alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M2"; flow:established,to_server; content:"POST"; http_method; content:"Content-Key|3a 20|"; http_header; content:"|0d 0a|"; distance:8; within:2; http_header; content:"|00 27 00|"; offset:1; depth:3; http_client_body; pcre:"/^[\x00-\x01]\x00.\x00{3}/PR"; content:!"Referer|3a|"; http_header; pcre:"/^User-Agent\x3a\x20[^\r\n]+\r\nHost\x3a\x20[^\r\n]+\r\nAccept\x3a\x20[^\r\n]+\r\nContent-Type\x3a\x20application\x2foctet-stream\r\nContent-Encoding\x3a\x20binary\r\nContent-Key\x3a\x20[A-Z0-9]{8}\r\n/Hi"; classtype:trojan-activity; sid:2024317; rev:2;)

Added 2017-05-17 17:20:28 UTC


Topic revision: r1 - 2017-05-17 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats