alert tcp $HOME_NET 1024: -> $EXTERNAL_NET 443 (msg:"ET TROJAN [GIGAMON_ATR] FIN8 BADHATCH Remote Shell Banner"; flow:established,to_server; dsize:>100; content:"|2a 20|SUPER|20|REMOTE|20|SHELL|20|v2|2e|2|20|SSL"; metadata: former_category TROJAN; reference:url,atr-blog.gigamon.com/2019/07/23/abadbabe-8badf00d:-discovering-badhatch-and-a-detailed-look-at-fin8's-tooling/; classtype:trojan-activity; sid:2027751; rev:1; metadata:deployment Perimeter, tag Backdoor, signature_severity Major, created_at 2019_07_23, malware_family ShellTea?, performance_impact Low, updated_at 2019_07_23;)

Added 2019-07-23 18:52:03 UTC


Topic revision: r1 - 2019-07-23 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats