snort at outlook.com
Tue May 1 09:15:53 EDT 2018
This one also has no pcaps. The traffic from the references and subsequent references made it a little clearer.
# Title: Turla COMRat
# Tests: syntax only
# Reference: https://www.virustotal.com/#/file/97328f00d5dc6d72f7a1a5c75e6991135183ffeef10e1a6a49dab7cba2eb7f6c/detection, https://www.vmray.com/analyses/97328f00d5dc/report/overview.html, https://www.hybrid-analysis.com/sample/97328f00d5dc6d72f7a1a5c75e6991135183ffeef10e1a6a49dab7cba2eb7f6c?environmentId=100, https://twitter.com/DrunkBinary/status/990386981225025536
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.COMRat outbound connection attempt"; flow:to_server,established; content:"/index/index.php?"; fast_pattern:only; http_uri; content:"h="; http_uri; content:"&d="; http_uri; content:"|3B| MSIE 7.0|3B|"; http_header; metadata:ruleset community, service http; reference:url,www.virustotal.com/#/file/97328f00d5dc6d72f7a1a5c75e6991135183ffeef10e1a6a49dab7cba2eb7f6c/detection; reference:url,twitter.com/DrunkBinary/status/990386981225025536; classtype:trojan-activity; sid:8000029; rev:1;)
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Snort-sigs