""ET TROJAN [PT MALWARE] Hacked Mikrotik C2 Request""
SID: 2026027
Revision: 2
Class Type: trojan-activity
Metadata: created_at 2018_08_23, deployment Perimeter, performance_impact Moderate, signature_severity Major, updated_at 2018_08_23, reviewed_at 2024_02_16
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: any
Destination Port: any
Flow: established, to_server
Contents:
-
Value: "GET|20|/mikrotik.php|0d 0a|Host|3a 20|" Depth: 25
-
Value: "|0d 0a|User-Agent|3a 20|Mikrotik/6.x Fetch|0d 0a|"
-
Value: !"|0d 0a|Accept"
-
Value: !"|0d 0a|Referer|3a 20|"
Within:
PCRE:
Special Options:
- fast_pattern