""ET TROJAN ELF/Roboto - Possible Encrypted Roboto P2P Payload Requested M1""

SID: 2029040

Revision: 4

Class Type: trojan-activity

Metadata: affected_product Linux, created_at 2019_11_21, deployment Perimeter, deployment Internal, malware_family Roboto, performance_impact Low, signature_severity Major, updated_at 2021_08_06

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET"

  • Value: "/roboto."

  • Value: !"Windows"

  • Value: !"Referer|3a 20|"

Within:

PCRE: "/\/roboto.tt[cf]$/U"

Special Options:

  • http_method

  • http_uri

  • fast_pattern

  • http_header

  • http_header

source