alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Red Leaves HTTP CnC? Beacon (APT10 implant)"; flow:established,to_server; content:"POST"; http_method; content:"/index.php"; http_uri; isdataat:!1,relative; pcre:"/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(?:\x3a\d{1,5})?$/W"; pcre:"/^[\x20-\x7e\r\n]{0,28}[^\x20-\x7e\r\n]/Ps"; http_start; content:"dex.php|20|HTTP/1.1|0d 0a|Co"; fast_pattern; http_header_names; content:!"Content-Type|0d 0a|"; content:!"User-Agent|0d 0a|"; content:!"Accept-"; content:!"Referer|0d 0a|"; http_accept; content:"*/*"; depth:3; isdataat:!1,relative; http_connection; content:"Keep-Alive"; depth:10; isdataat:!1,relative; threshold:type limit, track by_src, count 1, seconds 600; reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; reference:url,blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html; classtype:trojan-activity; sid:2024175; rev:5; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2017_04_04, deployment Perimeter, former_category MALWARE, malware_family RedLeaves?, malware_family Red_Leaves, performance_impact Low, signature_severity Major, tag APT, tag APT10, tag RedLeaves?, updated_at 2020_11_05;)

Added 2020-11-05 18:35:57 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Red Leaves HTTP CnC? Beacon (APT10 implant)"; flow:established,to_server; content:"POST"; http_method; content:"/index.php"; http_uri; isdataat:!1,relative; pcre:"/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(?:\x3a\d{1,5})?$/W"; pcre:"/^[\x20-\x7e\r\n]{0,28}[^\x20-\x7e\r\n]/Ps"; http_start; content:"dex.php|20|HTTP/1.1|0d 0a|Co"; fast_pattern; http_header_names; content:!"Content-Type|0d 0a|"; content:!"User-Agent|0d 0a|"; content:!"Accept-"; content:!"Referer|0d 0a|"; http_accept; content:"*/*"; depth:3; isdataat:!1,relative; http_connection; content:"Keep-Alive"; depth:10; isdataat:!1,relative; threshold:type limit, track by_src, count 1, seconds 600; reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; reference:url,blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html; classtype:trojan-activity; sid:2024175; rev:5; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2017_04_04, deployment Perimeter, former_category MALWARE, malware_family RedLeaves?, malware_family Red_Leaves, performance_impact Low, signature_severity Major, tag APT, tag APT10, tag RedLeaves?, updated_at 2020_03_05;)

Added 2020-08-05 19:13:25 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Red Leaves HTTP CnC? Beacon (APT10 implant)"; flow:established,to_server; content:"POST"; http_method; content:"/index.php"; http_uri; isdataat:!1,relative; pcre:"/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(?:\x3a\d{1,5})?$/W"; pcre:"/^[\x20-\x7e\r\n]{0,28}[^\x20-\x7e\r\n]/Ps"; http_start; content:"dex.php|20|HTTP/1.1|0d 0a|Co"; fast_pattern; http_header_names; content:!"Content-Type|0d 0a|"; content:!"User-Agent|0d 0a|"; content:!"Accept-"; content:!"Referer|0d 0a|"; http_accept; content:"*/*"; depth:3; isdataat:!1,relative; http_connection; content:"Keep-Alive"; depth:10; isdataat:!1,relative; threshold:type limit, track by_src, count 1, seconds 600; metadata: former_category MALWARE; reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; reference:url,blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html; classtype:trojan-activity; sid:2024175; rev:5; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, tag APT, tag APT10, tag RedLeaves?, signature_severity Major, created_at 2017_04_04, malware_family RedLeaves?, malware_family Red_Leaves, performance_impact Low, updated_at 2020_03_05;)

Added 2020-03-05 19:36:43 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Red Leaves HTTP CnC? Beacon (APT10 implant)"; flow:established,to_server; content:"POST"; http_method; content:"/index.php"; http_uri; content:!"Content-Type|3a|"; http_header; content:!"User-Agent|3a|"; http_header; content:!"Accept-"; http_header; content:!"Referer|3a|"; http_header; content:"Accept|3a 20|*/*|0d 0a|"; http_header; content:"Connection|3a 20|Keep-Alive|0d 0a|"; http_header; content:"Host|3a 20|"; http_header; pcre:"/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(?:\x3a\d{1,5})?\r\n/RH"; pcre:"/\/index\.php$/U"; pcre:"/^[\x20-\x7e\r\n]{0,28}[^\x20-\x7e\r\n]/Ps"; content:"dex.php|20|HTTP/1.1|0d 0a|Co"; fast_pattern; threshold:type limit, track by_src, count 1, seconds 600; metadata: former_category MALWARE; reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; reference:url,blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html; classtype:trojan-activity; sid:2024175; rev:4; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, tag APT, tag APT10, tag RedLeaves?, signature_severity Major, created_at 2017_04_04, malware_family RedLeaves?, malware_family Red_Leaves, performance_impact Low, updated_at 2019_10_07;)

Added 2019-10-08 19:34:44 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Red Leaves HTTP CnC? Beacon (APT10 implant)"; flow:established,to_server; content:"POST"; http_method; content:"/index.php"; http_uri; content:!"Content-Type|3a|"; http_header; content:!"User-Agent|3a|"; http_header; content:!"Accept-"; http_header; content:!"Referer|3a|"; http_header; content:"Accept|3a 20|*/*|0d 0a|"; http_header; content:"Connection|3a 20|Keep-Alive|0d 0a|"; http_header; content:"Host|3a 20|"; http_header; pcre:"/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(?:\x3a\d{1,5})?\r\n/RH"; pcre:"/\/index\.php$/U"; pcre:"/^[\x20-\x7e\r\n]{0,28}[^\x20-\x7e\r\n]/Ps"; content:"dex.php|20|HTTP/1.1|0d 0a|Co"; fast_pattern:only; threshold:type limit, track by_src, count 1, seconds 600; metadata: former_category MALWARE; reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; reference:url,blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html; classtype:trojan-activity; sid:2024175; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, tag APT, tag APT10, tag RedLeaves?, signature_severity Major, created_at 2017_04_04, malware_family RedLeaves?, malware_family Red_Leaves, performance_impact Low, updated_at 2017_04_05;)

Added 2019-09-19 19:26:46 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Red Leaves HTTP CnC? Beacon (APT10 implant)"; flow:established,to_server; content:"POST"; http_method; content:"/index.php"; http_uri; content:!"Content-Type|3a|"; http_header; content:!"User-Agent|3a|"; http_header; content:!"Accept-"; http_header; content:!"Referer|3a|"; http_header; content:"Accept|3a 20|*/*|0d 0a|"; http_header; content:"Connection|3a 20|Keep-Alive|0d 0a|"; http_header; content:"Host|3a 20|"; http_header; pcre:"/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(?:\x3a\d{1,5})?\r\n/RH"; pcre:"/\/index\.php$/U"; pcre:"/^[\x20-\x7e\r\n]{0,28}[^\x20-\x7e\r\n]/Ps"; content:"dex.php|20|HTTP/1.1|0d 0a|Co"; fast_pattern:only; threshold:type limit, track by_src, count 1, seconds 600; metadata: former_category TROJAN; reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; reference:url,blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html; classtype:trojan-activity; sid:2024175; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, tag APT, tag APT10, tag RedLeaves?, signature_severity Major, created_at 2017_04_04, malware_family RedLeaves?, malware_family Red_Leaves, performance_impact Low, updated_at 2017_04_05;)

Added 2017-08-07 21:19:29 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Red Leaves HTTP CnC? Beacon (APT10 implant)"; flow:established,to_server; content:"POST"; http_method; content:"/index.php"; http_uri; content:!"Content-Type|3a|"; http_header; content:!"User-Agent|3a|"; http_header; content:!"Accept-"; http_header; content:!"Referer|3a|"; http_header; content:"Accept|3a 20|*/*|0d 0a|"; http_header; content:"Connection|3a 20|Keep-Alive|0d 0a|"; http_header; content:"Host|3a 20|"; http_header; pcre:"/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(?:\x3a\d{1,5})?\r\n/RH"; pcre:"/\/index\.php$/U"; pcre:"/^[\x20-\x7e\r\n]{0,28}[^\x20-\x7e\r\n]/Ps"; content:"dex.php|20|HTTP/1.1|0d 0a|Co"; fast_pattern:only; threshold:type limit, track by_src, count 1, seconds 600; reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; reference:url,blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html; classtype:trojan-activity; sid:2024175; rev:3;)

Added 2017-05-05 16:59:03 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Red Leaves HTTP CnC? Beacon (APT10 implant)"; flow:established,to_server; content:"POST"; http_method; content:"/index.php"; http_uri; content:!"Content-Type|3a|"; http_header; content:!"User-Agent|3a|"; http_header; content:!"Accept-"; http_header; content:!"Referer|3a|"; http_header; content:"Accept|3a 20|*/*|0d 0a|"; http_header; content:"Connection|3a 20|Keep-Alive|0d 0a|"; http_header; content:"Host|3a 20|"; http_header; pcre:"/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(?:\x3a\d{1,5})?\r\n/RH"; pcre:"/\/index\.php$/U"; pcre:"/^[\x20-\x7e\r\n]{0,28}[^\x20-\x7e\r\n]/Ps"; content:"dex.php|20|HTTP/1.1|0d 0a|Co"; fast_pattern:only; threshold:type limit, track by_src, count 1, seconds 600; metadata: former_category TROJAN; reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; reference:url,blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html; classtype:trojan-activity; sid:2024175; rev:3;)

Added 2017-05-03 17:35:48 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Red Leaves HTTP CnC? Beacon (APT10 implant)"; flow:established,to_server; content:"POST"; http_method; content:"/index.php"; http_uri; content:!"Content-Type|3a|"; http_header; content:!"User-Agent|3a|"; http_header; content:!"Accept-"; http_header; content:!"Referer|3a|"; http_header; content:"Accept|3a 20|*/*|0d 0a|"; http_header; content:"Connection|3a 20|Keep-Alive|0d 0a|"; http_header; content:"Host|3a 20|"; http_header; pcre:"/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(?:\x3a\d{1,5})?\r\n/RH"; pcre:"/\/index\.php$/U"; pcre:"/^[\x20-\x7e\r\n]{0,28}[^\x20-\x7e\r\n]/Ps"; content:"dex.php|20|HTTP/1.1|0d 0a|Co"; fast_pattern:only; threshold:type limit, track by_src, count 1, seconds 600; reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; reference:url,blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html; classtype:trojan-activity; sid:2024175; rev:3;)

Added 2017-04-05 17:29:04 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Red Leaves HTTP CnC? Beacon (APT10 implant)"; flow:established,to_server; content:"POST"; http_method; content:"/index.php"; offset:2; http_uri; content:!"Content-Type|3a|"; http_header; content:!"User-Agent|3a|"; http_header; content:!"Accept-"; http_header; content:!"Referer|3a|"; http_header; content:"Accept|3a 20|*/*|0d 0a|"; http_header; pcre:"/^\/[A-Z]+\/index\.php$/U"; pcre:"/^[\x20-\x7e\r\n]{0,28}[^\x20-\x7e\r\n]/Ps"; content:"dex.php|20|HTTP/1.1|0d 0a|Co"; fast_pattern:only; threshold:type limit, track by_src, count 1, seconds 600; reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; reference:url,blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html; classtype:trojan-activity; sid:2024175; rev:2;)

Added 2017-04-04 18:14:34 UTC


Topic revision: r1 - 2020-11-05 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats