alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN [PTsecurity] MSIL/Biskvit.A Check-in"; flow:established,to_server; urilen:15; content:"POST"; http_method; content:"/api/auth/token"; http_uri; content:"Authorization|3a 20 0d 0a|"; http_header; depth:18; fast_pattern; content:"Expect|3a 20|100-continue"; http_header; content:"{|22|ApiKey|22 3a 22|"; depth:11; http_client_body; isdataat:!100,relative; http_content_type; content:"application/json"; depth:16; http_connection; content:"Keep-Alive"; depth:10; http_header_names; content:"|0d 0a|Authorization|0d 0a|"; depth:17; content:!"Accept"; content:!"Referer|0d 0a|"; content:!"User-Agent|0d 0a|"; reference:url,www.fortinet.com/blog/threat-research/russian-army-exhibition-decoy-leads-to-new-biskvit-malware.html; classtype:trojan-activity; sid:2026007; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2018_08_22, deployment Perimeter, former_category MALWARE, updated_at 2020_11_03;)

Added 2020-11-03 18:44:38 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN [PTsecurity] MSIL/Biskvit.A Check-in"; flow:established,to_server; urilen:15; content:"POST"; http_method; content:"/api/auth/token"; http_uri; content:"Authorization|3a 20 0d 0a|"; http_header; depth:18; fast_pattern; content:"Expect|3a 20|100-continue"; http_header; content:"{|22|ApiKey|22 3a 22|"; depth:11; http_client_body; isdataat:!100,relative; http_content_type; content:"application/json"; depth:16; http_connection; content:"Keep-Alive"; depth:10; http_header_names; content:"|0d 0a|Authorization|0d 0a|"; depth:17; content:!"Accept"; content:!"Referer|0d 0a|"; content:!"User-Agent|0d 0a|"; reference:url,www.fortinet.com/blog/threat-research/russian-army-exhibition-decoy-leads-to-new-biskvit-malware.html; classtype:trojan-activity; sid:2026007; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2018_08_22, deployment Perimeter, former_category MALWARE, updated_at 2020_02_27;)

Added 2020-08-05 19:15:04 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN [PTsecurity] MSIL/Biskvit.A Check-in"; flow:established,to_server; urilen:15; content:"POST"; http_method; content:"/api/auth/token"; http_uri; content:"Authorization|3a 20 0d 0a|"; http_header; depth:18; fast_pattern; content:"Expect|3a 20|100-continue"; http_header; content:"{|22|ApiKey|22 3a 22|"; depth:11; http_client_body; isdataat:!100,relative; http_content_type; content:"application/json"; depth:16; http_connection; content:"Keep-Alive"; depth:10; http_header_names; content:"|0d 0a|Authorization|0d 0a|"; depth:17; content:!"Accept"; content:!"Referer|0d 0a|"; content:!"User-Agent|0d 0a|"; metadata: former_category MALWARE; reference:url,www.fortinet.com/blog/threat-research/russian-army-exhibition-decoy-leads-to-new-biskvit-malware.html; classtype:trojan-activity; sid:2026007; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, created_at 2018_08_22, updated_at 2020_02_27;)

Added 2020-02-27 19:41:21 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN [PTsecurity] MSIL/Biskvit.A Check-in"; flow:established,to_server; urilen:15; content:"POST"; http_method; content:"/api/auth/token"; http_uri; content:"Authorization|3a 20 0d 0a|"; http_header; depth:18; fast_pattern; content:"Expect|3a 20|100-continue"; http_header; content:"{|22|ApiKey|22 3a 22|"; depth:11; http_client_body; isdataat:!100,relative; http_content_type; content:"application/json"; depth:16; http_connection; content:"Keep-Alive"; depth:10; http_header_names; content:"|0d 0a|Authorization|0d 0a|"; depth:17; content:!"Accept"; content:!"Referer|3a|"; content:!"User-Agent|3a|"; metadata: former_category MALWARE; reference:url,www.fortinet.com/blog/threat-research/russian-army-exhibition-decoy-leads-to-new-biskvit-malware.html; classtype:trojan-activity; sid:2026007; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, created_at 2018_08_22, updated_at 2018_08_22;)

Added 2018-09-13 19:55:06 UTC


Added 2018-09-13 18:02:25 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN [PTsecurity] MSIL/Biskvit.A Check-in"; flow:established,to_server; urilen:15; content:"POST"; http_method; content:"/api/auth/token"; http_uri; content:"Authorization|3a 20 0d 0a|"; http_header; depth:18; fast_pattern; content:"Expect|3a 20|100-continue"; http_header; content:"{|22|ApiKey|22 3a 22|"; depth:11; http_client_body; isdataat:!100,relative; http_content_type; content:"application/json"; depth:16; http_connection; content:"Keep-Alive"; depth:10; http_header_names; content:"|0d 0a|Authorization|0d 0a|"; depth:17; content:!"Accept"; content:!"Referer|3a|"; content:!"User-Agent|3a|"; metadata: former_category MALWARE; reference:url,www.fortinet.com/blog/threat-research/russian-army-exhibition-decoy-leads-to-new-biskvit-malware.html; classtype:trojan-activity; sid:2026007; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, created_at 2018_08_22, updated_at 2018_08_22;)

Added 2018-08-22 17:08:16 UTC


Topic revision: r1 - 2020-11-03 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats