""ET TROJAN Suspected Solarwinds Serv-U Backdoor (Incoming)""
SID: 2033321
Revision: 2
Class Type: trojan-activity
Metadata: attack_target Server, created_at 2021_07_14, deployment Perimeter, performance_impact Low, signature_severity Major, updated_at 2021_07_14
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: $HTTP_PORTS
Destination Network: $HOME_NET
Destination Port: any
Flow: established,to_client
Contents:
-
Value: "RhinoSoft"
-
Value: "Serv-U"
-
Value: "\r\nCRhinoUintAttr\r\nLastHour\r\n"
-
Value: ".Archive"
-
Value: "Serv-U-Tray.exe"
-
Value: "window.close|28 29|"
Within:
PCRE:
Special Options:
-
file_data
-
fast_pattern