<stix:STIX_Package xmlns:FileObj="http://cybox.mitre.org/objects#FileObject-2" xmlns:acsc_au="http://www.cyber.gov.au" xmlns:coa="http://stix.mitre.org/CourseOfAction-1" xmlns:cybox="http://cybox.mitre.org/cybox-2" xmlns:indicator="http://stix.mitre.org/Indicator-2" xmlns:marking="http://data-marking.mitre.org/Marking-1" xmlns:stix="http://stix.mitre.org/stix-1" xmlns:stixCommon="http://stix.mitre.org/common-1" xmlns:stixVocabs="http://stix.mitre.org/default_vocabularies-1" xmlns:tlpMarking="http://data-marking.mitre.org/extensions/MarkingStructure#TLP-1" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:yara="http://stix.mitre.org/extensions/TestMechanism#YARA-1" id="acsc_au:package-24f6126c-3d3d-5631-faeb-ac4cacf018bd" timestamp="2021-07-09T07:47:42.149779+00:00" version="1.2"><stix:STIX_Header><stix:Title>"Exported Entities" block</stix:Title></stix:STIX_Header><stix:Observables cybox_major_version="2" cybox_minor_version="1" cybox_update_version="0"><cybox:Observable id="acsc_au:file-1198207"><cybox:Title>file:reg.jsp</cybox:Title><cybox:Description>file:reg.jsp</cybox:Description><cybox:Object><cybox:Properties xsi:type="FileObj:FileObjectType"><FileObj:File_Name>reg.jsp</FileObj:File_Name></cybox:Properties></cybox:Object></cybox:Observable><cybox:Observable id="acsc_au:file-1198210"><cybox:Title>file:cmd.jsp</cybox:Title><cybox:Description>file:cmd.jsp</cybox:Description><cybox:Object><cybox:Properties xsi:type="FileObj:FileObjectType"><FileObj:File_Name>cmd.jsp</FileObj:File_Name></cybox:Properties></cybox:Object></cybox:Observable><cybox:Observable id="acsc_au:file-1198208"><cybox:Title>file:404.jsp</cybox:Title><cybox:Description>file:404.jsp</cybox:Description><cybox:Object><cybox:Properties xsi:type="FileObj:FileObjectType"><FileObj:File_Name>404.jsp</FileObj:File_Name></cybox:Properties></cybox:Object></cybox:Observable><cybox:Observable id="acsc_au:file-1198209"><cybox:Title>file:401.jsp</cybox:Title><cybox:Description>file:401.jsp</cybox:Description><cybox:Object><cybox:Properties xsi:type="FileObj:FileObjectType"><FileObj:File_Name>401.jsp</FileObj:File_Name></cybox:Properties></cybox:Object></cybox:Observable></stix:Observables><stix:Indicators><stix:Indicator id="acsc_au:indicator-77587f0e-f764-4a33-873c-20eeea007413" timestamp="2021-07-09T07:30:43.358017+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule linux_RDS_socket_exploit_source
{
    strings:
        $x = "[*] Linux kernel &gt;= 2.6.30 RDS socket exploit"
        $ = "#define RECVPORT 5555"
        $ = "#define SENDPORT 6666"
        $ = "if(strncmp(ver.release, \"2.6.3\", 5))"
        $ = "s = socket(PF_RDS, SOCK_SEQPACKET, 0);"

    condition:
        filesize &lt; 10KB and ($x or 4 of them)
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-77591b6e-9da0-4a13-adb5-aaae77204b76" timestamp="2021-07-09T07:30:43.358017+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule webshell_401_jsp
{
    strings:
        $ = "cmd = request.getParameter(\"401-Authentication\");"
        $ = "cmd = (String)request.getHeader(\"401-Authentication-Failed\");"
        $ = "Process p = Runtime.getRuntime().exec(cmd,null,null);"
        
    condition:
        filesize &lt; 10KB and all of them
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-775b0b6b-546c-49eb-8e43-4e9323cb0fa3" timestamp="2021-07-09T07:32:00.210741+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule webshell_cmd_jsp
{
    strings:
        $ = "&lt;%@page import=\"java.io.*, java.util.*, javax.xml.bind.*, java.net.*\"%&gt;"
        $ = "String o,l,d;"
        $ = "if(d.indexOf(\"c=\")&gt;=0){"
        $ = "int b=d.indexOf(\"b=\");"
        $ = "int n=d.indexOf(\"n=\");"

    condition:
        filesize &lt; 10KB and 4 of them
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-775d34c2-8cd5-4a76-9f3d-b471693003f9" timestamp="2021-07-09T07:30:43.358017+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule neoregeorg_jsp
{
    strings:
        $ = "public static String b64en(byte[] data)"
        $ = "public static byte[] b64de(String str)"
        $ = "String rUrl = request.getHeader("
        $ = "out.write(\"&lt;!-- "

    condition:
        filesize &lt; 50KB and all of them
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-775fb23d-cd7e-4045-9215-042b951c4eaf" timestamp="2021-07-09T07:30:43.358017+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule linux_overlayfs_exploit_source
{
    strings:
        $ = "static char child_stack[1024*1024];"
        $ = "system(\"rm -rf /tmp/haxhax\");"
        $ = "if(s.st_mode == 0x89ed)"
        $ = "if (mount(\"overlay\", "
        $ = "if(unshare(CLONE_NEWUSER) != 0)"

    condition:
        filesize &lt; 20KB and all of them
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-776174ca-27bb-490e-9593-9c1f46ff4f22" timestamp="2021-07-09T07:30:43.358017+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule linux_dirtycow_exploit_source
{
    strings:
        $ = "####################### dirtyc0w.c #######################"
        $ = "$ gcc -pthread dirtyc0w.c -o dirtyc0w"
        $ = "\"usage: dirtyc0w target_file new_content\""
        $ = "c+=madvise(map,100,MADV_DONTNEED);"

    condition:
        filesize &lt; 5KB and 3 of them
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-77627530-413d-4484-816c-2d80882b2d43" timestamp="2021-07-09T07:35:44.440897+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule linux_priv_checker_py
{
    strings:
        $x = "[Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script"
        $ = "find_likely_exploits(sysinfo, devtools, pkgsandprocs, driveinfo)"
        $ = "enum_root_pkg_proc(pkgsandprocs, userinfo)"
        $ = "enum_user_history_files()"
        $ = "The following exploits are applicable to this kernel version"
        $ = "The following exploits are ranked higher in probability of success"

    condition:
        filesize &lt; 100KB and ($x or 4 of them)
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-7764554c-6ffc-43fe-b36c-2beb021d8c02" timestamp="2021-07-09T07:34:51.499400+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule linux_exploiter_suggester_pl
{
    strings:
        $ = "Linux Exploit Suggester $VERSION"
        $ = "Linux_Exploit_Suggester.pl - A local exploit suggester for linux"
        $ = "$ Local_Exploit_Checker [-h] [-k kernel]"
        $ = "print 'Searching among ' . scalar keys(%exploits) . \" exploits..."
        $ = "foreach my $kernel ( @{ $exploits{$key}{vuln} } ) {"

    condition:
        filesize &lt; 100KB and all of them
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-7766f245-f241-4f30-9928-c22f7f20f32a" timestamp="2021-07-09T07:34:42.149586+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule lin_enum_sh
{
    strings:
        $ = "Local Linux Enumeration &amp; Privilege Escalation Script"
        $ = "#A script to enumerate local information from a Linux host"
        $ = "Example: ./LinEnum.sh -k keyword -r report -e /tmp/ -t"
        $ = "format=$export/LinEnum-export-`date +\"%d-%m-%y\"`"

    condition:
        filesize &lt; 200KB and 3 of them
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-77681cf0-9724-4859-895e-2fc98fd4afc5" timestamp="2021-07-09T07:40:24.081974+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule mettle
{
    strings:
        $ = "-p, --persist [none|install|uninstall] manage persistence"
        $ = "/mettle/mettle/src/main.c"
        $ = "/mettle/src/c2_http.c"
        $ = "/mettle/src/mettle.c"
        $ = "Could multiplex, but not asked to!"
        $ = "Failed to start extension from file '%s'"
        $ = "MSF_LICENSE"
        $ = "Registering command %u, cb %p, arg %p"
        $ = "could not find handlers for channel type %s"
        $ = "invalid background setting '%s': %s"
        $ = "invalid debug level '%s': %s"
        $ = "mettlesploit!"
        $ = "no handler found for command id: %u"
        $ = "process_new: got %zd byte executable to run in memory"

    condition:
        uint32(0) == 0x464c457f and filesize &lt; 2MB and 8 of them
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-776a16db-4611-41ed-bf4c-7b01e162398a" timestamp="2021-07-09T07:40:24.081974+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule msf_reverse_tcp
{
    strings:
        $hex = { 10 48 89 d6 4d 31 c9 6a 22 41 5a b2 07 0f 05 48
                 85 c0 78 51 6a 0a 41 59 50 6a 29 58 99 6a 02 5f
                 6a 01 5e 0f 05 48 85 c0 78 3b 48 97 48 b9 02 00 }

    condition:
        uint32(0) == 0x464c457f and filesize &lt; 2KB and $hex 
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-7770dc3a-4f91-4c35-a332-408e91ed6488" timestamp="2021-07-09T07:44:50.793131+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Observable><cybox:Observable_Composition operator="OR"><cybox:Observable idref="acsc_au:file-1198207"></cybox:Observable><cybox:Observable idref="acsc_au:file-1198210"></cybox:Observable><cybox:Observable idref="acsc_au:file-1198208"></cybox:Observable><cybox:Observable idref="acsc_au:file-1198209"></cybox:Observable></cybox:Observable_Composition></indicator:Observable><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">Medium</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>Medium</stixCommon:Value></indicator:Confidence></stix:Indicator><stix:Indicator id="acsc_au:indicator-77738d06-e723-4d40-930c-02885fa5608d" timestamp="2021-07-09T07:47:42.149779+00:00" xsi:type="indicator:IndicatorType"><indicator:Title>Malicious Exploitation of CVE-2021-35464</indicator:Title><indicator:Type>Malware Artifacts</indicator:Type><indicator:Test_Mechanisms><indicator:Test_Mechanism xsi:type="yara:YaraTestMechanismType"><indicator:Efficacy><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Efficacy><yara:Rule>rule linux_CAP_SYS_ADMIN_to_root_exploit_source
{
    strings:
        $ = "// Skeleton Structures of the Kernel Structures we're going to spoof"
	    $ = "[*] This was a triumph... I'm making a note here, huge success."
        $ = "#define SYM_ADDRESS 0x4e4f4850"
        $ = "sock = socket(PF_PHONET, SOCK_DGRAM, 0);"
        $ = "const struct proto_ops_skel fake_proto_ops2 = {"
        $ = "proto = -((proto_tab - low_kern_sym) / sizeof(void *));"

    condition:
        filesize &lt; 50KB and 5 of them
}</yara:Rule></indicator:Test_Mechanism></indicator:Test_Mechanisms><indicator:Likely_Impact><stixCommon:Value xsi:type="stixVocabs:HighMediumLowVocab-1.0">High</stixCommon:Value></indicator:Likely_Impact><indicator:Suggested_COAs><indicator:Suggested_COA><stixCommon:Course_Of_Action idref="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44"></stixCommon:Course_Of_Action></indicator:Suggested_COA></indicator:Suggested_COAs><indicator:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></indicator:Handling><indicator:Confidence><stixCommon:Value>High</stixCommon:Value></indicator:Confidence></stix:Indicator></stix:Indicators><stix:Courses_Of_Action><stix:Course_Of_Action id="acsc_au:course-of-action-774f8c94-2726-4347-b290-c500571a9e44" timestamp="2021-07-09T07:11:52.584808+00:00" xsi:type="coa:CourseOfActionType"><coa:Title>Antivirus/Antimalware (M1049) - Monitor</coa:Title><coa:Type>Monitoring</coa:Type><coa:Description structuring_format="html">&lt;p&gt;Use signatures or heuristics to detect and monitor malicious software.&lt;/p&gt;&lt;p&gt;Additionally, use a centralised Security Information and Event Management (&lt;strong&gt;SIEM&lt;/strong&gt;) system to collate information from deployed security controls to identify devices that execute, host or create suspicious or malicious files.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;References: &lt;/p&gt;&lt;p&gt;https://attack.mitre.org/mitigations/M1049/ &lt;/p&gt;&lt;p&gt;https://www.cyber.gov.au/acsc/view-all-content/publications/strategies-mitigate-cyber-security-incidents-mitigation-details&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</coa:Description><coa:Objective><coa:Description>Identify activity and monitor the behaviour.</coa:Description><coa:Applicability_Confidence><stixCommon:Value>High</stixCommon:Value></coa:Applicability_Confidence></coa:Objective><coa:Information_Source><stixCommon:Description>Australian Cyber Security Centre</stixCommon:Description><stixCommon:Identity><stixCommon:Name>ACSC</stixCommon:Name></stixCommon:Identity></coa:Information_Source><coa:Handling><marking:Marking><marking:Marking_Structure color="WHITE" xsi:type="tlpMarking:TLPMarkingStructureType"></marking:Marking_Structure></marking:Marking></coa:Handling></stix:Course_Of_Action></stix:Courses_Of_Action></stix:STIX_Package>