""ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex)""
SID: 2022627
Revision: 11
Class Type: trojan-activity
Metadata: attack_target Client_and_Server, created_at 2016_03_17, deployment Perimeter, performance_impact Low, signature_severity Major, tag SSL_Malicious_Cert, updated_at 2016_12_20, mitre_tactic_id TA0011, mitre_tactic_name Command_And_Control, mitre_technique_id T1071, mitre_technique_name Application_Layer_Protocol
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: $HOME_NET
Destination Port: any
Flow: established,from_server
Contents:
-
Value: "|03 02 01 02 02 09 00|"
-
Value: "|30 09 06 03 55 04 06 13 02|"
-
Value: !"|55 04 08|"
-
Value: "|55 04 07|"
-
Value: "|55 04 0a|"
-
Value: "|55 04 03|"
-
Value: !"|2a 86 48 86 f7 0d 01 09 01|"
Within:
PCRE: "/^.{2}(?:(?:\d[A-Z]?|[A-Z]\d?)[a-z]{6,20}|[A-Z]?[a-z]{3,7}\d[a-z]{3,7}).(?:(?:\d[A-Z]?|[A-Z]\d?)[a-z]{6,20}|[A-Z]?[a-z]{3,7}\d[a-z]{3,7}).(?!(?:com|net|org)[01])[a-z]{2,}[01]/Rs"
Special Options:
- fast_pattern