""ET TROJAN Dridex/Bugat/Feodo GET Checkin""

SID: 2018772

Revision: 3

Class Type: trojan-activity

Metadata: created_at 2014_07_24, updated_at 2014_10_20

Reference:

  • md5

  • 2ddb6cb347eb7939545a1801c72f1f3f

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET"

  • Value: "Host|3a 20|" Depth: 6

  • Value: "Content-Type|3a 20|octet/binary|0d 0a|Accept|3a 20|/|0d 0a|"

  • Value: !"Referer|3a|"

  • Value: !"Accept-Encoding|3a|"

Within:

PCRE: "/^Host\x3a\x20\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}(?:\x3a\d{1,5})?\r\nConnection\x3a[^\r\n]+?\r\nUser-Agent\x3a[^\r\n]+?\r\nContent-Type\x3a\x20octet\/binary\r\nAccept\x3a\x20*\/*\r\nAccept-Language\x3a[^\r\n]+?\r\n(?:\r\n)?$/H"

Special Options:

  • http_method

  • http_header

  • http_header

  • http_header

  • http_header

source