""ET TROJAN ELF/Roboto - Possible Encrypted Roboto P2P Payload Requested M2""

SID: 2029041

Revision: 2

Class Type: trojan-activity

Metadata: affected_product Linux, created_at 2019_11_21, deployment Perimeter, deployment Internal, malware_family Roboto, signature_severity Major, updated_at 2019_11_21

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET"

  • Value: "/community/uploadxx/" Depth: 20

  • Value: ".jpg"

Within:

PCRE: "/^\/community\/uploadxx\/[A-F0-9]{8}(?:-[A-F0-9]{4}){3}-[A-F0-9]{12}\/[.]+.jpg$/U"

Special Options:

  • http_method

  • http_uri

  • fast_pattern

  • http_uri

source