""ET TROJAN Echelon/DarkStealer Variant CnC Exfil""

SID: 2030688

Revision: 2

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2020_08_17, deployment Perimeter, malware_family DarkStealer, malware_family Ecehlon, signature_severity Major, updated_at 2020_08_17

Reference:

  • md5

  • fed2a8736c84eda9dcc8533b5019f7d8

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: to_server,established

Contents:

  • Value: "POST"

  • Value: ".php?chatid="

  • Value: "&username="

  • Value: "&machineName="

  • Value: "&Country="

  • Value: "&HWID="

  • Value: "&ip="

  • Value: "|0d 0a|Content-Disposition|3a 20|form-data|3b 20|name=|22|file|22 3b 20|filename=|22|Files"

  • Value: !"Referer|3a|"

  • Value: !"User-Agent|3a|"

Within:

PCRE:

Special Options:

  • http_method

  • http_uri

  • http_uri

  • http_uri

  • http_uri

  • http_uri

  • http_uri

  • fast_pattern

  • http_client_body

  • http_header

  • http_header

source