Yaser,

Thanks for your submission. We will review the rules and get back to you when they're finished. 

Regards,
Phil Lee
Cisco Talos

On Apr 27, 2018, at 10:19 AM, Y M via Snort-sigs <snort-sigs@lists.snort.org> wrote:

Hi,

I skipped signatures for the redirection and just focused on the final payload request. No pcaps available for this one.

# Title: Fakeupdates Campaign
# Reference: https://blog.malwarebytes.com/threat-analysis/2018/04/fakeupdates-campaign-leverages-multiple-website-platforms/

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC FakeUpdates campaign final payload request"; flow:to_server,established; content:"POST"; http_method; urilen:8; content:"/1x1.png"; fast_pattern:only; http_uri; content:"auth255|3A 20|login|0D 0A|"; http_header; content:"Accept|3A 20|*/*|0D 0A|"; http_header; content:"="; offset:1; http_client_body; metadata:ruleset community, service http; reference:url,blog.malwarebytes.com/threat-analysis/2018/04/fakeupdates-campaign-leverages-multiple-website-platforms/; classtype:trojan-activity; sid:8000008; rev:1;)

Thanks.
YM
_______________________________________________
Snort-sigs mailing list
Snort-sigs@lists.snort.org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!