alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN APT28 Zebrocy/Zekapab Reporting to CnC? M3"; flow:established,to_server; content:"POST"; http_method; content:".php"; http_uri; content:"Mozilla|20|v5.1|20 28|Windows"; http_user_agent; depth:21; content:"regid="; http_client_body; depth:6; content:"%20FIXED,%20TOTAL|3a|%20"; http_client_body; distance:0; content:"%0AHost%20Name|3a|%20%20%20%20%20%20"; http_client_body; distance:0; content:"%0AOS%20Name|3a|%20%20%20%20%20"; http_client_body; fast_pattern; content:"%0AOS%20Version|3a|%20%20%20%20%20%20"; http_client_body; distance:0; threshold:type limit, count 1, seconds 30, track by_src; metadata: former_category TROJAN; reference:url,unit42.paloaltonetworks.com/dear-joohn-sofacy-groups-global-campaign/; classtype:trojan-activity; sid:2026762; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, tag APT28, signature_severity Major, created_at 2019_01_07, malware_family Zebrocy, malware_family Zekapab, performance_impact Low, updated_at 2019_01_07;)

Added 2019-01-07 18:53:18 UTC


Topic revision: r1 - 2019-01-07 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats