Snort mailing list archives

Multiple signatures - 001


From: Y M via Snort-sigs <snort-sigs () lists snort org>
Date: Thu, 28 Jun 2018 13:44:29 +0000

Hi,

The last patch of signatures had syntax errors, although the tests stated 'syntax only'. I apologize for that. Pcaps 
available only for Pbot and TechSupportScam traffic. Notes are included within each set of rules.

# --------------------
# Date: 2018-06-27
# Title: TechScamSupport Binaries
# Tests: pcaps
# Reference: https://twitter.com/nao_sec/status/1011999821643767809
#     - https://www.virustotal.com/#/file/c9adabc7516e38ce611cbde5856fbe6b06e8afee4422d754aa810aec59ecd8d8/detection
#     - https://www.virustotal.com/#/file/05c84e23571624b75645247d475ccf88bb51eb8624c4564fd69e5a4ca1a65c96/detection
#     - https://www.virustotal.com/#/file/276c235e7c0bc443bf87e02341fb5fe5a1ca1d7e249927fd1b8bd66bd43a70c1/detection
# Confidence: medium
# Note: first rule is derived from the pcaps. Remaining two rules are derived the strings within the binaries.

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.TechSupportScam installed binary 
outbound connection"; flow:to_server,established; content:"/register.php?"; fast_pattern:only; http_uri; content:"p="; 
http_uri; content:"&code="; http_uri; content:!"User-Agent"; http_header; metadata:ruleset community, service http; 
reference:url,www.virustotal.com/#/file/c9adabc7516e38ce611cbde5856fbe6b06e8afee4422d754aa810aec59ecd8d8/detection; 
reference:url,www.virustotal.com/#/file/05c84e23571624b75645247d475ccf88bb51eb8624c4564fd69e5a4ca1a65c96/detection; 
reference:url,www.virustotal.com/#/file/276c235e7c0bc443bf87e02341fb5fe5a1ca1d7e249927fd1b8bd66bd43a70c1/detection; 
classtype:trojan-activity; sid:8000139; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.TechSupportScam installed binary 
outbound connection"; flow:to_server,established; content:"/update_new.php?"; fast_pattern:only; http_uri; 
content:"code="; http_uri; content:!"User-Agent"; http_header; metadata:ruleset community, service http; 
reference:url,www.virustotal.com/#/file/c9adabc7516e38ce611cbde5856fbe6b06e8afee4422d754aa810aec59ecd8d8/detection; 
reference:url,www.virustotal.com/#/file/05c84e23571624b75645247d475ccf88bb51eb8624c4564fd69e5a4ca1a65c96/detection; 
reference:url,www.virustotal.com/#/file/276c235e7c0bc443bf87e02341fb5fe5a1ca1d7e249927fd1b8bd66bd43a70c1/detection; 
classtype:trojan-activity; sid:8000140; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.TechSupportScam installed binary 
outbound connection"; flow:to_server,established; content:"/show_new.php?"; fast_pattern:only; http_uri; 
content:"code="; http_uri; content:!"User-Agent"; http_header; metadata:ruleset community, service http; 
reference:url,www.virustotal.com/#/file/c9adabc7516e38ce611cbde5856fbe6b06e8afee4422d754aa810aec59ecd8d8/detection; 
reference:url,www.virustotal.com/#/file/05c84e23571624b75645247d475ccf88bb51eb8624c4564fd69e5a4ca1a65c96/detection; 
reference:url,www.virustotal.com/#/file/276c235e7c0bc443bf87e02341fb5fe5a1ca1d7e249927fd1b8bd66bd43a70c1/detection; 
classtype:trojan-activity; sid:8000141; rev:1;)

# --------------------
# Date: 2018-06-27
# Title: Pbot: evolving adware
# Tests: pcaps
# Reference: https://securelist.com/pbot-evolving-adware/86242/
#     - https://www.virustotal.com/#/file/5e3dc49c1f4b57ab27000befd128fad77eba9a6e07f8766c7e1393cae890fdf6/detection
#     - https://www.virustotal.com/#/file/d9041db2bbaedf3626d271fa82dc3dfacc153b233f6be5241866bfdb0c5839e5/detection
#     - https://www.virustotal.com/#/file/4105cfbe86187aa66ed30302be96bc9b3925a7baa5da101f4aa40354b1aa10cf/detection
# Confidence: medium
# Note: first rule is derived from the pcap. Remaining rules are derived from reference and the detailed reports of VT 
Tencent HABO

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-OTHER Win.Adware.Pbot variant outbound connection"; 
flow:to_server,established; content:"/collect.php?"; fast_pattern:only; http_uri; content:"pid="; http_uri; 
content:"&cid="; http_uri; content:"&sid="; http_uri; content:"&act="; http_uri; metadata:ruleset community, service 
http; 
reference:url,www.virustotal.com/#/file/5e3dc49c1f4b57ab27000befd128fad77eba9a6e07f8766c7e1393cae890fdf6/detection; 
classtype:trojan-activity; sid:8000142; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-OTHER Win.Adware.Pbot variant outbound connection"; 
flow:to_server,established; content:"/installstarted"; fast_pattern:only; http_uri; content:"&de="; http_uri; 
content:"&_v="; http_uri; content:"&_s="; http_uri; metadata:ruleset community, service http; 
reference:url,www.virustotal.com/#/file/5e3dc49c1f4b57ab27000befd128fad77eba9a6e07f8766c7e1393cae890fdf6/detection; 
classtype:trojan-activity; sid:8000143; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-OTHER Win.Adware.Pbot variant outbound connection"; 
flow:to_server,established; content:"/installended"; fast_pattern:only; http_uri; content:"&de="; http_uri; 
content:"&_v="; http_uri; content:"&_s="; http_uri; metadata:ruleset community, service http; 
reference:url,www.virustotal.com/#/file/5e3dc49c1f4b57ab27000befd128fad77eba9a6e07f8766c7e1393cae890fdf6/detection; 
classtype:trojan-activity; sid:8000144; rev:1;)

# --------------------
# Date: 2018-06-27
# Title: LuckyMouse hits national data center to organize country-level waterholing campaign
# Tests: syntatx only, Shodan, RiskIQ, Censys, ThreatMiner
# Reference: https://securelist.com/luckymouse-hits-national-data-center/86083/
# Confidence: low-
# Note: The droppers and backdoor communicate with specific IP address. According to Shodan
#       RiskIQ, CIRCL (via threatminer.org), and Censys a self-signed TLSv1.0 certificate
#       was Last Seen on 2018-03-27, matching the month of the activity mentioned by the reference.
#       This was the only certificate associated with this IP address within the suspected time
#       frame. However, the same certificate have been associated with multiple IP addresses.
# SHA1: ee14e4ab0b243b397315e094935f5b74a67a1bc7

alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.HyperBro inbound self-signed certificate"; 
flow:to_client,established; content:"|16 03 01|"; content:"|0B|"; distance:3; content:"au"; nocase; 
content:"some-state"; nocase; content:"internet widgets ltd"; nocase; metadata:ruleset community, service ssl; 
classtype:trojan-activity; sid:8000145; rev:1;)

# --------------------
# Date: 2018-06-28
# Title: RadRAT An all-in-one toolkit for complex espionage ops
# Tests: syntatx only, strings found in all samples
# Reference: 
https://download.bitdefender.com/resources/files/News/CaseStudies/study/200/Bitdefender-Whitepaper-RADrat-crea2645-A4-en-EN-interactive.pdf
# Confidence: low--
# Note: All the samples, including the test binaries contained the same network-related artifacts
#       that maybe sig'able. These include the user-agent and the POST URL, and some the dropbox URIs.

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.RadRat outbound connection"; 
flow:to_server,established; urilen:2; content:"Mozilla/5.0 (Windows NT 6.1|3B| WOW64|3B| rv:35.0) Gecko/20100101 
Firefox/35.0"; fast_pattern:only; http_header; content:"/A"; http_uri; content:"POST"; http_method; content:!"Referer"; 
http_method; metadata:ruleset community, service http; 
reference:url,download.bitdefender.com/resources/files/News/CaseStudies/study/200/Bitdefender-Whitepaper-RADrat-crea2645-A4-en-EN-interactive.pdf;
 classtype:trojan-activity; sid:8000146; rev:1;)

# --------------------
# Date: 2018-06-28
# Title: MysteryBot; a new Android banking Trojan ready for Android 7 and 8
# Tests: syntatx only, Android logcat
# Reference: https://www.threatfabric.com/blogs/mysterybot__a_new_android_banking_trojan_ready_for_android_7_and_8.html
# Confidence: low--
# Note: The network artificates displayed by VT Droidy and Tencent HABO are partial. Reviewing the logcat from
#       http://sanddroid.xjtu.edu.cn/report?apk_md5=78DD186DFB6AC49B91B4B16C2F5C1C3F
#       provides a better version of the network artificats, which also match the ones reported by VT and Tencent.
#       The malware appears to be sending a base64 encoded JSON data as a query string.

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Andro.Trojan.MysteryBot banker outbound 
connection"; flow:to_server, established; urilen:250<>300; content:"/gate.php?i=eyAiYW"; fast_pattern:only; http_uri; 
metadata:ruleset community, service http; 
reference:url,www.threatfabric.com/blogs/mysterybot__a_new_android_banking_trojan_ready_for_android_7_and_8.html; 
classtype:trojan-activity; sid:8000147; rev:1;)

Thanks.
YM
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: