""ET EXPLOIT Actiontec C1000A backdoor account M1""

SID: 2025080

Revision: 3

Class Type: attempted-admin

Metadata: affected_product Linux, attack_target IoT, created_at 2017_11_28, deployment Perimeter, malware_family Mirai, performance_impact Low, signature_severity Major, updated_at 2017_11_29

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HOME_NET

Destination Port: [23,2323]

Flow: established,to_server

Contents:

  • Value: "QwestM0dem"

Within:

PCRE:

Special Options:

source