alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern; metadata: former_category MALWARE; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:4; metadata:created_at 2014_12_15, updated_at 2019_10_07;)

Added 2019-10-08 19:34:16 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern:only; metadata: former_category MALWARE; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:3; metadata:created_at 2014_12_15, updated_at 2014_12_15;)

Added 2019-09-19 19:26:11 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern:only; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:3; metadata:created_at 2014_12_15, updated_at 2014_12_15;)

Added 2018-09-13 19:50:05 UTC


Added 2018-09-13 17:59:26 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern:only; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:3; metadata:created_at 2014_12_15, updated_at 2014_12_15;)

Added 2017-08-07 21:14:19 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern:only; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:3;)

Added 2014-12-16 18:46:31 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; urilen:9; content:"POST"; http_method; content:"/file.php"; http_uri; content:"|20 28 20|compatible"; http_header; fast_pattern:only; content:"User-Agent|3a 20|Mozilla|2f|5.0|20 28 20|compatible|3b 20|MSIE 8.0|3b 20|Windows NT 6.1|20 28|"; http_header; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:2;)

Added 2014-12-15 19:01:35 UTC


Topic revision: r1 - 2019-10-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats