alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN APT Mustang Panda Payload - CnC? Checkin"; flow:established,to_server; content:"POST"; http_method; content:"?wd="; http_uri; pcre:"/^[a-f0-9]{8}$/URi"; http_header_names; content:"x-debug"; content:"x-request"; content:"x-content"; content:"x-storage"; metadata: former_category MALWARE; reference:url,www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations; classtype:trojan-activity; sid:2028823; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_and_Server, deployment Perimeter, deployment SSLDecrypt, tag MustangPanda?, signature_severity Major, created_at 2019_10_14, performance_impact Low, updated_at 2019_10_14;)

Added 2019-10-14 20:58:29 UTC


Topic revision: r1 - 2019-10-15 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats