alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Dragonfly Backdoor.Goodor Go Implant CnC? Beacon 1"; flow:established,to_server; content:"GET"; http_method; content:"."; http_uri; content:"?"; distance:3; within:2; http_uri; content:"="; distance:3; within:1; http_uri; content:"&"; distance:32; within:1; http_uri; content:!"Referer|3a|"; http_header; content:"Go-http-client/1.1|0d 0a|"; http_header; pcre:"/\.(?:aspx|txt)\?[a-z0-9]{3}=[a-f0-9]{32}&[a-z0-9]{3}=[^&]+&[a-z0-9]{3}=[a-f0-9]{32}$/U"; reference:md5,8943e71a8c73b5e343aa9d2e19002373; classtype:trojan-activity; sid:2024894; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2017_07_12, deployment Perimeter, former_category MALWARE, signature_severity Major, tag Targeted, tag c2, updated_at 2020_08_12, mitre_tactic_id TA0011, mitre_tactic_name Command_And_Control, mitre_technique_id T1041, mitre_technique_name Exfiltration_Over_C2_Channel;)

Added 2021-06-18 18:19:36 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Dragonfly Backdoor.Goodor Go Implant CnC? Beacon 1"; flow:established,to_server; content:"GET"; http_method; content:"."; http_uri; content:"?"; distance:3; within:2; http_uri; content:"="; distance:3; within:1; http_uri; content:"&"; distance:32; within:1; http_uri; content:!"Referer|3a|"; http_header; content:"Go-http-client/1.1|0d 0a|"; http_header; pcre:"/\.(?:aspx|txt)\?[a-z0-9]{3}=[a-f0-9]{32}&[a-z0-9]{3}=[^&]+&[a-z0-9]{3}=[a-f0-9]{32}$/U"; reference:md5,8943e71a8c73b5e343aa9d2e19002373; classtype:trojan-activity; sid:2024894; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2017_07_12, deployment Perimeter, former_category MALWARE, performance_impact Moderate, signature_severity Critical, tag Targeted, updated_at 2020_08_12;)

Added 2020-08-12 18:22:02 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Dragonfly Backdoor.Goodor Go Implant CnC? Beacon 1"; flow:established,to_server; content:"GET"; http_method; content:"."; http_uri; content:"?"; distance:3; within:2; http_uri; content:"="; distance:3; within:1; http_uri; content:"&"; distance:32; within:1; http_uri; content:!"Referer|3a|"; http_header; content:"Go-http-client/1.1|0d 0a|"; http_header; pcre:"/\.(?:aspx|txt)\?[a-z0-9]{3}=[a-f0-9]{32}&[a-z0-9]{3}=[^&]+&[a-z0-9]{3}=[a-f0-9]{32}$/U"; reference:md5,8943e71a8c73b5e343aa9d2e19002373; classtype:trojan-activity; sid:2024894; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2017_07_12, deployment Perimeter, former_category MALWARE, performance_impact Moderate, signature_severity Critical, tag Targeted, updated_at 2017_10_23;)

Added 2020-08-05 19:14:03 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Dragonfly Backdoor.Goodor Go Implant CnC? Beacon 1"; flow:established,to_server; content:"GET"; http_method; content:"."; http_uri; content:"?"; distance:3; within:2; http_uri; content:"="; distance:3; within:1; http_uri; content:"&"; distance:32; within:1; http_uri; content:!"Referer|3a|"; http_header; content:"Go-http-client/1.1|0d 0a|"; http_header; pcre:"/\.(?:aspx|txt)\?[a-z0-9]{3}=[a-f0-9]{32}&[a-z0-9]{3}=[^&]+&[a-z0-9]{3}=[a-f0-9]{32}$/U"; metadata: former_category MALWARE; reference:md5,8943e71a8c73b5e343aa9d2e19002373; classtype:trojan-activity; sid:2024894; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, tag Targeted, signature_severity Critical, created_at 2017_07_12, performance_impact Moderate, updated_at 2017_10_23;)

Added 2019-09-19 19:26:50 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Dragonfly Backdoor.Goodor Go Implant CnC? Beacon 1"; flow:established,to_server; content:"GET"; http_method; content:"."; http_uri; content:"?"; distance:3; within:2; http_uri; content:"="; distance:3; within:1; http_uri; content:"&"; distance:32; within:1; http_uri; content:!"Referer|3a|"; http_header; content:"Go-http-client/1.1|0d 0a|"; http_header; pcre:"/\.(?:aspx|txt)\?[a-z0-9]{3}=[a-f0-9]{32}&[a-z0-9]{3}=[^&]+&[a-z0-9]{3}=[a-f0-9]{32}$/U"; metadata: former_category TROJAN; reference:md5,8943e71a8c73b5e343aa9d2e19002373; classtype:trojan-activity; sid:2024894; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, tag Targeted, signature_severity Critical, created_at 2017_07_12, performance_impact Moderate, updated_at 2017_10_23;)

Added 2017-10-23 16:33:52 UTC


Topic revision: r1 - 2021-06-18 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats