alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2"; flow:established,to_server; content:"POST"; http_method; content:"Content-Key|3a 20|"; http_header; content:"|0d 0a|"; distance:8; within:2; http_header; content:"|00 2b 00|"; offset:1; depth:3; http_client_body; pcre:"/^[\x00-\x01]\x00.\x00[\x00-\x01]\x00.\x00.{4}\x01\x00.\x00{3}.{48}\x05\x00{3}/PR"; content:!"Referer|3a|"; http_header; pcre:"/^User-Agent\x3a\x20[^\r\n]+\r\nHost\x3a\x20[^\r\n]+\r\nAccept\x3a\x20[^\r\n]+\r\nContent-Type\x3a\x20application\x2foctet-stream\r\nContent-Encoding\x3a\x20binary\r\nContent-Key\x3a\x20[A-Z0-9]{8}\r\n/Hi"; metadata: former_category TROJAN; classtype:trojan-activity; sid:2024319; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2017_05_17, malware_family lokibot, updated_at 2017_05_17;)

Added 2017-08-07 21:19:40 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2"; flow:established,to_server; content:"POST"; http_method; content:"Content-Key|3a 20|"; http_header; content:"|0d 0a|"; distance:8; within:2; http_header; content:"|00 2b 00|"; offset:1; depth:3; http_client_body; pcre:"/^[\x00-\x01]\x00.\x00[\x00-\x01]\x00.\x00.{4}\x01\x00.\x00{3}.{48}\x05\x00{3}/PR"; content:!"Referer|3a|"; http_header; pcre:"/^User-Agent\x3a\x20[^\r\n]+\r\nHost\x3a\x20[^\r\n]+\r\nAccept\x3a\x20[^\r\n]+\r\nContent-Type\x3a\x20application\x2foctet-stream\r\nContent-Encoding\x3a\x20binary\r\nContent-Key\x3a\x20[A-Z0-9]{8}\r\n/Hi"; classtype:trojan-activity; sid:2024319; rev:2;)

Added 2017-05-17 17:20:28 UTC



This topic: Main > 2024319
Topic revision: r1 - 2017-08-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats