Hi,
NOTE: %2A is * as when done in this page it ends up putting the fields into bold. so it should be ** wrapping the new user one after text and then for the others it comes after like VALUE: asterisk asterisk
Two sigs based on the report in the reference. Packets shown on page 5 & 6. As it is to wetransfers and telegram HTTPS decryption will be required.
Now the two elements I am unsure of:
- Sig 1: If the client body is normalized by HTTP. I assume it will be so &text=%2A%2ANew%20User%20Ran%20the%20Application%2A%2A should be actually &test=New User Ran the Application. So structure would be this (from report)
New User Ran the Application
Username: Admin
PC Name: UUHJKMQK
IP Address:
- Is a multi-part stream with ZIPs sent (PK) and then various fields like content:“form-data|3B| name=|22|pcname|22|”; http_client_body; which I have focused on. Just verify these are right.
alert tcp $HOME_NET any → $EXTERNAL_NET $HTTP_PORTS (msg:“ET MALWARE TerraStealerV2 Initial To Telegram API”; flow:established,to_server; content:“POST”; http_method; content:“/sendMessage?chat_id=”; http_uri; content:“Host|3A| api.telegram.org”; http_header; fast_pattern:6,16; content:“chat_id=”; http_client_body; depth:8; content:“&text=%2A%2ANew%20User%20Ran%20the%20Application%2A%2A”; http_client_body; distance:0; content:“Username%3A%2A%2A”; distance:0; content:“PC%20Name%3A%2A%2A”; distance:0; content:“IP%20Address%3A%2A%2A”; distance:0; classtype:trojan-activity; reference:url,go.recordedfuture.com/hubfs/reports/cta-2025-0501.pdf; sid:155001; rev:1;)
alert tcp $HOME_NET any → $EXTERNAL_NET $HTTP_PORTS (msg:“ET MALWARE TerraStealerV2 WeTransfers Data Exfiltration”; content:“POST”; http_method; content:“/uplo.php”; http_uri; depth:9; content:“Host|3A| wetransfers.io”; http_header; fast_pattern:6,14; content:“form-data|3B| name=|22|pcname|22|”; http_client_body; content:“form-data|3B| name=|22|username|22|”; http_client_body; distance:0; content:“form-data|3B| name=|22|totalwallets|22|”; http_client_body; distance:0; content:“form-data|3B| name=|22|ip|22|”; http_client_body; distance:0; ; classtype:trojan-activity; reference:url,go.recordedfuture.com/hubfs/reports/cta-2025-0501.pdf; sid:155002; rev:1;)
Kind Regards,
Kevin Ross