""ET TROJAN Suspected Solarwinds Serv-U Backdoor (Incoming)""

SID: 2033321

Revision: 2

Class Type: trojan-activity

Metadata: attack_target Server, created_at 2021_07_14, deployment Perimeter, performance_impact Low, signature_severity Major, updated_at 2021_07_14

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "RhinoSoft"

  • Value: "Serv-U"

  • Value: "\r\nCRhinoUintAttr\r\nLastHour\r\n"

  • Value: ".Archive"

  • Value: "Serv-U-Tray.exe"

  • Value: "window.close|28 29|"

Within:

PCRE:

Special Options:

  • file_data

  • fast_pattern

source