#alert tcp $HOME_NET any -> $HOME_NET any (msg:"ET TROJAN APT 41 LOWKEY Backdoor [TCP Relay Module] - Close Socket Command Observed"; flow:established,to_server; content:"|00 00 00 00 00 D6 00|"; depth:7; fast_pattern; content:"|00 00 00 00|"; distance:5; within:4; metadata: former_category MALWARE; reference:url,www.fireeye.com/blog/threat-research/2019/10/lowkey-hunting-for-the-missing-volume-serial-id.html; classtype:trojan-activity; sid:2028890; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_and_Server, deployment Internal, tag APT41, signature_severity Major, created_at 2019_10_16, malware_family LOWKEY, performance_impact Low, updated_at 2019_10_16;)

Added 2019-10-21 18:36:00 UTC

Topic revision: r1 - 2019-10-21 - TWikiGuest
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats