[Snort-sigs] Reflow JS Backdoor sigs

Y M snort at outlook.com
Fri Apr 27 10:08:32 EDT 2018


Hi,

Unfortunately, there are not pcaps or hashes available for this one. The rules are based on the screenshots and analysis provided by the reference.

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Reflow JS backdoor outbound connection"; flow:to_server,established; content:"/?reflow"; fast_pattern:only; http_uri; metadata:ruleset community, service http; reference:url,www.kahusecurity.com/?p=13700; classtype:trojan-activity; sid:8000006; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Reflow JS backdoor outbound connection"; flow:to_server,established; content:"Accept|3A 20|text/html, application/xhtml+xml, */*"; fast_pattern:only; http_header; content:"User-Agent|3A 20|Mozilla/5.0 (compatible|3B| MSIE9.0|3B| Windows NT 6.1|3B| Trident/5.0)"; http_header; content:"Cookie|3A 20|"; http_header; metadata:ruleset community, service http; reference:url,www.kahusecurity.com/?p=13700; classtype:trojan-activity; sid:8000007; rev:1;)

Thanks
YM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180427/c6bd30b7/attachment-0001.html>


More information about the Snort-sigs mailing list