SIGS: TerraStealerV2

Hi,

NOTE: %2A is * as when done in this page it ends up putting the fields into bold. so it should be ** wrapping the new user one after text and then for the others it comes after like VALUE: asterisk asterisk

Two sigs based on the report in the reference. Packets shown on page 5 & 6. As it is to wetransfers and telegram HTTPS decryption will be required.

Now the two elements I am unsure of:

  • Sig 1: If the client body is normalized by HTTP. I assume it will be so &text=%2A%2ANew%20User%20Ran%20the%20Application%2A%2A should be actually &test=New User Ran the Application. So structure would be this (from report)
    New User Ran the Application
    Username: Admin
    PC Name: UUHJKMQK
    IP Address:
  1. Is a multi-part stream with ZIPs sent (PK) and then various fields like content:“form-data|3B| name=|22|pcname|22|”; http_client_body; which I have focused on. Just verify these are right.

alert tcp $HOME_NET any → $EXTERNAL_NET $HTTP_PORTS (msg:“ET MALWARE TerraStealerV2 Initial To Telegram API”; flow:established,to_server; content:“POST”; http_method; content:“/sendMessage?chat_id=”; http_uri; content:“Host|3A| api.telegram.org”; http_header; fast_pattern:6,16; content:“chat_id=”; http_client_body; depth:8; content:“&text=%2A%2ANew%20User%20Ran%20the%20Application%2A%2A”; http_client_body; distance:0; content:“Username%3A%2A%2A”; distance:0; content:“PC%20Name%3A%2A%2A”; distance:0; content:“IP%20Address%3A%2A%2A”; distance:0; classtype:trojan-activity; reference:url,go.recordedfuture.com/hubfs/reports/cta-2025-0501.pdf; sid:155001; rev:1;)

alert tcp $HOME_NET any → $EXTERNAL_NET $HTTP_PORTS (msg:“ET MALWARE TerraStealerV2 WeTransfers Data Exfiltration”; content:“POST”; http_method; content:“/uplo.php”; http_uri; depth:9; content:“Host|3A| wetransfers.io”; http_header; fast_pattern:6,14; content:“form-data|3B| name=|22|pcname|22|”; http_client_body; content:“form-data|3B| name=|22|username|22|”; http_client_body; distance:0; content:“form-data|3B| name=|22|totalwallets|22|”; http_client_body; distance:0; content:“form-data|3B| name=|22|ip|22|”; http_client_body; distance:0; ; classtype:trojan-activity; reference:url,go.recordedfuture.com/hubfs/reports/cta-2025-0501.pdf; sid:155002; rev:1;)

Kind Regards,
Kevin Ross

2 Likes

Morning @kevross33 !

I’ll take a look at these today and share the sids once they are available.

Thanks for the tip!
Isaac

1 Like

@kevross33

2062074 - ET MALWARE TerraStealerV2 New Victim Checkin via Telegram API
2062097 - ET MALWARE TerraStealerV2 Data Exfil via WeTransfers
2062101 - ET MALWARE TerraStealerV2 Victim Checkin via Telegram API (Wallet Count)
2062102 - ET MALWARE TerraStealerV2 CnC Telegram Bot Response

Have a Great weekend!
Isaac