alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN APT29 Implant8 - MAL_REFERER"; flow:established,to_server; content:"GET"; http_method; content:"&bvm=bv.81"; fast_pattern; http_header; content:"|2c|d."; distance:6; within:3; http_header; content:"|0d 0a|"; distance:3; within:2; http_header; content:"Referer|3a 20|https|3a|//www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd="; http_header; pcre:"/^(?:[02-9]|1[01]?)&ved=0C[A-L]{2}QFjA[A-L]&url=/RH"; content:"&ei="; distance:0; http_header; pcre:"/^[A-Za-z0-9]{20,22}&usg=[A-Za-z0-9_]{34}&bvm=bv\.81[1-7]{6}\,d\.[A-Za-z0-9_]{3}\r\n/RH"; http_header_names; content:!"Cookie|0d 0a|"; reference:url,www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity; classtype:trojan-activity; sid:2024004; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2017_02_17, deployment Perimeter, former_category MALWARE, malware_family APT29_Implant8, performance_impact Low, signature_severity Major, updated_at 2020_11_12;)

Added 2020-11-12 18:23:19 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN APT29 Implant8 - MAL_REFERER"; flow:established,to_server; content:"GET"; http_method; content:"&bvm=bv.81"; fast_pattern; http_header; content:"|2c|d."; distance:6; within:3; http_header; content:"|0d 0a|"; distance:3; within:2; http_header; content:"Referer|3a 20|https|3a|//www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd="; http_header; pcre:"/^(?:[02-9]|1[01]?)&ved=0C[A-L]{2}QFjA[A-L]&url=/RH"; content:"&ei="; distance:0; http_header; pcre:"/^[A-Za-z0-9]{20,22}&usg=[A-Za-z0-9_]{34}&bvm=bv\.81[1-7]{6}\,d\.[A-Za-z0-9_]{3}\r\n/RH"; http_header_names; content:!"Cookie|0d 0a|"; reference:url,www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity; classtype:trojan-activity; sid:2024004; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2017_02_17, deployment Perimeter, former_category MALWARE, malware_family APT29_Implant8, performance_impact Low, signature_severity Major, updated_at 2020_04_03;)

Added 2020-08-05 19:13:17 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN APT29 Implant8 - MAL_REFERER"; flow:established,to_server; content:"GET"; http_method; content:"&bvm=bv.81"; fast_pattern; http_header; content:"|2c|d."; distance:6; within:3; http_header; content:"|0d 0a|"; distance:3; within:2; http_header; content:"Referer|3a 20|https|3a|//www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd="; http_header; pcre:"/^(?:[02-9]|1[01]?)&ved=0C[A-L]{2}QFjA[A-L]&url=/RH"; content:"&ei="; distance:0; http_header; pcre:"/^[A-Za-z0-9]{20,22}&usg=[A-Za-z0-9_]{34}&bvm=bv\.81[1-7]{6}\,d\.[A-Za-z0-9_]{3}\r\n/RH"; http_header_names; content:!"Cookie|0d 0a|"; metadata: former_category MALWARE; reference:url,www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity; classtype:trojan-activity; sid:2024004; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2017_02_17, malware_family APT29_Implant8, performance_impact Low, updated_at 2020_04_03;)

Added 2020-04-03 18:43:31 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN APT29 Implant8 - MAL_REFERER"; flow:established,to_server; content:"GET"; http_method; content:"&bvm=bv.81"; fast_pattern; http_header; content:"|2c|d."; distance:6; within:3; http_header; content:"|0D 0A|"; distance:3; within:2; http_header; content:!"Cookie|3A 20|"; http_header; content:"Referer|3a 20|https|3a|//www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd="; http_header; pcre:"/^(?:[02-9]|1[01]?)&ved=0C[A-L]{2}QFjA[A-L]&url=/RH"; content:"&ei="; distance:0; http_header; pcre:"/^[A-Za-z0-9]{20,22}&usg=[A-Za-z0-9_]{34}&bvm=bv\.81[1-7]{6}\,d\.[A-Za-z0-9_]{3}\r\n/RH"; metadata: former_category MALWARE; reference:url,www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity; classtype:trojan-activity; sid:2024004; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2017_02_17, malware_family APT29_Implant8, performance_impact Low, updated_at 2017_02_17;)

Added 2019-09-26 19:58:20 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN APT29 Implant8 - MAL_REFERER"; flow:established,to_server; content:"GET"; http_method; content:"&bvm=bv.81"; fast_pattern; http_header; content:"|2c|d."; distance:6; within:3; http_header; content:"|0D 0A|"; distance:3; within:2; http_header; content:!"Cookie|3A 20|"; http_header; content:"Referer|3a 20|https|3a|//www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd="; http_header; pcre:"/^(?:[02-9]|1[01]?)&ved=0C[A-L]{2}QFjA[A-L]&url=/RH"; content:"&ei="; distance:0; http_header; pcre:"/^[A-Za-z0-9]{20,22}&usg=[A-Za-z0-9_]{34}&bvm=bv\.81[1-7]{6}\,d\.[A-Za-z0-9_]{3}\r\n/RH"; reference:url,www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity; classtype:trojan-activity; sid:2024004; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2017_02_17, malware_family APT29_Implant8, performance_impact Low, updated_at 2017_02_17;)

Added 2018-09-13 19:53:35 UTC


Added 2018-09-13 18:01:28 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN APT29 Implant8 - MAL_REFERER"; flow:established,to_server; content:"GET"; http_method; content:"&bvm=bv.81"; fast_pattern; http_header; content:"|2c|d."; distance:6; within:3; http_header; content:"|0D 0A|"; distance:3; within:2; http_header; content:!"Cookie|3A 20|"; http_header; content:"Referer|3a 20|https|3a|//www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd="; http_header; pcre:"/^(?:[02-9]|1[01]?)&ved=0C[A-L]{2}QFjA[A-L]&url=/RH"; content:"&ei="; distance:0; http_header; pcre:"/^[A-Za-z0-9]{20,22}&usg=[A-Za-z0-9_]{34}&bvm=bv\.81[1-7]{6}\,d\.[A-Za-z0-9_]{3}\r\n/RH"; reference:url,www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity; classtype:trojan-activity; sid:2024004; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2017_02_17, malware_family APT29_Implant8, performance_impact Low, updated_at 2017_02_17;)

Added 2017-08-07 21:19:16 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN APT29 Implant8 - MAL_REFERER"; flow:established,to_server; content:"GET"; http_method; content:"&bvm=bv.81"; fast_pattern; http_header; content:"|2c|d."; distance:6; within:3; http_header; content:"|0D 0A|"; distance:3; within:2; http_header; content:!"Cookie|3A 20|"; http_header; content:"Referer|3a 20|https|3a|//www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd="; http_header; pcre:"/^(?:[02-9]|1[01]?)&ved=0C[A-L]{2}QFjA[A-L]&url=/RH"; content:"&ei="; distance:0; http_header; pcre:"/^[A-Za-z0-9]{20,22}&usg=[A-Za-z0-9_]{34}&bvm=bv\.81[1-7]{6}\,d\.[A-Za-z0-9_]{3}\r\n/RH"; reference:url,www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity; classtype:trojan-activity; sid:2024004; rev:2;)

Added 2017-02-17 17:23:50 UTC


Topic revision: r1 - 2020-11-12 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats