""ET TROJAN Win32/IcedID Requesting Encoded Binary M5""

SID: 2031298

Revision: 4

Class Type: trojan-activity

Metadata: attack_target Client_Endpoint, created_at 2020_12_08, deployment Perimeter, deployment SSLDecrypt, malware_family IcedID, performance_impact Moderate, signature_severity Major, updated_at 2020_12_18

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET"

  • Value: "__io_r=" Depth: 7

  • Value: "|3b 20|__io_vl="

  • Value: "|3b 20|__io_bl="

  • Value: "|3b 20|Session_id="

  • Value: "|3b 20|__io_uniq="

  • Value: "|3b 20|__io_f="

  • Value: "HTTP/1.1|0d 0a|Connection|3a 20|Keep-Alive|0d 0a|Cookie|3a 20|__io_r="

Within:

PCRE: "/^Connection[^\r\n]+\r\nCookie[^\r\n]+\r\nHost[^\r\n]+\r\n(?:\r\n)?$/H"

Special Options:

  • http_method

  • http_cookie

  • http_cookie

  • http_cookie

  • http_cookie

  • http_cookie

  • http_cookie

source