ATT&CK Framework

Tactic: Lateral Movement

Technique: Exploitation of Remote Services

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org