""ET TROJAN SluttyPutty isDebuggerPresent in Fake Putty Executable""
SID: 2030382
Revision: 2
Class Type: trojan-activity
Metadata: attack_target Client_Endpoint, created_at 2020_06_23, deployment Perimeter, performance_impact Low, signature_severity Major, updated_at 2020_06_23
Reference:
-
md5
-
b0dd930c652d1b9350b7c8a29e798cd5
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: $HTTP_PORTS
Destination Network: $HOME_NET
Destination Port: any
Flow: established,to_client
Contents:
-
Value: "|4d 5a|" Depth: 2
-
Value: "https://www.chiark.greenend.org.uk/~sgtatham/putty/"
-
Value: "IsDebuggerPresent"
Within:
PCRE:
Special Options:
- file_data