""ET TROJAN Possible Dyre SSL Cert M2 (L CN)""

SID: 2021433

Revision: 2

Class Type: trojan-activity

Metadata: attack_target Client_Endpoint, created_at 2015_07_17, deployment Perimeter, signature_severity Major, tag SSL_Malicious_Cert, updated_at 2019_08_15

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: [443,4443]

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "|16|"

  • Value: "|0b|"

  • Value: "|02 09 00|"

  • Value: "|06 03 55 04 06 13 02|"

  • Value: "|30 09 06 03 55 04 08 0c 02|"

  • Value: "|06 03 55 04 07 0c|"

  • Value: "|06 03 55 04 0a 0c|"

  • Value: !"|20|"

  • Value: "|06 03 55 04 03 0c|"

  • Value: !"|2e|"

  • Value: !"|2a|"

Within: cnlen

PCRE: "/^(?=[a-z0-9]{0,119}[A-Z])(?=[A-Z0-9]{0,119}[a-z])(?P[a-zA-Z0-9]{10,120}[01]).+?\x55\x04\x03.{2}(?P=var)/Rs"

Special Options:

  • fast_pattern

source