alert dns $HOME_NET any -> any any (msg:"ET MALWARE Fake ProtonVPN?/AZORult CnC? Domain Query"; dns_query; content:"accounts.protonvpn.store"; nocase; depth:24; isdataat:!1,relative; metadata: former_category MALWARE; reference:url,securelist.com/azorult-spreads-as-a-fake-protonvpn-installer/96261/; classtype:trojan-activity; sid:2029523; rev:2; metadata:attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2020_02_20, performance_impact Low, updated_at 2020_02_20;)

Added 2020-02-20 19:13:45 UTC


Topic revision: r1 - 2020-02-21 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats