alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Win32/TrojanDownloader.Delf.BVP Win32/BioData CnC? Beacon"; flow:established,to_server; content:"POST"; http_method; content:".php?b="; http_uri; content:!"&"; distance:0; http_uri; content:!"Referer|3a|"; http_header; content:"form-data|3b 20|name=|22|unit|22 3b 20|"; fast_pattern:4,20; http_client_body; reference:md5,68aab6163c29183ad8da1cf27a5a47c5; reference:url,securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/; reference:url,researchcenter.paloaltonetworks.com/2017/11/unit42-recent-inpage-exploits-lead-multiple-malware-families; classtype:trojan-activity; sid:2023545; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2016_11_23, deployment Perimeter, former_category MALWARE, signature_severity Major, tag c2, updated_at 2020_08_13, mitre_tactic_id TA0011, mitre_tactic_name Command_And_Control, mitre_technique_id T1041, mitre_technique_name Exfiltration_Over_C2_Channel;)

Added 2021-06-18 18:19:33 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Win32/TrojanDownloader.Delf.BVP Win32/BioData CnC? Beacon"; flow:established,to_server; content:"POST"; http_method; content:".php?b="; http_uri; content:!"&"; distance:0; http_uri; content:!"Referer|3a|"; http_header; content:"form-data|3b 20|name=|22|unit|22 3b 20|"; fast_pattern:4,20; http_client_body; reference:md5,68aab6163c29183ad8da1cf27a5a47c5; reference:url,securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/; reference:url,researchcenter.paloaltonetworks.com/2017/11/unit42-recent-inpage-exploits-lead-multiple-malware-families; classtype:trojan-activity; sid:2023545; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2016_11_23, deployment Perimeter, former_category MALWARE, signature_severity Major, updated_at 2020_08_13;)

Added 2020-08-17 18:50:51 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Win32/TrojanDownloader.Delf.BVP Win32/BioData CnC? Beacon"; flow:established,to_server; content:"POST"; http_method; content:".php?b="; http_uri; content:!"&"; distance:0; http_uri; content:!"Referer|3a|"; http_header; content:"form-data|3b 20|name=|22|unit|22 3b 20|"; fast_pattern:4,20; http_client_body; reference:md5,68aab6163c29183ad8da1cf27a5a47c5; reference:url,securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/; reference:url,researchcenter.paloaltonetworks.com/2017/11/unit42-recent-inpage-exploits-lead-multiple-malware-families; classtype:trojan-activity; sid:2023545; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2016_11_23, deployment Perimeter, former_category MALWARE, signature_severity Major, updated_at 2017_11_07;)

Added 2020-08-05 19:12:52 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Win32/TrojanDownloader.Delf.BVP Win32/BioData CnC? Beacon"; flow:established,to_server; content:"POST"; http_method; content:".php?b="; http_uri; content:!"&"; distance:0; http_uri; content:!"Referer|3a|"; http_header; content:"form-data|3b 20|name=|22|unit|22 3b 20|"; fast_pattern:4,20; http_client_body; metadata: former_category MALWARE; reference:md5,68aab6163c29183ad8da1cf27a5a47c5; reference:url,securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/; reference:url,researchcenter.paloaltonetworks.com/2017/11/unit42-recent-inpage-exploits-lead-multiple-malware-families; classtype:trojan-activity; sid:2023545; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2016_11_23, updated_at 2017_11_07;)

Added 2019-09-19 19:26:43 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Win32/TrojanDownloader.Delf.BVP Win32/BioData CnC? Beacon"; flow:established,to_server; content:"POST"; http_method; content:".php?b="; http_uri; content:!"&"; distance:0; http_uri; content:!"Referer|3a|"; http_header; content:"form-data|3b 20|name=|22|unit|22 3b 20|"; fast_pattern:4,20; http_client_body; metadata: former_category TROJAN; reference:md5,68aab6163c29183ad8da1cf27a5a47c5; reference:url,securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/; reference:url,researchcenter.paloaltonetworks.com/2017/11/unit42-recent-inpage-exploits-lead-multiple-malware-families; classtype:trojan-activity; sid:2023545; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2016_11_23, updated_at 2017_11_07;)

Added 2018-09-13 19:53:11 UTC


Added 2018-09-13 18:01:16 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Win32/TrojanDownloader.Delf.BVP Win32/BioData CnC? Beacon"; flow:established,to_server; content:"POST"; http_method; content:".php?b="; http_uri; content:!"&"; distance:0; http_uri; content:!"Referer|3a|"; http_header; content:"form-data|3b 20|name=|22|unit|22 3b 20|"; fast_pattern:4,20; http_client_body; metadata: former_category TROJAN; reference:md5,68aab6163c29183ad8da1cf27a5a47c5; reference:url,securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/; reference:url,researchcenter.paloaltonetworks.com/2017/11/unit42-recent-inpage-exploits-lead-multiple-malware-families; classtype:trojan-activity; sid:2023545; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2016_11_23, updated_at 2017_11_07;)

Added 2017-11-07 16:20:36 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Win32/TrojanDownloader.Delf.BVP CnC? Beacon"; flow:established,to_server; content:"POST"; http_method; content:".php?b="; http_uri; content:!"&"; distance:0; http_uri; content:!"Referer|3a|"; http_header; content:"form-data|3b 20|name=|22|unit|22 3b 20|"; fast_pattern:4,20; http_client_body; reference:md5,68aab6163c29183ad8da1cf27a5a47c5; reference:url,securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/; classtype:trojan-activity; sid:2023545; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2016_11_23, updated_at 2016_11_23;)

Added 2017-08-07 21:18:43 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Win32/TrojanDownloader.Delf.BVP CnC? Beacon"; flow:established,to_server; content:"POST"; http_method; content:".php?b="; http_uri; content:!"&"; distance:0; http_uri; content:!"Referer|3a|"; http_header; content:"form-data|3b 20|name=|22|unit|22 3b 20|"; fast_pattern:4,20; http_client_body; reference:md5,68aab6163c29183ad8da1cf27a5a47c5; reference:url,securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/; classtype:trojan-activity; sid:2023545; rev:2;)

Added 2016-11-23 18:37:57 UTC



This topic: Main > 2023545
Topic revision: r1 - 2021-06-18 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats