""ET TROJAN Python Monero Miner CnC DNS Query""

SID: 2025183

Revision: 4

Class Type: trojan-activity

Metadata: affected_product Linux, attack_target Client_Endpoint, created_at 2018_01_04, deployment Perimeter, signature_severity Major, tag Cryptominer, updated_at 2022_05_03

Reference:

Protocol: udp

Source Network: $HOME_NET

Source Port: any

Destination Network: any

Destination Port: 53

Flow:

Contents:

  • Value: "|01|" Depth: 1 Offset: 2

  • Value: "|00 01 00 00 00 00 00|"

  • Value: "|04|zsw8|02|cc|00|"

Within: 7

PCRE: "/\x01[a-z]\x04zsw8\x02cc\x00/"

Special Options:

  • nocase

  • fast_pattern

source