""ET TROJAN Possible ICMP Backdoor Tunnel Command - whoami""

SID: 2027763

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2019_07_29, deployment Perimeter, performance_impact Moderate, signature_severity Major, updated_at 2019_07_29

Reference:

Protocol: icmp

Source Network: any

Source Port: any

Destination Network: any

Destination Port: any

Flow:

Contents:

  • Value: "whoami" Depth: 6

Within:

PCRE:

Special Options:

  • nocase

source