[Snort-sigs] BITSAdmin Upload

O C snort at outlook.com
Wed May 30 10:04:42 EDT 2018

Thanks for the feedback, Nick. I will put this rule on live traffic and see if I get any FPs.

From: Nick Randolph <drandolph at sourcefire.com>
Sent: Wednesday, May 30, 2018 4:24 PM
To: Y M
Cc: snort-sigs
Subject: Re: [Snort-sigs] BITSAdmin Upload

Yaser I don't think we can include this one in the official ruleset.


On Fri, May 25, 2018 at 2:36 PM, Y M via Snort-sigs <snort-sigs at lists.snort.org<mailto:snort-sigs at lists.snort.org>> wrote:

I have only seen this used by red teamers. I am not aware of current attacks using BITSAdmin to upload stuff. I am also not aware of built-in (Windows) use either. Lab-generated pcap is available.

# --------------------
# Date: 2018-05-16
# Title: BITSAdmin File Upload
# Reference: Research
# Tests: pcap

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE Windows BITSAdmin upload request attempt"; flow:to_server,established; content:"BITS_POST"; http_method; content:"User-Agent: Microsoft BITS/"; fast_pattern:only; http_header; metadata:ruleset community, service http; classtype:misc-activity; sid:8000057; rev:1;)


Snort-sigs mailing list
Snort-sigs at lists.snort.org<mailto:Snort-sigs at lists.snort.org>

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!


Nick Randolph
Research Engineer
Sourcefire, Inc.
nrandolph at sourcefire.com<mailto:nrandolph at sourcefire.com>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180530/5d00def3/attachment-0001.html>

More information about the Snort-sigs mailing list