""ET TROJAN S400 RAT Client Checkin via Discord""

SID: 2034065

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2021_09_30, deployment Perimeter, deployment SSLDecrypt, malware_family S400, signature_severity Major, tag RAT, updated_at 2021_09_30

Reference:

  • md5

  • 41ca8d5782ef5ac7a371b44f51dc48d9

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "Host|3a 20|discord"

  • Value: "Host|3a 20|.com|0d 0a|"

  • Value: "content=S-400+RAT+%3a" Depth: 21

  • Value: "%0d%0ainformation"

  • Value: "POST /api/webhooks/" Depth: 19

Within:

PCRE:

Special Options:

  • http_header

  • fast_pattern

  • http_client_body

  • http_client_body

source