Hi, together with @g0njxa we found a loader(Sniffthem/Tnaket) and a clipper (Diamotrix)
here is the signature for the clipper:
URI:
alert http any any -> any any (msg: "ET MALWARE [ANY.RUN] Request a wallet for Diamotrix Clipper (URI)";
flow: established, to_server; http.method;
content: "POST";
http.uri;
content: "/api.php?{"; startswith;
pcre: "/[A-F0-9]{22}\}$/R";
http.header_names;
content: "Host|0d 0a|Pragma|0d 0a|Content-type|0d 0a|Connection|0d 0a|User-Agent|0d 0a 0d 0a|";
reference:md5,3c27e63a0c9d27904ff83662519c0d9d;
reference:url,community.emergingthreats.net/t/diamotrixclipper;
metadata: attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, signature_severity Major, malware_family DiamotrixClipper, tag clipper, created_at 2024_08_30; classtype: command-and-control;
sid: 1; rev: 1;)
User-Agent:
alert http any any -> any any (msg: "ET MALWARE [ANY.RUN] Request a wallet for Diamotrix Clipper (User-Agent)";
flow: established, to_server;
http.user_agent;
content: "Diamotrix"; bsize: 9;
http.header;
content:!"Referer|0d 0a|";
reference: md5, 3c27e63a0c9d27904ff83662519c0d9d;
reference: url,community.emergingthreats.net/t/diamotrixclipper;
metadata: attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, signature_severity Major, id 5902726, malware_family DiamotrixClipper, tag clipper, created_at 2024_08_30; classtype: command-and-control;
sid: 2; rev: 1;)
Best regards
Jane