""ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex)""

SID: 2022627

Revision: 11

Class Type: trojan-activity

Metadata: attack_target Client_and_Server, created_at 2016_03_17, deployment Perimeter, performance_impact Low, signature_severity Major, tag SSL_Malicious_Cert, updated_at 2016_12_20, mitre_tactic_id TA0011, mitre_tactic_name Command_And_Control, mitre_technique_id T1071, mitre_technique_name Application_Layer_Protocol

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "|03 02 01 02 02 09 00|"

  • Value: "|30 09 06 03 55 04 06 13 02|"

  • Value: !"|55 04 08|"

  • Value: "|55 04 07|"

  • Value: "|55 04 0a|"

  • Value: "|55 04 03|"

  • Value: !"|2a 86 48 86 f7 0d 01 09 01|"

Within:

PCRE: "/^.{2}(?:(?:\d[A-Z]?|[A-Z]\d?)[a-z]{6,20}|[A-Z]?[a-z]{3,7}\d[a-z]{3,7}).(?:(?:\d[A-Z]?|[A-Z]\d?)[a-z]{6,20}|[A-Z]?[a-z]{3,7}\d[a-z]{3,7}).(?!(?:com|net|org)[01])[a-z]{2,}[01]/Rs"

Special Options:

  • fast_pattern

source