Snort mailing list archives

Win.Trojan.Kovtar


From: Y M <snort () outlook com>
Date: Fri, 10 Feb 2017 09:07:38 +0000

Hello,


Below two signatures detect the initial JS downloader and post-infection C&C.


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.Kovter variant JS downloader outbound 
connection"; flow:to_server,established; urilen:<100; content:"GET"; http_method; content:"/counter/?"; 
fast_pattern:only; http_uri; content:"UA-CPU|3A 20|"; http_header; content:"MSIE 7.0|3B|"; http_header; 
content:!"Referer"; http_header; pcre:"/\/counter\/\x3f\w+/U"; metadata:ruleset community, service http; 
classtype:trojan-activity; sid:1000821; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.Kovter variant outbound connection"; 
flow:to_server,established; dsize:55<>205; content:!" HTTP/"; content:"|00 00 00|"; offset:1; metadata:ruleset 
community; classtype:trojan-activity; sid:1000822; rev:1;)


Thank you.

YM
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: