Detection Rules – AdvancedRouterScanner Campaign


Exploit Layer

Suspicious Access to Router CGI Endpoints

Sigma (Web Logs)
title: Suspicious Router CGI Access
logsource:
  category: webserver
detection:
  selection:
    uri_path|contains:
      - "/web_shell_cmd.gch"
      - "/apply.cgi"
      - "/boaform/admin/formLogin"
      - "/cgi-bin/config.cgi"
      - "/login.cgi"
      - "/setup.cgi"
      - "/system.cmd"
      - "/shell?command="
condition: selection
level: high

Credential Layer

Default Credential Brute Force

Sigma (Auth Logs)
title: Default Credential Brute Force
logsource:
  category: authentication
detection:
  selection:
    user|contains:
      - "admin"
      - "root"
      - "guest"
      - "operator"
    password|contains:
      - "admin"
      - "password"
      - "1234"
      - "changeme"
condition: selection
level: high

Execution Layer

Reverse Shell Establishment

Suricata IDS
alert tcp any any -> 107.189.4.201 3778 (msg:"Reverse Shell to C2"; sid:200001; rev:1;)

Persistence Layer

Dropped Files in /tmp

Sigma (File Monitoring)
title: Suspicious Dropped Files in /tmp
logsource:
  category: file
detection:
  selection:
    file.path|contains: "/tmp/bn"
condition: selection
level: medium

Exfiltration Layer

Payload Downloads

Sigma (Proxy Logs)
title: Payload Download from Known Hosts
logsource:
  category: proxy
detection:
  selection:
    dst_domain:
      - "bot.gribostress.pro"
    dst_ip:
      - "107.189.4.201"
condition: selection
level: high

Summary

These rules provide coverage across:

  • Exploit attempts (router CGI endpoints)
  • Credential brute forcing (default accounts)
  • Execution (reverse shell to known C2)
  • Persistence (dropped files in /tmp)
  • Exfiltration (payload downloads from malicious hosts)

License

Detection rules are licensed under Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).
Free to use in your environment, but not for commercial purposes.