alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Possible APT Sarhurst/Husar/Hussarini/Hassar CnC? GET"; flow:to_server,established; urilen:>40; content:"GET"; http_method; content:"/?"; depth:2; http_uri; content:"AAAAAAAAAA"; http_uri; distance:0; content:"Accept|3a 20|Accept|3a|*/*|0d 0a|"; depth:20; http_header; fast_pattern; content:"Mozilla/4.0 (compatible|3b 20|MSIE 5.5|3b 20|Windows NT 5.0)"; http_user_agent; depth:50; isdataat:!1,relative; pcre:"/^\/\?(?:[A-Za-z0-9+/]{4})*(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=|[A-Za-z0-9+/]{4})$/U"; reference:url,www.fortinet.com/blog/threat-research/hussarini---targeted-cyber-attack-in-the-philippines.html; classtype:trojan-activity; sid:2027710; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2019_07_15, updated_at 2019_07_15;)

Added 2019-07-15 19:05:23 UTC


Topic revision: r1 - 2019-07-15 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats