Hi, today I have three rules in the ET open set.
The first to load the encrypted configuration of the LgoogLoader.
alert http any any -> any any (msg: "ET MALWARE [ANY.RUN] LgoogLoader";flow: established, to_server; http.method;content: "HEAD"; http.uri;content: ".CfgEncFile"; endswith; http.header;content: "Content-Length: 0"; http.user_agent; content: "Chrome"; bsize: 6; content:!"Referer|0d 0a|"; reference:md5,69525fa93fd47eb3c533afe3b1baba48; classtype: trojan-activity;sid: 1; rev: 1;)
The second rule is for the PikaBot loader and its requests for loading a DLL using a PowerShell script.
alert http any any -> any any (msg: "ET MALWARE [ANY.RUN] PikaBot";flow: established, to_server; http.method;content: "GET"; http.uri;pcre: "/^\/[a-zA-Z0-9]{1,8}(([0-9][A-Za-z])|([a-z][\dA-Z])|([A-Z][\da-z])|([a-z]\d[\da-z]))[a-zA-Z0-9]{0,8}\/[a-zA-Z0-9]{1,8}(([0-9][A-Za-z])|([a-z][\dA-Z])|([A-Z][\da-z])|([a-z]\d[\da-z]))[a-zA-Z0-9]{0,8}$/";http.host;pcre: "/^(?:(?:\d|[1-9]\d|1\d\d|2[0-4]\d|25[0-5])\.){3}(?:\d|[1-9]\d|1\d\d|2[0-4]\d|25[0-5])(:\d{2,5})?$/R";http.user_agent;content: "WindowsPowerShell"; http.header_names;content: "|0d0a|User-Agent|0d 0a|Host|0d 0a|Connection|0d 0a 0d 0a|";startswith; reference:md5,26c1f8c5631a5b633c324e7986dc7054; classtype: trojan-activity;sid: 2; rev: 1;)
And the third rule on the Redline stealer on the [MC-NMF] .NET Message Framing Protocol for authorization.
alert tcp any any -> any any (msg: "ET MALWARE [ANY.RUN] RedLine (MC-NMF Authorization)";flow: established, to_server;stream_size: server, =, 2;content: "|020B0173040B0161065608440A1E0082AB01400D|Authorization|0803|ns1|9920|"; classtype: trojan-activity; reference:md5,dda288278d0023242afff00556d97d60; sid: 3; rev: 1;)
Unfortunately, I cannot post more than two links, so I am attaching a link to the github.
Tweet about it:)
I wish you a good day and I’m glad to help make the world a little bit safer place, even if only in cyberspace!
Regards, Jane.