""ET TROJAN Possible MSIL/Solorigate.G!dha/SUPERNOVA Webshell Access Request""
SID: 2031436
Revision: 3
Class Type: trojan-activity
Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Server, created_at 2020_12_21, deployment Perimeter, malware_family Solorigate, signature_severity Major, updated_at 2022_05_03, reviewed_at 2024_03_05
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: any
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "GET"
-
Value: "/logoimagehandler.ashx"
-
Value: "clazz="
-
Value: "method="
-
Value: "args="
-
Value: "codes="
-
Value: !"Referer|3a|"
Within:
PCRE:
Special Options:
-
http_method
-
http_uri
-
http_uri
-
fast_pattern
-
http_uri
-
http_uri
-
http_uri
-
http_header