Home
Attack
Dataset
Contact Us
Attack
2024 01
T1-24–01–S–N–CL
T2-24–01–S–N–CL
T3-24–01–S–N–CL
T4-24–01–S–E–M
T5-24–01–S–E–LM
T6-24–01–S–E–FH
T7-24–01–M–NE–CLM
T8-24–01–M–NE–CFHL
T9-24–01–M–NE–CLM
2024 02
T1-24–02–S–N–CIKM
T2-24–02–S–N–CL
T3-24–02–S–N–CL
T4-24-02-S-E-M
T5-24-02-S-E-DL
T6-24-02-S-E-DEGN
T7-24-02-M-NE-CDEGLN
T8-24-02-M-NE-CDL
T9-24-02-M-NE-CLH
Dataset
Contact Us
T9-24-02-M-NE-CLH
Apache2 HTTP Path Traversal RCE + Cl0p Ransomware
This attack is a combination of T3-24–02–S–N–CL and T4-24-02-S-E-M, and two logs are collected: pcap and log.
1. Target should have vulnerable Apache sever version with mods cgi or cgid feature enabled
2. Attacker used relative path to call Shell using /cgi-bin and to bypass previous patch, executed "." URL Encoding twice.
3. Downlaod and execute CI0p Ransomware by executing remote command
4. Executing encryption to internal files using CI0p Ransomware
CVE-2021-42013, caused by incomplete path of CVE-2021-41773, allows attcker to ransom by sending remote commands that download and execute Ransomware and encrypt internal files.
OS
IP
Software
Log collection
time
Program
runtime
Attacker
Windows 11
192.168.56.1
-
25 sec
100 sec
Victim
Ubuntu 22.04
192.168.56.107
Apache 2.4.50
Installing
python3 -m pip install -r requirements.txt
Using
python3 run.py
MITRE ATT&CK Framework
Attack Tactic
Reconnaissance
Resource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact
Logs
./log/2024_02_T9_{time}.pcap # YYmmdd_HHMMSS
./log/2024_02_T9_{time}.xml # YYmmdd_HHMMSS
References
[1]
NIST [CVE-2021-42013]
[2]
Apache HTTP Server [CVE-2021-41773 / CVE-2021-42013 [Apache HTTP Server]]
[3]
Github - Walnut Security Services Pvt. Ltd [CVE-2021-42013]
[4]
CYBERONE [Apache HTTP Server 보안 업데이트 권고]
[5]
WINS [[CVE-2021-42013] Apache Directory Traversal]
[6]
Kaspersky [What is cl0p ransomware?]
[7]
VirusTotal [09d6dab9b70a74f61c41eaa485b37de9a40c86b6d2eae7413db11b4e6a8256ef]
[8]
CTX [09d6dab9b70a74f61c41eaa485b37de9a40c86b6d2eae7413db11b4e6a8256ef]
[9]
MalwareBazaar [09d6dab9b70a74f61c41eaa485b37de9a40c86b6d2eae7413db11b4e6a8256ef]
[10]
Cl0p [Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide]
※ Click on the attack name to see a description and scenario for the attack
2024 02
T1-24–02–S–N–CIKM
T2-24–02–S–N–CL
T3-24–02–S–N–CL
T4-24-02-S-E-M
T5-24-02-S-E-DL
T6-24-02-S-E-DEGN
T7-24-02-M-NE-CDEGLN
T8-24-02-M-NE-CDL
T9-24-02-M-NE-CLH
Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.