alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Win32/Milum CnC?"; flow:established,to_server; content:"|0d 0a 0d 0a|md="; fast_pattern; content:"POST"; http_method; content:".php"; isdataat:!1,relative; http_uri; content:"md="; depth:3; http_client_body; content:"&nk="; distance:0; http_client_body; content:"&val="; distance:0; http_client_body; pcre:"/^(?:[A-Za-z0-9+/]{4})*(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=|[A-Za-z0-9+/]{4})$/PR"; http_content_type; content:"application/x-www-form-urlencoded"; depth:33; isdataat:!1,relative; metadata: former_category MALWARE; reference:md5,17b1a05fc367e52aada7bde07714666b; reference:url,securelist.com/wildpressure-targets-industrial-in-the-middle-east/96360/; classtype:trojan-activity; sid:2029739; rev:3; metadata:attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2020_03_24, performance_impact Low, updated_at 2020_03_25;)

Added 2020-03-25 19:12:51 UTC


Topic revision: r1 - 2020-03-25 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats