alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Danabot CnC? Checkin"; flow:established,to_server; content:"GET"; http_method; content:"/api/key?k="; http_uri; depth:11; pcre:"/^(?:[A-Z0-9+/]{4})*(?:[A-Z0-9+/]{2}==|[A-Z0-9+/]{3}=|[A-Z0-9+/]{4})$/RUi"; content:"Mozilla|20|4.0|20 2f 20|Chrome"; http_user_agent; depth:20; fast_pattern; isdataat:!1,relative; http_content_type; content:"application|2f|x-www-form-urlencoded"; pcre:"/^[^\x20-\x7e\r\n]{2}$/R"; metadata: former_category TROJAN; reference:md5,7f5f7de558fd2ef2a195b3a507c11ff2; classtype:trojan-activity; sid:2027497; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, deployment Perimeter, signature_severity Major, created_at 2019_06_20, malware_family Danabot, performance_impact Low, updated_at 2019_06_20;)

Added 2019-06-20 18:41:41 UTC


Topic revision: r1 - 2019-06-20 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats