Hi,

The rules detect Muhstik botnet user-agent scanning (inbound/outbound) devices for further exploitation as explained in the references. No pcaps available.

# --------------------
# Date: 2018-05-08
# Title: Muhstik Botnet
# Reference: https://twitter.com/GreyNoiseIO/status/992524772180414464, https://blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/

alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-OTHER muhstik botnet inbound HTTP scanner request"; flow:to_server,established; content:"User-Agent: muhstik-scan"; fast_pattern:only; http_header; metadata:ruleset community; reference:url,blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/; reference:url,twitter.com/GreyNoiseIO/status/992524772180414464; classtype:attempted-recon; sid:8000049; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER muhstik botnet outbound HTTP scanner request"; flow:to_server,established; content:"User-Agent: muhstik-scan"; fast_pattern:only; http_header; metadata:ruleset community; reference:url,blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/; reference:url,twitter.com/GreyNoiseIO/status/992524772180414464; classtype:attempted-recon; sid:8000050; rev:1;)


Thanks.
YM