""ET TROJAN Possible Dragonfly APT Activity - SMB credential harvesting""
SID: 2024898
Revision: 1
Class Type: trojan-activity
Metadata: attack_target Client_Endpoint, created_at 2017_10_23, deployment Perimeter, signature_severity Major, updated_at 2017_10_23
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: any
Destination Port: 445
Flow: established,to_server
Contents:
-
Value: "|FF|SMB|75 00 00 00 00|" Depth: 9 Offset: 4
-
Value: "|08 00 01 00|"
-
Value: "|00 5c 5c|"
-
Value: "|5c|AME_ICON.PNG"
Within: 3
PCRE:
Special Options:
- fast_pattern