On Thu, Jun 28, 2018 at 9:44 AM, Y M via Snort-sigs <snort-sigs@lists.snort.org> wrote:
Hi,

The last patch of signatures had syntax errors, although the tests stated 'syntax only'. I apologize for that. Pcaps available only for Pbot and TechSupportScam traffic. Notes are included within each set of rules.

# --------------------
# Date: 2018-06-27
# Title: TechScamSupport Binaries
# Tests: pcaps
# Confidence: medium
# Note: first rule is derived from the pcaps. Remaining two rules are derived the strings within the binaries.

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.TechSupportScam installed binary outbound connection"; flow:to_server,established; content:"/register.php?"; fast_pattern:only; http_uri; content:"p="; http_uri; content:"&code="; http_uri; content:!"User-Agent"; http_header; metadata:ruleset community, service http; reference:url,www.virustotal.com/#/file/c9adabc7516e38ce611cbde5856fbe6b06e8afee4422d754aa810aec59ecd8d8/detection; reference:url,www.virustotal.com/#/file/05c84e23571624b75645247d475ccf88bb51eb8624c4564fd69e5a4ca1a65c96/detection; reference:url,www.virustotal.com/#/file/276c235e7c0bc443bf87e02341fb5fe5a1ca1d7e249927fd1b8bd66bd43a70c1/detection; classtype:trojan-activity; sid:8000139; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.TechSupportScam installed binary outbound connection"; flow:to_server,established; content:"/update_new.php?"; fast_pattern:only; http_uri; content:"code="; http_uri; content:!"User-Agent"; http_header; metadata:ruleset community, service http; reference:url,www.virustotal.com/#/file/c9adabc7516e38ce611cbde5856fbe6b06e8afee4422d754aa810aec59ecd8d8/detection; reference:url,www.virustotal.com/#/file/05c84e23571624b75645247d475ccf88bb51eb8624c4564fd69e5a4ca1a65c96/detection; reference:url,www.virustotal.com/#/file/276c235e7c0bc443bf87e02341fb5fe5a1ca1d7e249927fd1b8bd66bd43a70c1/detection; classtype:trojan-activity; sid:8000140; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.TechSupportScam installed binary outbound connection"; flow:to_server,established; content:"/show_new.php?"; fast_pattern:only; http_uri; content:"code="; http_uri; content:!"User-Agent"; http_header; metadata:ruleset community, service http; reference:url,www.virustotal.com/#/file/c9adabc7516e38ce611cbde5856fbe6b06e8afee4422d754aa810aec59ecd8d8/detection; reference:url,www.virustotal.com/#/file/05c84e23571624b75645247d475ccf88bb51eb8624c4564fd69e5a4ca1a65c96/detection; reference:url,www.virustotal.com/#/file/276c235e7c0bc443bf87e02341fb5fe5a1ca1d7e249927fd1b8bd66bd43a70c1/detection; classtype:trojan-activity; sid:8000141; rev:1;)

# --------------------
# Date: 2018-06-27
# Title: Pbot: evolving adware
# Tests: pcaps
# Confidence: medium
# Note: first rule is derived from the pcap. Remaining rules are derived from reference and the detailed reports of VT Tencent HABO

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-OTHER Win.Adware.Pbot variant outbound connection"; flow:to_server,established; content:"/collect.php?"; fast_pattern:only; http_uri; content:"pid="; http_uri; content:"&cid="; http_uri; content:"&sid="; http_uri; content:"&act="; http_uri; metadata:ruleset community, service http; reference:url,www.virustotal.com/#/file/5e3dc49c1f4b57ab27000befd128fad77eba9a6e07f8766c7e1393cae890fdf6/detection; classtype:trojan-activity; sid:8000142; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-OTHER Win.Adware.Pbot variant outbound connection"; flow:to_server,established; content:"/installstarted"; fast_pattern:only; http_uri; content:"&de="; http_uri; content:"&_v="; http_uri; content:"&_s="; http_uri; metadata:ruleset community, service http; reference:url,www.virustotal.com/#/file/5e3dc49c1f4b57ab27000befd128fad77eba9a6e07f8766c7e1393cae890fdf6/detection; classtype:trojan-activity; sid:8000143; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-OTHER Win.Adware.Pbot variant outbound connection"; flow:to_server,established; content:"/installended"; fast_pattern:only; http_uri; content:"&de="; http_uri; content:"&_v="; http_uri; content:"&_s="; http_uri; metadata:ruleset community, service http; reference:url,www.virustotal.com/#/file/5e3dc49c1f4b57ab27000befd128fad77eba9a6e07f8766c7e1393cae890fdf6/detection; classtype:trojan-activity; sid:8000144; rev:1;)

# --------------------
# Date: 2018-06-27
# Title: LuckyMouse hits national data center to organize country-level waterholing campaign
# Tests: syntatx only, Shodan, RiskIQ, Censys, ThreatMiner
# Confidence: low-
# Note: The droppers and backdoor communicate with specific IP address. According to Shodan
#       RiskIQ, CIRCL (via threatminer.org), and Censys a self-signed TLSv1.0 certificate
#       was Last Seen on 2018-03-27, matching the month of the activity mentioned by the reference.
#       This was the only certificate associated with this IP address within the suspected time
#       frame. However, the same certificate have been associated with multiple IP addresses.
# SHA1: ee14e4ab0b243b397315e094935f5b74a67a1bc7

alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.HyperBro inbound self-signed certificate"; flow:to_client,established; content:"|16 03 01|"; content:"|0B|"; distance:3; content:"au"; nocase; content:"some-state"; nocase; content:"internet widgets ltd"; nocase; metadata:ruleset community, service ssl; classtype:trojan-activity; sid:8000145; rev:1;)

# --------------------
# Date: 2018-06-28
# Title: RadRAT An all-in-one toolkit for complex espionage ops
# Tests: syntatx only, strings found in all samples
# Confidence: low--
# Note: All the samples, including the test binaries contained the same network-related artifacts
#       that maybe sig'able. These include the user-agent and the POST URL, and some the dropbox URIs.

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.RadRat outbound connection"; flow:to_server,established; urilen:2; content:"Mozilla/5.0 (Windows NT 6.1|3B| WOW64|3B| rv:35.0) Gecko/20100101 Firefox/35.0"; fast_pattern:only; http_header; content:"/A"; http_uri; content:"POST"; http_method; content:!"Referer"; http_method; metadata:ruleset community, service http; reference:url,download.bitdefender.com/resources/files/News/CaseStudies/study/200/Bitdefender-Whitepaper-RADrat-crea2645-A4-en-EN-interactive.pdf; classtype:trojan-activity; sid:8000146; rev:1;)

# --------------------
# Date: 2018-06-28
# Title: MysteryBot; a new Android banking Trojan ready for Android 7 and 8
# Tests: syntatx only, Android logcat
# Confidence: low--
# Note: The network artificates displayed by VT Droidy and Tencent HABO are partial. Reviewing the logcat from
#       provides a better version of the network artificats, which also match the ones reported by VT and Tencent.
#       The malware appears to be sending a base64 encoded JSON data as a query string.

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Andro.Trojan.MysteryBot banker outbound connection"; flow:to_server, established; urilen:250<>300; content:"/gate.php?i=eyAiYW"; fast_pattern:only; http_uri; metadata:ruleset community, service http; reference:url,www.threatfabric.com/blogs/mysterybot__a_new_android_banking_trojan_ready_for_android_7_and_8.html; classtype:trojan-activity; sid:8000147; rev:1;)


Thanks.
YM

Hi Yaser,

Thanks for these submissions. We will review each of them and get back to you when finished. 


--
Marcos Rodriguez
Cisco Talos