alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Tortoiseshell/SysKit CnC? Activity"; flow:established,to_server; content:"POST"; http_method; content:!"&"; http_uri; content:!"."; http_uri; content:"ip="; depth:3; http_client_body; content:"#"; http_client_body; distance:0; content:"&os="; http_client_body; distance:0; content:"#"; http_client_body; distance:0; content:"&os_name="; http_client_body; distance:0; fast_pattern; content:"#"; http_client_body; distance:0; content:"&mac="; http_client_body; distance:0; http_header_names; content:!"Referer"; content:!"User-Agent"; reference:md5,a194e3bf830104922295c37e6d19d9a2; reference:url,blog.talosintelligence.com/2019/09/tortoiseshell-fake-veterans.html; reference:url,symantec-enterprise-blogs.security.com/blogs/threat-intelligence/tortoiseshell-apt-supply-chain; classtype:trojan-activity; sid:2028618; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2019_09_24, deployment Perimeter, former_category MALWARE, performance_impact Moderate, signature_severity Major, updated_at 2020_09_02;)

Added 2021-05-13 18:25:21 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Tortoiseshell/HMH CnC? Activity"; flow:established,to_server; content:"POST"; http_method; content:!"&"; http_uri; content:!"."; http_uri; content:"ip="; depth:3; http_client_body; content:"#"; http_client_body; distance:0; content:"&os="; http_client_body; distance:0; content:"#"; http_client_body; distance:0; content:"&os_name="; http_client_body; distance:0; fast_pattern; content:"#"; http_client_body; distance:0; content:"&mac="; http_client_body; distance:0; http_header_names; content:!"Referer"; content:!"User-Agent"; reference:md5,a194e3bf830104922295c37e6d19d9a2; reference:url,blog.talosintelligence.com/2019/09/tortoiseshell-fake-veterans.html; classtype:trojan-activity; sid:2028618; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2019_09_24, deployment Perimeter, former_category MALWARE, performance_impact Moderate, signature_severity Major, updated_at 2020_09_02;)

Added 2020-09-02 17:51:29 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Tortoiseshell/HMH CnC? Activity"; flow:established,to_server; content:"POST"; http_method; content:!"&"; http_uri; content:!"."; http_uri; content:"ip="; depth:3; http_client_body; content:"#"; http_client_body; distance:0; content:"&os="; http_client_body; distance:0; content:"#"; http_client_body; distance:0; content:"&os_name="; http_client_body; distance:0; fast_pattern; content:"#"; http_client_body; distance:0; content:"&mac="; http_client_body; distance:0; http_header_names; content:!"Referer"; content:!"User-Agent"; reference:md5,a194e3bf830104922295c37e6d19d9a2; reference:url,blog.talosintelligence.com/2019/09/tortoiseshell-fake-veterans.html; classtype:trojan-activity; sid:2028618; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2019_09_24, deployment Perimeter, former_category MALWARE, performance_impact Moderate, signature_severity Major, updated_at 2019_09_24;)

Added 2020-08-05 19:16:54 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Tortoiseshell/HMH CnC? Activity"; flow:established,to_server; content:"POST"; http_method; content:!"&"; http_uri; content:!"."; http_uri; content:"ip="; depth:3; http_client_body; content:"#"; http_client_body; distance:0; content:"&os="; http_client_body; distance:0; content:"#"; http_client_body; distance:0; content:"&os_name="; http_client_body; distance:0; fast_pattern; content:"#"; http_client_body; distance:0; content:"&mac="; http_client_body; distance:0; http_header_names; content:!"Referer"; content:!"User-Agent"; metadata: former_category MALWARE; reference:md5,a194e3bf830104922295c37e6d19d9a2; reference:url,blog.talosintelligence.com/2019/09/tortoiseshell-fake-veterans.html; classtype:trojan-activity; sid:2028618; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2019_09_24, performance_impact Moderate, updated_at 2019_09_24;)

Added 2019-09-24 19:42:51 UTC


Topic revision: r1 - 2021-05-13 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats