alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:4; metadata:attack_target Client_Endpoint, created_at 2014_12_16, deployment Perimeter, former_category MALWARE, signature_severity Major, tag c2, updated_at 2019_10_08, mitre_tactic_id TA0011, mitre_tactic_name Command_And_Control, mitre_technique_id T1041, mitre_technique_name Exfiltration_Over_C2_Channel;)

Added 2021-09-21 19:59:46 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:4; metadata:attack_target Client_Endpoint, created_at 2014_12_15, deployment Perimeter, former_category MALWARE, signature_severity Major, tag c2, updated_at 2019_10_07, mitre_tactic_id TA0011, mitre_tactic_name Command_And_Control, mitre_technique_id T1041, mitre_technique_name Exfiltration_Over_C2_Channel;)

Added 2021-06-18 18:19:21 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:4; metadata:created_at 2014_12_15, former_category MALWARE, updated_at 2019_10_07;)

Added 2020-08-05 19:10:37 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern; metadata: former_category MALWARE; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:4; metadata:created_at 2014_12_15, updated_at 2019_10_07;)

Added 2019-10-08 19:34:16 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern:only; metadata: former_category MALWARE; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:3; metadata:created_at 2014_12_15, updated_at 2014_12_15;)

Added 2019-09-19 19:26:11 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern:only; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:3; metadata:created_at 2014_12_15, updated_at 2014_12_15;)

Added 2018-09-13 19:50:05 UTC


Added 2018-09-13 17:59:26 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern:only; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:3; metadata:created_at 2014_12_15, updated_at 2014_12_15;)

Added 2017-08-07 21:14:19 UTC


alert tcp $HOME_NET 1024: -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; content:"POST file.php HTTP/1."; depth:21; content:"|20 28 20|compatible"; fast_pattern:only; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:3;)

Added 2014-12-16 18:46:31 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN HackTool? Operation Cleaver HTTP CnC? Beacon"; flow:established,to_server; urilen:9; content:"POST"; http_method; content:"/file.php"; http_uri; content:"|20 28 20|compatible"; http_header; fast_pattern:only; content:"User-Agent|3a 20|Mozilla|2f|5.0|20 28 20|compatible|3b 20|MSIE 8.0|3b 20|Windows NT 6.1|20 28|"; http_header; reference:url,www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf; classtype:trojan-activity; sid:2019943; rev:2;)

Added 2014-12-15 19:01:35 UTC



This topic: Main > 2019943
Topic revision: r1 - 2021-09-21 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats