[Snort-sigs] Caphaw sigs

Y M snort at ...3751...
Fri Sep 20 19:09:40 EDT 2013




Second paragraph under "Use of DGA" from the reference: 
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.Caphaw outbound connection attempt"; flow:to_server,established; content:"/ping.html?r="; http_uri; fast_pattern:only; content:!"/utils/"; metadata: impact_flag red; policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,research.zscaler.com/2013/09/a-new-wave-of-win32caphaw-attacks.html; classtype:trojan-activity; sid:100044; rev:1;)
Another rule can be devised from the reference which is similar to sid:27538, with a slight modification to the first content match and an additional content match for "localhost":
alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"MALWARE-OTHER self-signed SSL certificate with default MyCompany Ltd organization name"; flow:established,to_client; ssl_state:server_hello; content:"localhost"; content:"|55 04 0A 13 0E|MyCompany Ltd"; fast_pattern:only; metadata:impact_flag red, ruleset community, service ssl; reference:url,research.zscaler.com/2013/09/a-new-wave-of-win32caphaw-attacks.html; reference:url,en.wikipedia.org/wiki/Self-signed_certificate; reference:url,security.ncsa.illinois.edu/research/grid-howtos/usefulopenssl.html; classtype:policy-violation; sid:100045; rev:1;)
 		 	   		  
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20130920/82334574/attachment.html>


More information about the Snort-sigs mailing list