""ET MOBILE_MALWARE Android/Spy.Kasandra.A Checkin""

SID: 2018888

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Android, attack_target Mobile_Client, created_at 2014_08_04, deployment Perimeter, former_category MOBILE_MALWARE, tag Android, updated_at 2022_05_03, mitre_tactic_id TA0037, mitre_tactic_name Command_And_Control, mitre_technique_id T1041, mitre_technique_name Exfiltration_Over_C2_Channel

Reference:

  • md5

  • 6df6553b115d9ed837161a9e67146ecf

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "POST"

  • Value: "/path/DeviceManager.php" Depth: 23

  • Value: "func=" Depth: 5

  • Value: "&deviceid="

  • Value: !"Accept"

  • Value: !"Referer|3a|"

Within:

PCRE:

Special Options:

  • http_method

  • nocase

  • http_uri

  • http_client_body

  • http_client_body

  • http_header

  • http_header

source