MAR-251132.c1.v1 Exploitation of SharePoint Vulnerabilities

Notification

This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:CLEAR–Recipients may share this information without restriction. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.

Summary

Description

CISA received six files related to Microsoft SharePoint vulnerabilities: CVE-2025-49704 [CWE-94: Code Injection], CVE-2025-49706 [CWE-287: Improper Authentication], CVE-2025-53770 [CWE-502: Deserialization of Trusted Data], and CVE-2025-53771 [CWE-287: Improper Authentication]. According to Microsoft, cyber threat actors have chained CVE-2025-49706 (a network spoofing vulnerability) and CVE-2025-49704 (a remote code execution (RCE) vulnerability) in an exploit chain known as “ToolShell” to gain unauthorized access to on-premise SharePoint servers. Microsoft has not confirmed exploitation of CVE-2025-53771; however, CISA assesses exploitation is likely because it can be chained with CVE-2025-53770 to bypass previously disclosed vulnerabilities CVE-2025-49704 and 
CVE-2025-49706. 

The analysis includes two Base64 encoded .NET Dynamic-link Library (DLL) binaries and four Active Server Page Extended [ASPX] files. The decoded DLLs are designed to retrieve machine key settings within an ASP[.]NET application’s configuration and add the retrieved machine key values to the Hypertext Transfer Protocol (HTTP) response header. 

The first ASPX file is used to retrieve and output machine key information from an ASP[.]NET application’s configuration. The next ASPX file contains a command-line instruction used to execute a PowerShell command. The PowerShell command is designed to Base64 decode and install a malicious ASPX webshell on disk. The webshell is used to handle various web-related operations, including setting and retrieving HTTP cookies, command execution and uploading files. The remaining two ASPX webshells are used to execute a command using PowerShell on the server. 

CISA encourages organizations to use the indicators of compromise (IOCs) and detection signatures in this Malware Analysis Report to identify malware samples. For more information on these CVEs, see CISA Alert Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities.

Download the PDF version of this report:

For a downloadable copy of IOCs associated with this MAR, see:

For a downloadable copy of the SIGMA rules associated with this MAR, see version in .pdf or .yaml format: 

Submitted Files (6)

3461da3a2ddcced4a00f87dcd7650af48f97998a3ac9ca649d7ef3b7332bd997 (osvmhdfl.dll)

60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7 (stage3.txt)

92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514 (spinstall0.aspx)

9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7 (info3.aspx)

d0c4d6a4be0a65f8ca89e828a3bc810572fff3b3978ff0552a8868c69f83d170 (spinstallp.aspx)

d9c4dd5a8317d1d83b5cc3482e95602f721d58e3ba624d131a9472f927d33b00 (spinstallb.aspx)

Additional Files (2)

675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc (info3.aspx)

bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72 (bjcloiyq.dll)

Findings

60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7

Details
Name stage3.txt
Size 15893 bytes
Type ASCII text, with very long lines
MD5 921ac86b258fa9ea3da4c39462bad782
SHA1 b8662c8cc9e383b4a0ac980e0fd94941fe12c31d
SHA256 60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7
SHA512 6fd128a33e432d8fd5ea5dcf419a0b90f09648d7b4b95ceb6a5634fc01d8e0613d6d231bc038e2796f6a4d8fc277ebbea7b90ab773c0020dd2ad67149e52e4ff
ssdeep 384:AQG6NVJiZbXhKth3s0bA2rhvhundOXz5D:AQG6NVJmbX0h3zs21vsndO
Entropy 4.902435
Antivirus

No matches found.

YARA Rules
  • rule CISA_251132_01 : steals_authentication_credentials exfiltrates_data
    {
       meta:
           author = “CISA Code & Media Analysis”
           incident = “251132”
           date = “2025-07-21”
           last_modified = “20250724_721”
           actor = “n/a”
           family = “n/a”
           capabilities = “steals-authentication-credentials exfiltrates-data”
           malware_type = “unknown”
           tool_type = “unknown”
           description = “Detects Encoded .Net DLL samples”
           sha256_1 = “60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7”
       strings:
           $s0 = { 4E 62 32 52 6C 41 46 4E 30 63 6D 6C 75 5A 77 42 44 62 32 35 6A 59 58 51 }
           $s1 = { 41 45 41 55 77 42 30 41 48 49 41 61 51 42 75 41 47 63 41 52 67 42 70 41 }
           $s2 = { 59 58 52 76 63 6D 41 79 57 31 74 54 65 58 4E 30 5A 57 30 75 51 6E 6C 30 }
           $s3 = { 4A 7A 61 57 39 75 50 54 51 75 4D 43 34 77 4C 6A 41 73 49 45 4E 31 62 48 }
           $s4 = { 43 42 57 5A 58 4A 7A 61 57 39 75 50 54 51 75 4D 43 34 77 4C 6A 41 73 49 }
           $s5 = { 4D 54 6B 7A 4E 47 55 77 4F 44 6C 64 58 53 42 48 5A 58 52 46 62 6E 56 74 }
           $s6 = { 5A 58 4A 68 64 47 39 79 4B 43 6B 49 41 41 41 41 43 67 46 }
           $s7 = { 54 65 58 4E 30 5A 57 30 75 52 6E 56 75 59 32 41 79 57 31 }
           $s8 = { 74 54 65 58 4E 30 5A 57 30 75 51 32 39 73 62 47 56 6A 64 47 6C 76 62 6E 4D 75 52 }
       condition:
           all of them
    }
     
SIGMA Rule

                             ## CISA Code & Media Analysis ##

                           ############ README ###############
## Edit rules and queries as needed for your hunt and based on your environment.
## Ensure your EDR/SIEM instance has enough memory to run these AND/OR condition based queries. May take longer to run than conventional Sigma rule query. 
## Do not edit “logsource-product:” unless you are editing this rule to meet specific logsources/fields and know your environment.
## TLP GREEN + Please use local installation of Sigma to convert this rule.
## TLP CLEAR may convert rules using online converter of choice.
                           ###################################

title: Detects ToolShell CVE-2025-53770 Exploitation IOCs and Activity
incident: 251133.r1
tlp: CLEAR
id: aba8967f-6613-47a8-87d1-e5d7aae31e9b
status: test
description: Detects ToolShell CVE-2025-53770 Exploitation of SharePoint servers. Previous related CVEs are CVE-2025-49706 and CVE-2025-49704. CVE-2025-53770 is new and stealthy webshell called SharpyShell, that extracts and leaks cryptographic secrets from the SharePoint server using a simple GET request.
references:
   – https://www.cisa.gov/news-events/alerts/2025/07/20/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770
   – https://research.eye.security/sharepoint-under-siege/
   – https://x.com/codewhitesec/status/1944743478350557232/photo/1
   – 251132.r1
author: CISA Code & Media Analysis
date: 2025-07-21
modified: 2025-07-22
tags: 
   – cve.2025.53770
logsource:
   product: cma
detection:
   keywords:
       – ’92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514′        
       – ‘107.191.58.76’
       – ‘104.238.159.149’
       – ‘96.9.125.147’
       – ‘Mozilla/5.0+(Windows+NT+10.0;+Win64;+x64;+rv:120.0)+Gecko/20100101+Firefox/120.0 /_layouts/SignOut.aspx’
       – ‘-EncodedCommand JABiAGEAcwBlADYANABTAHQAcgBpAG4AZwAgAD0’
       – ‘TEMPLATELAYOUTSspinstall0.aspx’        
       – ‘/_layouts/15/ToolPane.aspx DisplayMode=Edit’
       – ‘/_layouts/15/spinstall0.aspx’
       – ‘spinstall’
       – ‘yoserial’

   keywords_1:
       – ‘POST’
       – ‘GET’
   keywords_2:
       – ‘/_layouts/15/ToolPane.aspx’
   keywords_3:
       – ‘DisplayMode=Edit’

   keywords_4:
       – ‘POST’
       – ‘GET’
       – ‘curl’              
   keywords_5:
       – ‘/_layouts/’
       – ‘layouts’  
   keywords_6:
       – ‘ToolPane.aspx’
       – ‘SignOut.aspx’
       – ‘spinstall’
       – ‘info3.aspx’

   keywords_7:
       – ‘HTTP’
   keywords_8:
       – ‘X-TXT-NET’

   keywords_9:
       – ‘.exe’
   keywords_10:
       – ‘-ap’
   keywords_11:
       – ‘SharePoint’
   keywords_12:
       – ‘8080’
   keywords_13:
       – ‘.dll’
   keywords_14:
       – ‘pipe’
   keywords_15:
       – ‘inetpub’
   keywords_16:
       – ‘config’

   keywords_17:
       – ‘ysoserial’
   keywords_18:
       – ‘ViewState’
   keywords_19:
       – ‘TypeConfuseDelegate’
   keywords_20:
       – ‘powershell’
   keywords_21:
       – ‘-EncodedCommand’

   keywords_22:
       – ‘BiAGEAcwBlADYANABTAHQAcgBpAG4AZwAgAD0’
       – ‘base64String=’
   keywords_23:
       – ‘BkAGUAYwBvAGQAZQBk’
       – ‘decoded’ 
   keywords_24:
       – ‘BGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBn’
       – ‘FromBase64String’
   keywords_25:
       – ‘cwBwAGkAbgBzAHQAYQBsAGwAMAAuAGEAcwBwAHg’
       – ‘AuAGEAcwBwAHg’
       – ‘spinstall0.aspx’
       – ‘.aspx’

   keywords_26:
       – ‘V3JpdGUoY2cuVm’
   keywords_27:
       – ‘bisifCIrY2cuRG’     
   keywords_28:
       – ‘mFsaW’

   condition: keywords or keywords_1 and keywords_2 and keywords_3 or keywords_4 and keywords_5 and keywords_6 or keywords_7 and keywords_8 or keywords_9 and keywords_10 and keywords_11 and keywords_12 and keywords_13 and keywords_14 and keywords_15 and keywords_16 or keywords_17 and keywords_18 and keywords_19 and keywords_20 and keywords_21 or keywords_22 and keywords_23 and keywords_24 and keywords_25 or keywords_26 and keywords_27 and keywords_28

falsepositives:
   – Rate of FP moderate with some strings.
   – Use this rule in an infected environment/logs.
   – Analyst may need to make adjustments to the query as required.
level: critical

ssdeep Matches

No matches found.

Relationships
60a37499f9… Contains bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72
Description

This artifact is a data file containing the Base64 encoded .NET DLL “bjcloiyq.dll” (bee94b93c1…).

Screenshots

Figure 1 – Screenshot of a snippet of the data file.

bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72

Details
Name bjcloiyq.dll
Size 10813 bytes
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 0e36ecda6fc4b5661f9a181984a53bb5
SHA1 3a438b239d8451b8e12e9cdd3c24d1240dd758c9
SHA256 bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72
SHA512 033f215fde36025a7ce434daddb70304d1e56f2dd2600e18a44d0af825a348fda388ee8fb1d684c2cdd006cdf042005bb26ab67cdf6c5eaac331650ea0ab9422
ssdeep 192:fJhh81DzgDZnSxPKgL6YBAxmrFMxmrFARmrF9RmrFj4U0QiKpM9aMg3AxmrFaxmi:xhh81Dz4pSxPKg2YBAxeFMxeFAReF9RL
Entropy 4.986214
Antivirus

No matches found.

YARA Rules
  • rule CISA_251132_02 : steals_authentication_credentials exfiltrates_data
    {
       meta:
           author = “CISA Code & Media Analysis”
           incident = “251132”
           date = “2025-07-21”
           last_modified = “20250724_721”
           actor = “n/a”
           family = “n/a”
           capabilities = “steals-authentication-credentials exfiltrates-data”
           malware_type = “unknown”
           tool_type = “unknown”
           description = “Detects .Net DLL payload samples”
           sha256_1 = “bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72”
       strings:
           $s0 = { 62 6A 63 6C 6F 69 79 71 2E 64 6C 6C }
           $s1 = { 4D 61 63 68 69 6E 65 4B 65 79 53 65 63 74 69 6F 6E 00 54 79 70 65 }
           $s2 = { 67 65 74 5F 56 61 6C 69 64 61 74 69 6F 6E 4B 65 79 }
           $s3 = { 67 65 74 5F 43 75 72 72 65 6E 74 00 48 74 74 70 52 65 73 70 6F 6E 73 65 }
           $s4 = { 67 65 74 5F 44 65 63 72 79 70 74 69 6F 6E 4B 65 79 }
           $s5 = { 67 65 74 5F 44 65 63 72 79 70 74 69 6F 6E }
           $s6 = { 53 79 73 74 65 6D 2E 57 65 62 2E 43 6F 6E 66 69 67 75 72 61 74 69 6F 6E }
       condition:
           all of them
    }
     
SIGMA Rule

   ## CISA Code & Media Analysis ##

                           ############ README ###############
## Edit rules and queries as needed for your hunt and based on your environment.
## Ensure your EDR/SIEM instance has enough memory to run these AND/OR condition based queries. May take longer to run than conventional Sigma rule query. 
## Do not edit “logsource-product:” unless you are editing this rule to meet specific logsources/fields and know your environment.
## TLP GREEN + Please use local installation of Sigma to convert this rule.
## TLP CLEAR may convert rules using online converter of choice.
                           ###################################

title: Detects CVE-2025-53770 IOCs and Activity Based on Submitted Files 251132.r2
incident: 251133.r2
tlp: CLEAR
id: a9327942-4cf7-48e4-9ea4-ad0b54db4bf7 
status: test
description: Detects ToolShell CVE-2025-53770 Exploitation of SharePoint servers. Detects IOCs and Activity Based on Submitted Files 251132.r2.
references:
   – 251132.r2
author: CISA Code & Media Analysis
date: 2025-07-23
modified: 2025-07-23
tags: 
   – cve.2025.53770
logsource:
   product: cma
detection:
   keywords_1:
       – ‘CVAUGFnZSBMYW5ndWFnZT0i’
       – ‘%@Page Language=”‘
   keywords_2:
       – ‘Jwb3dlcnNoZWxsLmV4ZS’
       – ‘powershell.exe’
   keywords_3:
       – ‘ItZW5j’
       – ‘-enc’
       – ‘LUVuY29kZWRDb21tYW5k’
       – ‘-EncodedCommand’
   keywords_4:
       – ‘0Jhc2U2NFN0cmluZy’
       – ‘Base64String’
   keywords_5:
       – ‘FJlcXVlc3QuRm9ybV’
       – ‘Request.Form’
   keywords_6:
       – ‘sicCJ’
       – ‘”p”‘

   keywords_7:
       – ‘*.exe’
   keywords_8:
       – ‘powershell*’
   keywords_9:
       – ‘-Command’
   keywords_10:
       – ‘Get-ChildItem’
       – ‘ForEach-Object’ 
   keywords_11:
       – ‘*TEMPLATELAYOUTS*’

   keywords_12:
       – ‘*.exe’
   keywords_13:
       – ‘certutil*’
   keywords_14:
       – ‘-decode’

   keywords_15:
       – ‘c:progra~1common~1micros~1webser~116templatelayoutsowaresources*’
       – ‘c:progra~1common~1micros~1webser~116templatelayouts*’
       – ‘templatelayouts*’
       – ‘templatelayoutsowa*’
   keywords_16:
       – ‘*.aspx’
       – ‘*.txt’

   keywords_17:
       – ‘*TEMPLATELAYOUTS*’
   keywords_18:
       – ‘spinstall*’
   keywords_19:
       – ‘*.aspx’

   condition: keywords_1 and keywords_2 and keywords_3 and keywords_4 and keywords_5 and keywords_6 or keywords_7 and keywords_8 and keywords_9 and keywords_10 and keywords_11 or keywords_12 and keywords_13 and keywords_14 or keywords_15 and keywords_16 or keywords_17 and keywords_18 and keywords_19

falsepositives:
   – Rate of FP low-moderate with some strings.
   – Use this rule in an infected environment/logs.
   – Analyst may need to make adjustments to the query as required.
level: critical

 

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2025-07-18 03:25:36+00:00
Import Hash dae02f32a21e03ce65412f6e56942daa
File Description  
Internal Name bjcloiyq.dll
Legal Copyright  
Original Filename bjcloiyq.dll
Product Version 0.0.0.0
PE Sections
MD5 Name Raw Size Entropy
93185bd1019bd277eef9815a17f1d074 header 512 2.540889
f7cb6b7293c5082045ba423cab20a758 .text 2048 4.519674
b73c90a61195ef7457efab9d898490d9 .rsrc 1024 2.172802
039675253cb6c73f5458348295ff2f28 .reloc 512 0.081539
Packers/Compilers/Cryptors
Microsoft Visual C# / Basic .NET
Relationships
bee94b93c1… Contained_Within 60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7
Description

This artifact is a 64-bit .NET DLL that contains a class named “E” (Figure 2) used to extract and concatenate machine key configuration settings within an ASP[.]NET application’s configuration. The file uses reflection to access the “MachineKeySection” from the “System.Web” assembly, which contains cryptographic keys used for validation and decryption in ASP[.]NET. The file uses reflection to get and invoke the “GetApplicationConfig” method of the “MachineKeySection” class to retrieve the “machineKey” configuration, which holds the actual key values. The file constructs a string containing the “ValidationKey”, “Validation”, “DecryptionKey”, “Decryption”, and “CompatibilityMode” properties of the “machineKeySection” and adds it as a custom header named “X-TXT-NET” to the HTTP response.

Screenshots

Figure 2 – Screenshot of the decompiled .NET assembly within a class named “E” used to extract the machine key configuration.

3461da3a2ddcced4a00f87dcd7650af48f97998a3ac9ca649d7ef3b7332bd997

Details
Name osvmhdfl.dll
Size 13373 bytes
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 40e609840ef3f7fea94d53998ec9f97f
SHA1 141af6bcefdcf6b627425b5b2e02342c081e8d36
SHA256 3461da3a2ddcced4a00f87dcd7650af48f97998a3ac9ca649d7ef3b7332bd997
SHA512 deaed6b7657cc17261ae72ebc0459f8a558baf7b724df04d8821c7a5355e037a05c991433e48d36a5967ae002459358678873240e252cdea4dcbcd89218ce5c2
ssdeep 384:cMQLQ5VU1DcZugg2YBAxeFMxeFAReF9ReFj4U0QiKy8Mg3AxeFaxeFAReFLxTYma:ElHh1gtX10u5A
Entropy 4.966672
Antivirus

No matches found.

YARA Rules
  • rule CISA_251132_08 : steals_authentication_credentials exfiltrates_data
    {
       meta:
           author = “CISA Code & Media Analysis”
           incident = “251132”
           date = “2025-07-21”
           last_modified = “20250725_712”
           actor = “n/a”
           family = “n/a”
           capabilities = “steals-authentication-credentials exfiltrates-data”
           malware_type = “unknown”
           tool_type = “unknown”
           description = “Detects .Net DLL payload samples”
           sha256_1 = “3461da3a2ddcced4a00f87dcd7650af48f97998a3ac9ca649d7ef3b7332bd997”
       strings:
           $s0 = { 47 65 74 4C 6F 67 69 63 61 6C 44 72 69 76 65 73 }
           $s1 = { 67 65 74 5F 4D 61 63 68 69 6E 65 4E 61 6D 65 }
           $s2 = { 67 65 74 5F 53 79 73 74 65 6D 44 69 72 65 63 74 6F 72 79 }
           $s3 = { 67 65 74 5F 43 75 72 72 65 6E 74 44 69 72 65 63 74 6F 72 79 }
           $s4 = { 67 65 74 5F 50 72 6F 63 65 73 73 6F 72 43 6F 75 6E 74 }
           $s5 = { 67 65 74 5F 55 73 65 72 4E 61 6D 65 }
           $s6 = { 67 65 74 5F 4F 53 56 65 72 73 69 6F 6E }
           $s7 = { 45 6E 76 69 72 6F 6E 6D 65 6E 74 56 61 72 69 61 62 6C 65 73 }
           $s8 = { 53 79 73 74 65 6D 2E 57 65 62 2E 43 6F 6E 66 69 67 75 72 61 74 69 6F 6E }
           $s9 = { 4D 61 63 68 69 6E 65 4B 65 79 53 65 63 74 69 6F 6E }
           $s10 = { 67 65 74 5F 56 61 6C 69 64 61 74 69 6F 6E 4B 65 79 }
           $s11 = { 67 65 74 5F 44 65 63 72 79 70 74 69 6F 6E 4B 65 79 }
           $s12 = { 67 65 74 5F 44 65 63 72 79 70 74 69 6F 6E }
           $s13 = { 67 65 74 5F 43 6F 6D 70 61 74 69 62 69 6C 69 74 79 4D 6F 64 65 }
       condition:
           all of them
    }
     
SIGMA Rule

 ## CISA Code & Media Analysis ##

                           ############ README ###############
## Edit rules and queries as needed for your hunt and based on your environment.
## Ensure your EDR/SIEM instance has enough memory to run these AND/OR condition based queries. May take longer to run than conventional Sigma rule query. 
## Do not edit “logsource-product:” unless you are editing this rule to meet specific logsources/fields and know your environment.
## TLP GREEN + Please use local installation of Sigma to convert this rule.
## TLP CLEAR may convert rules using online converter of choice.
                           ###################################

title: Detects CVE-2025-53770 CVE-2025-53771 Updated IOCs and Activity 
incident: 251133.r2
tlp: CLEAR
id: 32bba1a1-3900-4cf9-b379-3e71a63998a3
status: test
description: Detects ToolShell CVE-2025-53770 Exploitation of SharePoint servers. Detects updated IOCs and Activity. CVE-2025-49704, CVE-2025-49706, CVE-2025-53770 and CVE-2025-53771. TA – Linen Typhoon, Violet Typhoon, Storm-2603.
references:
   – https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/?msockid=3e14885e8c2b643323129d998d366597
   – https://socradar.io/toolshell-sharepoint-zero-day-cve-2025-53770/
   – https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/
   – https://github.com/kaizensecurity/CVE-2025-53770/blob/master/payload
   – https://www.picussecurity.com/resource/blog/cve-2025-53770-critical-unauthenticated-rce-in-microsoft-sharepoint
   – https://www.trendmicro.com/en_us/research/25/g/cve-2025-53770-and-cve-2025-53771-sharepoint-attacks.html
author: CISA Code & Media Analysis
date: 2025-07-23
modified: 2025-07-23
tags: 
   – cve.2025.49704 
   – cve.2025.49706
   – cve.2025.53770
   – cve.2025.53771 
logsource:
   product: cma
detection:
   keywords:
       – ’92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514′
       – ‘4a02a72aedc3356d8cb38f01f0e0b9f26ddc5ccb7c0f04a561337cf24aa84030’
       – ‘b39c14becb62aeb55df7fd55c814afbb0d659687d947d917512fe67973100b70’
       – ‘fa3a74a6c015c801f5341c02be2cbdfb301c6ed60633d49fc0bc723617741af7’
       – ‘390665bdd93a656f48c463bb6c11a4d45b7d5444bdd1d1f7a5879b0f6f9aac7e’
       – ’66af332ce5f93ce21d2fe408dffd49d4ae31e364d6802fff97d95ed593ff3082′
       – ‘7baf220eb89f2a216fcb2d0e9aa021b2a10324f0641caf8b7a9088e4e45bec95’
       – ‘8d3d3f3a17d233bc8562765e61f7314ca7a08130ac0fb153ffd091612920b0f2’
       – ‘30955794792a7ce045660bb1e1917eef36f1d5865891b8110bf982382b305b27’
       – ‘b336f936be13b3d01a8544ea3906193608022b40c28dd8f1f281e361c9b64e93’

       – ‘107.191.58.76’
       – ‘104.238.159.149’
       – ‘96.9.125.147’
       – ‘103.186.30.186’
       – ‘45.77.155.170’
       – ‘139.144.199.41’
       – ‘172.174.82.132’
       – ‘89.46.223.88’  
       – ‘45.77.155.170’    
       – ‘154.223.19.106’   
       – ‘185.197.248.131’  
       – ‘149.40.50.15’ 
       – ‘64.176.50.109’    
       – ‘149.28.124.70’   
       – ‘206.166.251.228’  
       – ‘95.179.158.42’ 
       – ‘86.48.9.38’
       – ‘128.199.240.182’  
       – ‘212.125.27.102’ 
       – ‘91.132.95.60’
       – ‘134.199.202.205’
       – ‘131.226.2.6’
       – ‘188.130.206.168’

       – ‘Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:120.0) Gecko/20100101 Firefox/120.0’
       – ‘Mozilla/5.0+(Windows+NT+10.0;+Win64;+x64;+rv:120.0)+Gecko/20100101+Firefox/120.0’
       – ‘c34718cbb4c6.ngrok-free.app/file.ps1’

   keywords_1:
       – ‘*TEMPLATELAYOUTS*’
   keywords_2:
       – ‘spinstall*’
       – ‘debug*’
       – ‘info*’
   keywords_3:
       – ‘*.aspx’
       – ‘*.js’

   keywords_4:
       – ‘POST’
       – ‘GET’
       – ‘curl’
   keywords_5:
       – ‘*/_layouts/*’
       – ‘*/layouts/*’
       – ‘*layouts*’
   keywords_6:
       – ‘*ToolPane.aspx’
       – ‘*DisplayMode’
       – ‘*SignOut.aspx’
       – ‘*spinstall*’
       – ‘VIEWSTATE’

   keywords_7:
       – ‘cmd.exe’
   keywords_8:
       – ‘powershell.exe’ 
   keywords_9:
       – ‘-EncodedCommand’
       – ‘-ec’
       – ‘-enc’
       – ‘VIEWSTATE’
       – ‘yoserial*’

   keywords_10:
       – ‘*TEMPLATELAYOUTS*’
   keywords_11:
       – ‘ChildItem’
   keywords_12:
       – ‘targetFile’
   keywords_13:
       – ‘NewLine’
   keywords_14:
       – ‘*web.config*’

   keywords_15:
       – ‘Ry2cuVmFsaWRhd’
       – ‘Validation’
   keywords_16:
       – ‘ifCIRy2cuQ29tc’
       – ‘Decryption’
   keywords_17:
       – ‘dGlvb’
       – ‘Key’
   keywords_18:
       – ‘UZtleVNlY3Rpb2’
       – ‘MachineKey’
   keywords_19:
       – ‘ShudWxsLC’
       – ‘Invoke’
   keywords_20:
       – ‘XIiIGxhbmd1Y’
       – ‘language’
   keywords_21:
       – ‘qZWN0WzBdKTsNC’
       – ‘new object’

   keywords_22:
       – ‘POST’
       – ‘powershell*’
       – ‘*layouts*’
   keywords_23:
       – ‘ToolPane.aspx’
       – ‘*spinstall*’

   condition: keywords or keywords_1 and keywords_2 and keywords_3 or keywords_4 and keywords_5 and keywords_6 or keywords_7 and keywords_8 and keywords_9 or keywords_10 and keywords_11 and keywords_12 and keywords_13 and keywords_14 or keywords_15 and keywords_16 and keywords_17 and keywords_18 and keywords_19 and keywords_20 and keywords_21 or keywords_22 and keywords_23

falsepositives:
   – Rate of FP low-moderate with some strings.
   – Use this rule in an infected environment/logs.
   – Analyst may need to make adjustments to the query as required.
level: critical

 

ssdeep Matches

No matches found.

PE Metadata
Compile Date 2025-07-22 08:33:22+00:00
Import Hash dae02f32a21e03ce65412f6e56942daa
File Description  
Internal Name osvmhdfl.dll
Legal Copyright  
Original Filename osvmhdfl.dll
Product Version 0.0.0.0
PE Sections
MD5 Name Raw Size Entropy
2a11da5809d47c180a7aa559605259b5 header 512 2.545281
531ff1038e010be3c55de9cf1f212b56 .text 4608 4.532967
ef6793ef1a2f938cddc65b439e44ea07 .rsrc 1024 2.170401
403090c0870bb56c921d82a159dca5a3 .reloc 512 0.057257
Packers/Compilers/Cryptors
Microsoft Visual C# / Basic .NET
Description

This artifact is a 32-bit .NET DLL that contains a class named “E” (Figure 3) used to retrieve system and environment information, along with the machine key configuration settings (Figure 3). This class file is designed to iterate through and collect environment variables as well as retrieve and format .NET and system properties below: 

–Begin System Properties– 
Number of logical drives 
Drive letters 
Computer name 
Full path of the system directory 
Current directory 
Processor count 
System uptime (milliseconds since start) 
Username 
Operating system version 
.NET version 
–End System Properties– 

The file uses reflection to access the “MachineKeySection” from the “System.Web” assembly, which contains cryptographic keys used for validation and decryption in ASP[.]NET. The file uses reflection to invoke the “GetApplicationConfig” method of the “MachineKeySection” class to retrieve the “machineKey” configuration, which holds the actual key values. The file constructs a string containing the “ValidationKey”, “Validation”, “DecryptionKey”, “Decryption”, and “CompatibilityMode” properties of the “machineKeySection”. The gathered information and the “MachineKeySection” details are formatted into a string before written to the HTTP response (current.Response object).

Screenshots

Figure 3 – Screenshot of the decompiled .NET assembly that contains a class named “E” used to retrieve and display system and environment information, along with the machine key configuration settings.

92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514

Tags

webshell

Details
Name spinstall0.aspx
Size 756 bytes
Type HTML document, ASCII text, with CRLF line terminators
MD5 02b4571470d83163d103112f07f1c434
SHA1 f5b60a8ead96703080e73a1f79c3e70ff44df271
SHA256 92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514
SHA512 2e6799393458d42acd4586c9792c24edf10b5e4aa761419758fec8da6670197c0e7c21e46dab224673818146ea4811446b4fbeaeed581e98f2add0980eb9d47d
ssdeep 12:iWVx8OaBngupDLI4MKisEKFhbCT5a05MQ+SuEKd2Eswl1HwAbPYMv:5VxWBnrE4JtbCT5f5exB1tbPYMv
Entropy 5.313146
Antivirus

No matches found.

YARA Rules
  • rule CISA_251132_03 : steals_authentication_credentials exfiltrates_data
    {
       meta:
           author = “CISA Code & Media Analysis”
           incident = “251132”
           date = “2025-07-21”
           last_modified = “20250724_721”
           actor = “n/a”
           family = “n/a”
           capabilities = “steals-authentication-credentials exfiltrates-data”
           malware_type = “unknown”
           tool_type = “unknown”
           description = “Detects aspx payload samples”
           sha256_1 = “92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514”
       strings:
           $s0 = { 4C 6F 61 64 28 22 53 79 73 74 65 6D 2E 57 65 62 }
           $s1 = { 43 6F 6E 66 69 67 75 72 61 74 69 6F 6E 2E 4D 61 63 68 69 6E 65 4B 65 79 53 65 63 74 69 6F 6E }
           $s2 = { 52 65 73 70 6F 6E 73 65 2E 57 72 69 74 65 }
           $s3 = { 63 67 2E 56 61 6C 69 64 61 74 69 6F 6E 4B 65 79 2B 22 7C 22 }
           $s4 = { 2B 63 67 2E 56 61 6C 69 64 61 74 69 6F 6E 2B }
           $s5 = { 2B 63 67 2E 44 65 63 72 79 70 74 69 6F 6E 4B 65 79 2B }
           $s6 = { 2B 63 67 2E 44 65 63 72 79 70 74 69 6F 6E 2B }
           $s7 = { 2B 63 67 2E 43 6F 6D 70 61 74 69 62 69 6C 69 74 79 4D 6F 64 65 }
       condition:
           all of them
    }
     
SIGMA Rule

No associated rule.

ssdeep Matches

No matches found.

Description

This artifact is a malicious ASPX file used to retrieve and output machine key information from the “MachineKeySection” of the System[.]Web[.]Configuration namespace (Figure 4). This file uses reflection to dynamically load the “System.Web” assembly and access the “MachineKeySection” class within “System.Web.Configuration”. The file invokes “GetApplicationConfig” to retrieve the “MachineKeySection” object and writes its properties including, ValidationKey, Validation, DecryptionKey, Decryption, and CompatibilityMode to the HTTP response using the “Response.Write()” method.

Screenshots

Figure 4 – Screenshot of the contents of the ASPX file used to extract configuration information from the machine key section of a web application’s Web.config file.

9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7

Tags

dropper

Details
Name info3.aspx
Size 5026 bytes
Type ASCII text, with very long lines, with no line terminators
MD5 1f5c8df6bd296ebf68acda951a004a5b
SHA1 d80722b335806cb74ee27af385abc6c9b018e133
SHA256 9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7
SHA512 54a82a9d9747f872f21f20ac4acea25218ed38a61fd9c611fb858f3f0c2941d4bf7ed35bf93fc0432aa3ac5a891277754a4a9468ae03cf31ca11281a589bc224
ssdeep 96:orFTPkPoXHIBvUr7F13mw3UhoQgW0970Eq90WtPKLiOKMT:orVPkPRBvaJ13r3eA709JPKGOKMT
Entropy 5.515141
Antivirus

No matches found.

YARA Rules
  • rule CISA_251132_04 : dropper installs_other_components
    {
       meta:
           author = “CISA Code & Media Analysis”
           incident = “251132”
           date = “2025-07-21”
           last_modified = “20250724_721”
           actor = “n/a”
           family = “n/a”
           capabilities = “installs-other-components”
           malware_type = “dropper”
           tool_type = “unknown”
           description = “Detects Base64 encoded PowerShell dropper samples”
           sha256_1 = “9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7”
       strings:
           $s0 = { 63 6D 64 2E 65 78 65 5C 22 20 2F 63 20 70 6F 77 65 72 73 68 65 6C 6C 20 2D 43 6F 6D 6D 61 6E 64 }
           $s1 = { 46 72 6F 6D 42 61 73 65 36 34 53 74 72 69 6E 67 }
           $s2 = { 4F 75 74 2D 46 69 6C 65 20 2D 46 69 6C 65 50 61 74 68 }
           $s3 = { 69 6E 66 6F 33 2E 61 73 70 78 }
           $s4 = { 2D 45 6E 63 6F 64 69 6E 67 20 55 54 46 38 }
       condition:
           all of them
    }
     
SIGMA Rule

No associated rule.

ssdeep Matches

No matches found.

Relationships
9340bf7378… Contains 675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc
Description

This artifact contains command-line instruction used to execute a PowerShell command (Figure 5). The PowerShell command decodes a Base64 encoded string into a Unicode Transformation Format-8 (UTF-8) string. The decoded content is then written to a file named “info3.aspx” (675a10e87c24….) located at c:progra~1\common~1micros~1webser~1l16templatelayouts. The output file is encoded using UTF8.

Screenshots

Figure 5 – Screenshot of the contents of the file containing command-line instruction used to execute a PowerShell command.

675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc

Tags

webshell

Details
Name info3.aspx
Size 3582 bytes
Type HTML document, ASCII text
MD5 7e09e837805c55dc5643cc21a87ff2a8
SHA1 27f154765054fbe0f5c234cd2c7829b847005d2a
SHA256 675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc
SHA512 83aa141fd090172fb9a22855c18f2aea8b37f663f0093edd675a7499186fe46b3f953edda9477ca8918cf2af82c8b723d07a6912a9d7aa62b26391d15a83c44d
ssdeep 48:H9zBW074shunsBjsm/ITETo1YWOW5uq+Z8QZ+ThJSCyiH12:HJBG2jsmI4lPeWiOo3SCyiV2
Entropy 4.789465
Antivirus

No matches found.

YARA Rules
  • rule CISA_251132_05 : webshell exfiltrates_data fingerprints_host
    {
       meta:
           author = “CISA Code & Media Analysis”
           incident = “251132”
           date = “2025-07-21”
           last_modified = “20250724_721”
           actor = “n/a”
           family = “n/a”
           capabilities = “exfiltrates-data fingerprints-host”
           malware_type = “webshell”
           tool_type = “unknown”
           description = “Detects aspx webshell samples”
           sha256_1 = “675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc”
       strings:
           $s0 = { 43 75 72 72 65 6E 74 2E 52 65 71 75 65 73 74 2E 46 6F 72 6D }
           $s1 = { 20 48 74 74 70 43 6F 6F 6B 69 65 20 6E 65 77 63 6F 6F 6B }
           $s2 = { 6E 65 77 63 6F 6F 6B 2E 45 78 70 69 72 65 73 20 }
           $s3 = { 52 65 73 70 6F 6E 73 65 2E 53 65 74 43 6F 6F 6B 69 65 28 6E 65 77 63 6F 6F 6B 29 }
           $s4 = { 43 6F 6D 70 75 74 65 48 61 73 68 }
           $s5 = { 44 26 46 72 69 32 6B 26 78 35 64 4D 49 53 54 6E 61 46 71 40 }
           $s6 = { 2A 68 75 5E 4D 23 6C 23 4C 72 6C 4E 6F 39 21 37 4B 4C 66 }
           $s7 = { 22 63 6D 22 20 2B 20 22 64 2E 65 22 20 2B 20 22 78 65 22 }
           $s8 = { 57 72 69 74 65 4C 69 6E 65 28 22 65 78 69 74 22 29 }
           $s9 = { 50 61 73 73 77 6F 72 64 }
           $s10 = { 43 6F 6D 6D 61 6E 64 }
           $s11 = { 55 70 6C 6F 61 64 }
           $s12 = { 74 79 70 65 3D 22 66 69 6C 65 22 }
           $s13 = { 74 79 70 65 3D 22 74 65 78 74 22 }
           
       condition:
           all of them
    }
     
SIGMA Rule

No associated rule.

ssdeep Matches

No matches found.

Relationships
675a10e87c… Contained_Within 9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7
Description

This artifact is a malicious ASP[.]NET web page (.aspx) that contains ASP[.]NET code embedded within an HTML structure. This file is a webshell installed by “info3.aspx” (9340bf73782….). The file handles various operations based on submitted form data or HTTP cookies. The file contains HTML code used to create forms. The forms allow the Threat Actor (TA) to enter a password and submit it using a “Login” button, enter a command into a text field, which can then be executed by clicking an “Execute” button, and upload files that includes two input fields: one for selecting a file (type=”file”) and another for text input (type=”text”) (Figure 7). 

The password form element is configured for POST method and the input field is named “nYOmkVTYH2”. If the HTML form with a password is received from the TA via an HTTP POST request, the file checks if the submission form field parameter named “nYOmkVTYH2” is not null or empty. If the parameter is present and not empty, the file sets an HTTP Cookie named “wY1DC6wH4u” with a value from the form field “nYOmkVTYH2” and sets the HTTP Cookie expiration date to four days from the current time. This cookie is then added to the response. The file verifies if the HTTP cookie exists in the current HTTP request. If the cookie exists, its value is concatenated with a long hard-coded string “D&Fri2k&x5dMISTnaFq@ssyKk@rEM!98KzSKWpL4Nc8NvaA9AKdJVOtfdJ45FvbyYHxTql6kkc%qOZevc*hu^M#l#LrlNo9!7KLf”. This combined string is then hashed using SHA512. The computed hash is converted to a Base64 string and compared against a predefined Base64 encoded string “9gYs0W/reXzR+KO6J/zP6naMU9AQwZCwhmXuPyGeY2VwMkxNGBZaJQAxGS6GvQZJLSAPk8LT0PgJVU1kQQJd2zW9w==” (Figure 6). This process determines whether a user or request is authorized. 

The command form element is configured for POST method and the input field is named “GTaRkhJ9wz”. If the HTML form with a command is received from the TA via an HTTP POST request, the file checks if the submission form field parameter named “GTaRkhJ9wz” is not null or empty. If the parameter is present and not empty, the file creates a new process to execute a command-line utility “cmd.exe”. The file redirects standard input, output, and error streams to capture the results of the executed command. The code writes the value of the “GTaRkhJ9wz” form parameter to the process’s standard input, executing the value as a command, and then writes “exit” to terminate the process (Figure 6). 

The file upload form element is configured for POST method and “enctype”=”multipart/form-data” to handle file uploads. It includes an input type=”file” for selecting a file (input field named “0z3H8H8ato”) and an input type=”text” for providing a destination path or filename ( input field named “7KAjlfecWF”). If the HTML form for file upload is received from the TA, the file checks if the submission form field parameter named “7KAjlfecWF” (intended to be the file path or name) is not null or empty. The file retrieves the uploaded file through the “0z3H8H8atO” input using “HttpContext.Current[.]Request[.]Files[“Oz3H8H8ato”]”. If the file exists and has content (content length is greater than zero), the file saves the uploaded file using the path provided in the “7KAjlfecWF” field. Upon successful upload, the “InnerText” of an element named “Result” is set to “uploaded”, indicating the file has been saved. If an error occurs during the process, the file captures the exception and displays its details in “Result.InnerText” (Figure 6). The file displays server-side generated output or messages to the TA.

Screenshots

Figure 6 – Screenshot of the code snippet designed for handling various web-related operations, including setting and retrieving HTTP cookies, calculating a SHA512 hash of a request form value, starting an external cmd process and capturing its output, handling uploaded files from a request.

Figure 7 – Screenshot of the form that allows the TA to enter a password and submit it using a “Login” button, to enter a command, which can then be executed by clicking an “Execute” button, and a field for uploading files, featuring a file input (type=”file”) and a text input, both submitted using an “Upload” button.

d9c4dd5a8317d1d83b5cc3482e95602f721d58e3ba624d131a9472f927d33b00

Tags

webshell

Details
Name spinstallb.aspx
Size 676 bytes
Type HTML document, ASCII text, with very long lines, with no line terminators
MD5 7d2f36f4cb82c75b83c210e655649b5d
SHA1 37d1d1913d758f7d71020c08d4a7dae3efe83b68
SHA256 d9c4dd5a8317d1d83b5cc3482e95602f721d58e3ba624d131a9472f927d33b00
SHA512 c52ab55753ae7fcfca46e869b805f3aa2d19c45e7526a61f79b20b8cd38eccc09f1b7a06acbd8d77e936f68fea9ee3bba7b7c42d6f93cf0c27a22cf7555d70d3
ssdeep 12:XrVcins8q/KF2C2DRbqtP6LoGM8AWLaWF1nM9OiDGiOVKeL84GYb:7Vds8q/KF2C2qPWHAW+WF9M9OiDm/b
Entropy 5.466082
Antivirus

No matches found.

YARA Rules
  • rule CISA_251132_06 : webshell fingerprints_host installs_other_components exfiltrates_data

    {
       meta:
           author = “CISA Code & Media Analysis”
           incident = “251132”
           date = “2025-07-21”
           last_modified = “20250725_712”
           actor = “n/a”
           family = “n/a”
           capabilities = “fingerprints-host installs-other-components exfiltrates-data”
           malware_type = “webshell”
           tool_type = “unknown”
           description = “Detects ASPX Webshell samples”
           sha256_1 = “d9c4dd5a8317d1d83b5cc3482e95602f721d58e3ba624d131a9472f927d33b00”
       strings:
           $s0 = { 3D 52 65 71 75 65 73 74 2E 46 6F 72 6D 5B 22 70 22 5D }
           $s1 = { 46 72 6F 6D 42 61 73 65 36 34 53 74 72 69 6E 67 28 65 6E 63 29 }
           $s2 = { 46 69 6C 65 4E 61 6D 65 3D 22 70 6F 77 65 72 73 68 65 6C 6C 2E 65 78 65 }
           $s3 = { 2D 45 6E 63 6F 64 65 64 43 6F 6D 6D 61 6E 64 }
           $s4 = { 2C 55 73 65 53 68 65 6C 6C 45 78 65 63 75 74 65 3D 66 61 6C 73 65 }
           $s5 = { 76 61 72 20 70 6C 3D 6E 65 77 20 62 79 74 65 }
           $s7 = { 36 38 39 30 31 61 33 39 34 61 37 36 64 63 35 30 36 34 66 62 61 39 36 62 38 36 }
           $s8 = { 32 36 36 35 65 65 35 39 36 62 31 61 31 34 36 38 62 64 63 36 }
           $s9 = { 31 38 31 35 37 64 37 63 63 61 30 31 33 30 39 30 32 65 }
       condition:
           all of them
    }
     

SIGMA Rule

No associated rule.

ssdeep Matches

No matches found.

Description

This artifact is a malicious ASPX file with a “Page_Load” event handler that constructs and executes a command using PowerShell on the server (Figure 8). Upon execution, the file takes a Base64-encoded string from a form parameter named “p”. The Base64 encoded string is decoded and Exclusively-OR (XOR) decrypted using a hard-coded XOR key “68901a394a76dc5064fba96b862665ee596b1a1468bdc618157d7cca0130902e”. The output of the XOR decrypted bytes are converted to a Unicode Transformation Format-8 (UTF-8) string and then Base64 encoded. The Base64 encoded string is passed as an argument to the PowerShell process “powershell.exe” using the “-EncodedCommand flag”. The file redirects the standard output of the PowerShell process and reads it into a variable “o”, which is then written back to the HTTP response.

Screenshots

Figure 8 – Screenshot of the contents of the ASPX file.

d0c4d6a4be0a65f8ca89e828a3bc810572fff3b3978ff0552a8868c69f83d170

Tags

webshell

Details
Name spinstallp.aspx
Size 706 bytes
Type HTML document, ASCII text, with very long lines, with no line terminators
MD5 7768feda9d79ef6f87410c02e981f066
SHA1 1b8432fcda4c12b64cdf4918adf7880aecf054ec
SHA256 d0c4d6a4be0a65f8ca89e828a3bc810572fff3b3978ff0552a8868c69f83d170
SHA512 c9ee5d32a59fad386570923df7950b562e1d4c000c7f4a20aebc214477f737815a401858a11d4e9139a80152afd5ddc8655ad804e71544e50f5a23cc9888eeba
ssdeep 12:XrVTO6LjxB5QnnsJz3kH+XWLaWF1n5OiD5RKF2UIdiOVKeLxnHdYT:7VTOYZWsJz3+WW+WF95OiDbKF2xP6T
Entropy 5.432916
Antivirus

No matches found.

YARA Rules
  • rule CISA_251132_07 : webshell fingerprints_host installs_other_components exfiltrates_data
    {
       meta:
           author = “CISA Code & Media Analysis”
           incident = “251132”
           date = “2025-07-21”
           last_modified = “20250725_712”
           actor = “n/a”
           family = “n/a”
           capabilities = “fingerprints-host installs-other-components exfiltrates-data”
           malware_type = “webshell”
           tool_type = “unknown”
           description = “Detects ASPX Webshell samples”
           sha256_1 = “d0c4d6a4be0a65f8ca89e828a3bc810572fff3b3978ff0552a8868c69f83d170”
       strings:
           $s0 = { 61 38 35 39 66 30 32 30 38 37 37 37 34 36 32 38 39 39 64 66 36 37 62 33 64 38 31 61 37 62 38 62 }
           $s1 = { 70 6F 77 65 72 73 68 65 6C 6C 2E 65 78 65 }
           $s2 = { 41 72 67 75 6D 65 6E 74 73 3D 22 2D 65 6E 63 20 22 }
           $s3 = { 52 65 71 75 65 73 74 2E 46 6F 72 6D 5B 22 70 22 5D }
           $s4 = { 55 73 65 53 68 65 6C 6C 45 78 65 63 75 74 65 3D 66 61 6C 73 65 }
           $s5 = { 52 65 64 69 72 65 63 74 53 74 61 6E 64 61 72 64 4F 75 74 70 75 74 3D 74 72 75 65 }
           $s6 = { 53 74 61 6E 64 61 72 64 4F 75 74 70 75 74 }
           $s7 = { 52 65 73 70 6F 6E 73 65 2E 57 72 69 74 65 }
           $s8 = { 47 65 74 42 79 74 65 73 28 6F 29 }
       condition:
           all of them
    }
     
SIGMA Rule

No associated rule.

ssdeep Matches

No matches found.

Description

This artifact is a malicious ASPX file with a “Page_Load” event handler that constructs and executes a command using PowerShell on the server (Figure 9). Upon execution, the file constructs a PowerShell command that decodes a Base64 string from the request form parameter “p”. The decoded string is decrypted using the XOR function with the hard-coded key “a859f0208777462899df67b3d81a7b8b”. The decrypted bytes (command) is executed using a PowerShell command. The standard output of the executed PowerShell command is converted to a UTF-8 string, then encrypted using the XOR function with the same hard-coded key. The encrypted bytes data is Base64 encoded before written to the HTTP response using “Response.Write”.

Screenshots

Figure 9 – Screenshot of the contents of the ASPX file.

Relationship Summary

60a37499f9… Contains bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72
bee94b93c1… Contained_Within 60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7
9340bf7378… Contains 675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc
675a10e87c… Contained_Within 9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7

Recommendations

CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization’s systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

  • Maintain up-to-date antivirus signatures and engines.
  • Keep operating system patches up-to-date.
  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
  • Enforce a strong password policy and implement regular password changes.
  • Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
  • Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
  • Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
  • Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
  • Scan all software downloaded from the Internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, “Guide to Malware Incident Prevention & Handling for Desktops and Laptops”.

Contact Information

CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://www.cisa.gov/forms/feedback

Document FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk.

Can I submit malware to CISA? Malware samples can be submitted via the methods below:

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA’s homepage at www.cisa.gov.

CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities

CISA published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files related to Microsoft SharePoint vulnerabilities:

Cyber threat actors have chained CVE-2025-49704 and CVE-2025-49706 (in an exploit chain publicly known as “ToolShell”) to gain unauthorized access to on-premises SharePoint servers. CISA analyzed six files including two Dynamic Link-Library (.DLL), one cryptographic key stealer, and three web shells. Cyber threat actors could leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint host system and exfiltrate data.  

CISA added CVE-2025-49704 and CVE-2025-49706 to its Known Exploited Vulnerabilities Catalog on July 22, 2025, and CVE-2025-53770 on July 20, 2025.

CISA encourages organizations to use the indicators of compromise (IOCs) and detection signatures in this MAR to identify malware.

Downloadable copy of IOCs associated with this malware:

MAR-251132.c1.v1.CLEAR_stix2
(JSON, 84.95 KB
)

Downloadable copies of the SIGMA rule associated with this malware:

CMA SIGMA 251132 1
(YAML, 4.22 KB
)
CMA SIGMA 251132 2
(YAML, 2.86 KB
)
CMA SIGMA 251132
(YAML, 5.55 KB
)

For more information on the malware files and YARA rules for detection, see MAR-251132.c1.v1 Exploitation of SharePoint Vulnerabilities.

Disclaimer:  

The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA. 

This Waterproof Sony Bluetooth Speaker Is on Sale for Just $65 Right Now

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

For a compact speaker that’s meant to be tossed into a bag or clipped onto your backpack, the Sony ULT Field 1 holds up better than you’d expect. It weighs about 1.4 pounds and comes with a carry strap, and it’s IP67-rated, meaning that dust, sand, and the occasional splash (or dunk) won’t ruin your playlist. At $64.99 for a refurbished unit on StackSocial, it’s 50% off the original price and still comes with a one-year warranty. It’s listed as “Grade A,” so cosmetic wear should be minimal to none.

The sound won’t be mind-blowing, but better than average for something this size. You’ll get solid audio with a hint of bass, especially when you hit the ULT button, Sony’s version of a bass boost that gives the music more punch when needed—just keep in mind that maxing out the volume and toggling the bass boost will drain the battery faster. Without the boost, you can expect up to 12 hours of playtime; at full volume with ULT on, that drops closer to 3 hours. Still, for backyard hangs, bike rides, or hotel-room DJ sessions, it holds its own.

You won’t find fancy touchscreen controls or a deep companion app, but there’s a basic control panel on the speaker for volume, power, pairing, and playback, and the app gives you a simple EQ and power settings. That said, Bluetooth 5.3, Google Fast Pair, and multipoint pairing are all supported, and it works with both iOS and Android. You can even connect two of these together for stereo playback, which helps if you want a bit more depth. All things considered, for $65, this Sony speaker is perfect for casual listening or bringing music on the go.

Jimmy Butler hilariously adds Draymond Green to Warriors’ ‘Batman’ universe

Jimmy Butler hilariously adds Draymond Green to Warriors’ ‘Batman’ universe originally appeared on NBC Sports Bay Area

Every superhero needs a sidekick. And a butler. And a multi-million-dollar military-grade supercar capable of causing mass destruction.

That’s what Warriors superstar Steph Curry has with his current ensemble of teammates.

Golden State’s veteran forward Jimmy Butler famously declared himself the “Robin” to Curry’s “Batman” after joining the Warriors midway through the 2024-25 NBA season, and then named guard Buddy Hield “Alfred,” Batman’s butler in the comic books.

Well, a new character just dropped.

Butler, who currently is traveling through China, declared in a social media post Wednesday that veteran forward Draymond Green has been cast as the Batmobile.

“Robin, he [going to] Robin the s–t out of this motherf–ker this year. Batman [going to] do his job. Draymond is uh … Draymond’s the Batmobile, you know. He’s like the one who’s got to get us to where we need to go. He do a little bit of everything: Shoot them thangs, ‘pew pew,’ somebody’s shooting at us, he rolling over [and] protecting us. You know what I’m saying?

“Golden State through, we’re on the way. We’re on the way, I’ll tell you that. Buddy was just here in China, too. I don’t know what the f–k for, but Buddy got some love out here.”

The Warriors’ “Batman” universe is expanding, but will it be enough to defeat The Joker and the other villains in the Western Conference?

Download and follow the Dubs Talk Podcast

Likely Jonathan Kuminga reunion with Warriors could create unwanted spectacle

Likely Jonathan Kuminga reunion with Warriors could create unwanted spectacle originally appeared on NBC Sports Bay Area

There is time for the Warriors and Jonathan Kuminga to find an arrangement that satisfies both, but the clock on their mutual desires is fast approaching JK’s jersey number: 00.

Their arranged marriage, distinguished more by turbulence than compatibility, lurched past its fourth anniversary last week. The growing belief around the NBA is they will wobble into Year 5, which would be the uneasiest by far.

On one side, the Warriors will be trying to harmonize a squad capable of squeezing one more drop of glory from the Stephen Curry era, which lifted the franchise to global icon status.

On the other side, Kuminga wants to prove he is a star and, therefore, worthy of a star’s contract, and his disposition will be monitored more closely than his statistics and impact.

The two sides have spent four seasons trying to make something of mismatched methods. Kuminga is a terrific scoring soloist, capable of getting to his spots and attacking the rim like a young Kawhi Leonard, but Golden State’s offense is designed to operate as an ensemble, with Curry as the conductor. That won’t change. Nor should it, as Curry continues to play at All-Star level.

Though a sign-and-trade deal remains a remote possibility, all indications are Kuminga will have to postpone his dreams of a life-changing payday.

“There will be some teams with money next year,” one Western Conference executive tells NBC Sports Bay Area. “Kuminga might have to just have to ride this out one more year and see what happens. It might come to fruition. Maybe he becomes more like ‘the guy’ there. There are people who believe he should play more, that he should do this more or do that more.

“But you still got Steph there. You got Jimmy (Butler) there.”

A fifth year of Warriors-Kuminga matrimony would invite all manner of vulture curiosity, as both parties will be under the brightest, and sometimes harshest, of lights. The Warriors are willing to move on, and Kuminga is eager to do the same. Living emotionally separate under the same roof, sharing the same locker room is bound to present, um, challenges.

The skills of Golden State coach Steve Kerr and the team’s veteran leaders – Draymond Green, Butler and Curry – will be tested. Can they orchestrate successful alchemy? Can Kuminga suppress his personal desires for the sake of the team? Can the Kerr-Kuminga coexistence maintain a peaceful, productive coexistence?

Kuminga wants to be a starter. That role was available last season, when he started the first three games at small forward, with Green at power forward and Andrew Wiggins at shooting guard. Butler now is entrenched at small forward since the February trade that sent Wiggins to Miami. The Warriors gained a playmaker but lost spacing. Kerr won’t tolerate the clogged spacing that would come with a Green-Kuminga-Butler frontcourt, so that option is out.

“He’s a (scoring) monster at the four,” a former NBA player-turned-analyst, referring to Kuminga, tells NBC Sports Bay Area. “But that’s Draymond position. I hate Draymond’s game. Hate his game. But his IQ makes him a Hall of Famer. It’s through the roof. And that team needs it.”

Green’s defense and court savvy were as much a part of Golden State’s 2014-15 resurrection as the gravity generated by Curry’s presence. Andrew Bogut and Green made the same impact on defense that Klay Thompson and Curry did on offense. The result was the best team in the NBA.

“They had a top-five offense, and a top-five defense,” the executive recalls. “And they were smart. The smartest team in the league. Back then, they were just smarter than you. With Jonathan, I think they’re questioning that. And they have Jimmy, Steph and Draymond, probably three of the smartest guys out there.”

Kuminga’s poor 3-point shooting (30.5 percent) makes him a misfit as a three in the Warriors’ system, but his greatest sins in the book of Kerr are mental errors. Those liabilities sometimes offset his assets. It’s one of the quickest ways in the league to fracture trust among coaches and teammates.

Is there any doubt that one glaring mistake by Kuminga will intensify the scrutiny and raise the temperature of the marriage?

At no point during these four seasons has Kuminga risen to the level of “distraction” to the greater goals of the Warriors. Even when displeased with circumstances, JK generally puts his head down and comes to work – even when he’s out of the rotation. Team leaders do what they can to keep him engaged.

But if the marriage continues into a fifth season, after a summer of unmet hopes for both parties, tranquility for all parties will be hard to achieve. A divorce is not a matter of if, but when.

Download and follow the 49ers Talk Podcast

Knicks assistant coach target Mike Weinar staying with Pacers; Chris Jent remains candidate

With the Knicks finding their top defensive coach in Brendan O’Connor, the focus goes to the offense, but a potential name has dropped out of the running.

Sources tell SNY’s Ian Begley that the Indiana Pacers’ Mike Weinar has removed himself from consideration for a top Knicks assistant job running the offense. Weinar made his decision on Tuesday to remain with the Eastern Conference champion Pacers to coach alongside head coach Rick Carlisle.

The news was first reported by The New York Post’s Stefan Bondy.

Weinar has been an assistant coach under Carlisle for seven seasons with the Dallas Mavericks and Pacers. The 41-year-old is under contract with the Pacers and would presumably be allowed to leave if for a promotion/raise.

A name that remains a candidate for the position is Chris Jent, who is currently under contract with the Charlotte Hornets. As Begley notes, Jent was on Brown’s staff with the Cleveland Cavaliers. Jent was an assistant coach with the 76ers, Magic, Cavaliers, Kings, Hawks, Lakers and Hornets from 2003 to 2025. He was the interim head coach for the Magic during the 2004-05 season, where he went 5-13. 

SiriusXM’s Frank Isola first reported Jent being a top candidate.

Brown will keep some coaches from Tom Thibodeau’s staff, including Darren ErmanMark BryantMaurice CheeksRick Brunson and Jordan Brink.

Aaron Judge strikes out twice in return from IL, Yankees shut out by Rangers for fifth straight loss

Aaron Judge returned to the New York Yankees on Tuesday from a 10-game stint on the injured list. 

His presence didn’t shift the fortunes of a faltering Yankees team. Judge struck out in his first two at-bats and went 0-for-3 at the plate against a sensational effort from Rangers starter Nathan Eovaldi. 

Texas broke a scoreless tie in the eighth inning to spoil a combined shutout by Yankees pitchers before closer Devin Williams gave up the only runs of the game. Newly acquired reliever Phil Maton held on in the top of the ninth for a 2-0 Texas win.

[Join or create a Yahoo Fantasy Football league for the 2025 NFL season]

The loss for the Yankees is their fifth straight and drops them to 7-11 since the All-Star break. It put them at further risk of falling out of the AL playoff picture at 60-54.

It added up to a microcosm of the problems that have plagued the Yankees, as they’ve posted an 18-29 record since the middle of June.

New York’s vaunted lineup has taken a step back during the slump. It started before Judge went on the injured list with a flexor strain in his right elbow. The Yankees hoped the two-time MVP could provide a spark amid a losing streak, but Eovaldi was in charge Tuesday.

Eovaldi worked Judge to a 1-2 count in the first inning in Judge’s first at-bat since June 25. Then he got Judge swinging with a splitter over the plate that dipped below the zone. 

Judge’s second at-bat brought more of the same. Eovaldi worked a 1-2 count with two fastballs and a sweeping curveball that induced a swing-and-miss for strike two. Judge then swung again at a third-strike splitter that dipped below his knees. 

Judge grounded out in his third at-bat, his final of the night. His teammates didn’t fare much better as Eovaldi pitched eight shutout innings with six strikeouts to lower his ERA to 1.38.

New York was still in the game late despite the struggles at the plate thanks to seven combined shutout innings on the mound, led by five from starter Will Warren. But Williams faltered for a second straight night, this time when he took the mound during a scoreless game in the eighth. 

Williams induced a first-out groundout from Marcus Semien. But he loaded the bases from there via an Adolis García double and two walks. Then Rowdy Tellez secured the win in a 10-pitch at-bat. 

After throwing a ninth-pitch ball for a full count, Williams offered an 83 mph changeup below the strike zone. Tellez dug deep and launched the ball into center field for a two-run single that proved to be the difference in the Texas win. 

Williams was credited with the loss a night after taking a blown save. On Monday, Williams allowed a game-tying solo home run to Joc Pederson in the bottom of the ninth. The Rangers went on to an 8-5 walk-off win in the 10th inning

A two-time All-Star closer for the Milwaukee Brewers, Williams had settled in midseason after a rough start to his first season with the Yankees. But his struggles have ensued, and Tuesday’s effort dropped his ERA to 5.44.

With Tuesday’s loss, the Yankees dropped to six games behind the first-place Blue Jays in the AL East and 2.5 games behind the second-place Red Sox. Their lead over the now 60-55 Rangers for the final AL wild-card spot dropped to a half-game. 

The Yankees and Rangers will close out their three-game series on Wednesday. 

Athletics C Shea Langeliers posts historic 3-HR game in first career appearance as leadoff hitter

Athletics catcher Shea Langeliers made his first career appearance as a leadoff hitter Tuesday, a change A’s manager Mark Kotsay said he hoped would get the team off to “a quick start, hopefully.” 

Mission accomplished.

Facing the Washington Nationals, Langeliers made all kinds of MLB history with a 5-for-6, three-homer performance in a 16-7 blowout win. It might have not even been close to the best performance by an A’s hitter in the past two weeks, but it was still enough to put him in rare company.

[Join or create a Yahoo Fantasy Football league for the 2025 NFL season]

Langeliers isn’t a conventional leadoff hitter as a power-focused catcher, but the A’s bumped him up from his usual cleanup spot to ensure his hot bat saw as many plate appearances as possible, per MLB.com

He struck first on the fourth pitch of the game against Nationals All-Star Mackenzie Gore, then struck again in the fifth and seventh inning. It was the second three-homer game of his career.

Langeliers had a chance at adding a fourth homer to the mix in the eighth inning, but settled for a double. The A’s also finished one batter short of giving him another chance in the ninth inning. Had he managed to homer once more, he would have joined teammate Nick Kurtz in accomplishing one of MLB’s rarest feats.

Kurtz posted possibly the best offensive performance in MLB history on July 25, going 6-for-6 with 4 homers, a double, 6 runs scored and 8 RBI.

Still, Langeliers reached some notable milestones on his own. He tied the record among catchers with 15 total bases in a single game. He became the fourth catcher to ever post multiple three-homer games. He became the second catcher to ever post a three-homer game from the leadoff spot. He is the first player to post three homers in first career game as a leadoff hitter. He is the fifth catcher to ever hit at least 20 homers in three of his first four MLB seasons.

All fun stuff, but those stats all tell you what you should already know. 

Langeliers was swinging the hottest bat in baseball before Tuesday and now leads all of MLB with a .925 slugging percentage over the past 15 days. After a solid start to his career, he is enjoying a breakout season in which he ranks behind only MLB home run leader Cal Raleigh in slugging percentage among catchers with at least 300 plate appearances.

A former ninth overall pick and top 100 prospect, the A’s acquired the 27-year-old backstop as part of the four-player return from the Matt Olson trade.

It’s been a rough season overall for the A’s at 49-65, but they definitely appear to have a nice group of young hitters in hand between Langeliers, Kurtz, shortstop Jacob Wilson and Tyler Soderstrom plus the late-blooming Brent Rooker, all of whom are under team control through at least 2028, the season they are scheduled to finally make their long-awaited move to Las Vegas.

Former Miami Heat security officer charged with stealing, selling millions of dollars of memorabilia

A former, long-time Miami Heat security officer appeared in court Tuesday, charged with transporting and transferring stolen goods in interstate commerce.

Following an investigation by the FBI’s Miami office, the U.S. Attorney’s Office, Southern District of Florida, charged Marcos Thomas Perez, 62, of Miami, with allegedly “stealing millions of dollars’ worth of Miami Heat game-worn jerseys and other valuable memorabilia, which he later sold to online brokers.” Perez is a 25-year veteran of the Miami Police Department who worked as a security officer for the Heat from 2016 to 2021 and then worked as an NBA security employee from 2022 until earlier this year. From the U.S. Attorney’s press release:

“Perez worked on the game-day security detail at the Kaseya Center, where he was among a limited number of trusted individuals with access to a secured equipment room. This equipment room stored hundreds of game-worn jerseys and other memorabilia that the organization intended to display in a future Miami Heat museum.”

Perez is accused of stealing more than 400 game-worn jerseys and other memorabilia, some of which he then sold online — about 100 of those items were sold, many over state lines, which added to the charge against him. What’s more, because he was trying to do this relatively low-key, he was often selling items for well below market value.

“As an example, Perez sold a game-worn LeBron James Miami Heat NBA Finals jersey for approximately $100,000. That same jersey later sold at a Sotheby’s auction for $3.7 million,” the U.S. Attorney’s office said in a press release.

Police executed a search warrant at Perez’s home on April 3 and recovered about 300 more items of memorabilia, which the Heat confirmed had come from their equipment room.

Cubs president Jed Hoyer admits Michael Soroka trade ‘not looking like a good bet’ after only 5 days

Occasionally, MLB executives will acknowledge that a deal didn’t go their way. Some moves just don’t work out, and they can admit that. What you almost never see, though, is an executive publicly regret a deal less than a week after making it.

Chicago Cubs president of baseball operations Jed Hoyer entered some new ground Tuesday, five days after acquiring starting pitcher Michael Soroka from the Washington Nationals at the MLB trade deadline. In return, the Nationals received prospects Christian Franklin and Ronny Cruz, the Cubs’ Nos. 13 and 14 prospects, according to MLB Pipeline.

Soroka made his Cubs debut Monday and lasted only two innings, exiting due to what was described as right shoulder discomfort. The next day, he was placed on the 15-day injured list with a shoulder strain.

[Join or create a Yahoo Fantasy Football league for the 2025 NFL season]

Hoyer spoke to the media in the wake of the move and admitted that the deal already looked much less attractive than before:

“We spent a lot of time on that. We knew the velocity was trending down. We obviously talked through that extensively. Given the market, given the asking price and given all those different things, we felt like it was a good bet to make. Ultimately, he came off the mound last night, and right now, it’s not looking like a good bet.

“That’s our job to make bets on these things. Doesn’t mean he’s not going to help us the rest of the year. We’re still waiting on the medical stuff.” 

As Hoyer pointed to, a major red flag was Soroka’s velocity. After sitting around 94 mph for the first three months of the season, his average velocity on four-seamers nose-dived in recent weeks, going from 93.7 mph on July 10 to 91.7 mph on July 18 to 90.9 mph on July 23. He averaged 90.8 mph before exiting his outing Monday.

A multi-tick velocity drop is a classic red flag for an underlying medical issue with a player, to say nothing of the basic drop in effectiveness. Soroka also has a considerable history of injuries, having missed the entire 2021 and 2022 season due to two tears of his Achilles tendon and much of 2023 with right elbow inflammation.

The Cubs still went through with the deal and parted with two prospects to do it. Hoyer was candid in his explanation of why the team did that while also reflecting the dehumanizing nature of MLB roster moves: 

“Earlier, he was sitting a much higher velocity. It was coming down, and we were trying to get to the bottom of what exactly that was. He had the MRI before that. That risk profile was known, and we decided, given the asking price and given the fact we felt he was a notch above the other guys we were talking about in terms of talent and development opportunities, we felt it was the right risk.

“We make bets on human beings, and sometimes they work out … We did a lot of due diligence, a ton of research, and if it doesn’t work out, that’s on me. That’s the job.”

As far as how Soroka’s pre-trade MRI looked, Hoyer acknowledged that “there are no clean MRIs” for veteran MLB pitchers, whose ligaments carry a lifetime of wear-and-tear and can give way without warning.

Chicago was likely attracted to Soroka’s peripherals much more than his surface stats, as his 4.87 ERA in D.C. hardly screamed deadline upgrade. Baseball Savant had his xERA (which combines strikeout, walk and batted ball data to determine what a player’s ERA should be) at 3.32 at the time of the trade, and it wasn’t a big leap to think he would perform better in front of the Cubs’ defense, which is good, than he did with the Nationals’ defense, which is bad.

Soroka’s way forward obviously now depends on how his new round of imaging looks. Even if it comes back fine, a move to the bullpen could be in his future between his performance on the mound and the injury risk.