""ET TROJAN Linux.Ngioweb Stage 1 CnC Activity Client Request (set)""

SID: 2027507

Revision: 2

Class Type: trojan-activity

Metadata: affected_product Linux, attack_target Client_Endpoint, created_at 2019_06_21, deployment Perimeter, performance_impact Low, signature_severity Major, updated_at 2019_06_21

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: [$HTTP_PORTS,443]

Flow: established,to_server

Contents:

  • Value: "GET|20|/min.js?h=aWQ9" Depth: 18

  • Value: "User-Agent|3a 20|Mozilla/5.0|20 28|Windows NT 10.0|3b 20|Win64|3b 20|x64|3b 20|rv:59.0|29| Gecko/20100101 Firefox/59.0"

Within:

PCRE:

Special Options:

  • fast_pattern

source