alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN HAWKBALL CnC? Sending System Information"; flow:established,to_server; content:"POST"; http_method; content:"/?e="; depth:4; http_uri; content:"&&t="; http_uri; distance:0; content:"&&k="; http_uri; distance:0; fast_pattern; content:"Mozilla/4.0 (compatible|3b 20|MSIE 8.0|3b 20|Windows NT 6.1|3b 20|Trident/4.0|3b 20|SLCC2|3b 20|.NET CLR 2.0.50727|3b 20|.NET CLR 3.5.30729|3b 20|.NET CLR 3.0.30729|3b 20|Media Center PC 6.0|3b 20|InfoPath.2)"; http_user_agent; content:"id="; http_cookie; depth:3; http_header_names; content:"|0d 0a|Content-Length|0d 0a|Cache-Control|0d 0a|Cookie|0d 0a|User-Agent|0d 0a|Host|0d 0a|Connection|0d 0a 0d 0a|"; depth:73; isdataat:!1,relative; reference:md5,d90e45fbf11b5bbdca945b24d155a4b2; reference:url,www.fireeye.com/blog/threat-research/2019/06/government-in-central-asia-targeted-with-hawkball-backdoor.html; classtype:trojan-activity; sid:2027441; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2019_06_06, updated_at 2019_06_06;)

Added 2019-06-07 18:25:30 UTC


Topic revision: r1 - 2019-06-07 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats