""ET EXPLOIT Possible DOUBLEPULSAR Beacon Response""

SID: 2024216

Revision: 2

Class Type: trojan-activity

Metadata: attack_target Client_Endpoint, created_at 2017_04_17, deployment Perimeter, deployment Internal, signature_severity Major, tag c2, updated_at 2017_04_17, mitre_tactic_id TA0011, mitre_tactic_name Command_And_Control, mitre_technique_id T1041, mitre_technique_name Exfiltration_Over_C2_Channel

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: 445

Destination Network: any

Destination Port: any

Flow: from_server,established

Contents:

  • Value: "|00 00 00 23 ff|SMB2|02 00 00 c0 98 07 c0 00 00|" Depth: 18

  • Value: "|00 00 00 08 ff fe 00 08|"

  • Value: "|00 00 00|"

Within: 3

PCRE: "/^[\x50-\x59]/R"

Special Options:

  • fast_pattern

source