[Snort-sigs] Osx.Trojan.OceanLotus variant

Phillip Lee phillile at sourcefire.com
Tue May 1 10:13:19 EDT 2018


Yaser,

Thanks for your submission. We will review the rules and get back to you when they're finished. 

Regards,
Phil Lee
Cisco Talos

> On May 1, 2018, at 9:12 AM, Y M via Snort-sigs <snort-sigs at lists.snort.org> wrote:
> 
> Hi,
> 
> Below rules are driven from the reference. No pcap is available, so testing was only done for syntax.
> 
> # Date: 2018-04-28
> # Title: New MacOS Backdoor Linked to OceanLotus Found
> # Reference: https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/ <https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/>, https://www.virustotal.com/#/file/673ee7a57ba3c5a2384aeb17a66058e59f0a4d0cddc4f01fe32f369f6a845c8f/behavior <https://www.virustotal.com/#/file/673ee7a57ba3c5a2384aeb17a66058e59f0a4d0cddc4f01fe32f369f6a845c8f/behavior>
> # Tests: syntax only
> 
> # Hashes: 673ee7a57ba3c5a2384aeb17a66058e59f0a4d0cddc4f01fe32f369f6a845c8f, 4da8365241c6b028a13b82d852c4f0155eb3d902782c6a538ac007a44a7d61b4
> alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Osx.Trojan.OceanLotus variant outbound connection"; flow:to_server,established; content:"POST"; http_method; content:"User-Agent: curl/"; fast_pattern:only; http_header; content:".js"; http_uri; pcre:"/\/[a-zA-Z0-9]{10,}\.js/U"; metadata:ruleset community, service http; reference:url,blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/ <http://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/>; classtype:trojan-activity; sid:8000027; rev:1;)
> alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Osx.Trojan.OceanLotus variant outbound connection"; flow:to_server,established; content:"GET"; http_method; content:"User-Agent: curl/"; fast_pattern:only; http_header; content:"Cookie: m_pixel_ratio="; http_header; content:".css"; http_uri; content:!"Connection"; http_header; content:!"Content"; http_header; pcre:"/Cookie\x3a\x20m_pixel_ratio\x3d[a-f0-9]{32}\x3b/H"; metadata:ruleset community, service http; reference:url,blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/ <http://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/>; classtype:trojan-activity; sid:8000028; rev:1;)
> 
> Thanks.
> YM
> _______________________________________________
> Snort-sigs mailing list
> Snort-sigs at lists.snort.org <mailto:Snort-sigs at lists.snort.org>
> https://lists.snort.org/mailman/listinfo/snort-sigs <https://lists.snort.org/mailman/listinfo/snort-sigs>
> 
> Please visit http://blog.snort.org <http://blog.snort.org/> for the latest news about Snort!
> 
> Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette <https://snort.org/faq/what-is-the-mailing-list-etiquette>
> 
> Visit the Snort.org <http://snort.org/> to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads <https://snort.org/downloads/#rule-downloads>">emerging threats</a>!

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180501/fca101c8/attachment-0001.html>


More information about the Snort-sigs mailing list