Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Fortinet Discovers a New Obfuscated Web Shell. Analysis of UpdateChecker.aspx

Redazione RHC : 8 August 2025 07:24

The FortiGuard Labs team has published a detailed analysis of a heavily obfuscated web shell used to attack critical infrastructure in the Middle East. The research focuses on the UpdateChecker.aspx script running on the Microsoft IIS platform. It is implemented in C# as an ASPX page and hides its actual content behind a layer of encoded and encrypted code. All variable and class method names were randomly generated and then encoded in Unicode. All constants, including strings and numbers, were encrypted or scrambled.

During the analysis, the experts deobfuscated the code and converted random names to human-readable names. The main Page_Load function is launched upon receiving a command from the attacker. The shell is controlled via HTTP POST requests with the content specified as application/octet-stream. Otherwise, the request is rejected and an error page is returned.

The request body is first Base64-encoded and then decrypted in multiple stages. The first 16 bytes contain the encrypted key, which is decoded to produce 15 key bytes and one padding byte. This key is used to decrypt the rest of the command data. The web shell response is also formatted in JSON, then encrypted and re-encoded in Base64.

The script supports three main system management modules. The Base module allows you to get server information, the CommandShell module executes system commands in the specified working directory, and the FileManager module allows you to interact with files and directories, including creating, copying, moving, and deleting directory files, as well as editing metadata and viewing the disk list and the root web directory.

To illustrate this concept, Fortinet has developed a Python script that simulates the actions of an attacker to send commands to the web shell and display the responses. This allowed us to demonstrate the shell’s capabilities, including executing commands, processing files, and receiving various information from the server.

Analyzing UpdateChecker.aspx helped reveal the complex architecture of the web shell and show how attackers control the system stealthily and securely: the script stores the check in JSON format, making it easy to automatically send commands and receive responses.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli