[Snort-sigs] Doc.Dropper.HWPnshell

Y M snort at outlook.com
Mon Jun 11 15:00:39 EDT 2018


Hi,

Pcap is also available for this one. The C&C generated via Hangul document(s).

# --------------------
# Date: 2018-06-09
# Title: Doc.Dropper.HWPnshell
# Tests: pcap
# Reference: research
# Confidence: low

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Doc.Dropper.HWPnshell outbound connection"; flow:to_server,established; content:"GET"; http_method; content:"mb_access_token="; http_cookie; content:"mb_today_visit="; http_cookie; content:".jpg"; http_uri; metadata:ruleset community, service http; reference:url,www.virustotal.com/#/file/751d2ed9e56abf3b218dbfd5de88576ee1be4b02760ec6431c18bdf31031086c/detection; classtype:trojan-activity; sid:8000113; rev:1;)

Thanks.
YM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180611/8953f117/attachment-0001.html>


More information about the Snort-sigs mailing list