alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET TROJAN Possible APT 41 Fake Server Response"; flow:established,from_server; content:"200"; http_stat_code; content:"Server|3a 20|Microsoft-IIS|2f 20|10.0|20|Microsoft-HTTPAPI/2.0|0d|"; http_header; fast_pattern; metadata: former_category MALWARE; reference:url,www.welivesecurity.com/wp-content/uploads/2019/10/ESET_Winnti.pdf; classtype:trojan-activity; sid:2028837; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, deployment Perimeter, tag APT41, signature_severity Major, created_at 2019_10_16, malware_family LOWKEY, performance_impact Low, updated_at 2019_10_16;)

Added 2019-10-16 18:59:38 UTC


Topic revision: r1 - 2019-10-16 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats