""ET TROJAN Ransomware.Hidden-Tear Variant CnC Checkin""

SID: 2034675

Revision: 2

Class Type: trojan-activity

Metadata: attack_target Client_Endpoint, created_at 2016_03_29, deployment Perimeter, performance_impact Low, signature_severity Major, tag Ransomware, updated_at 2023_10_02, reviewed_at 2023_10_02, mitre_tactic_id TA0040, mitre_tactic_name Impact, mitre_technique_id T1486, mitre_technique_name Data_Encrypted_for_Impact

Reference:

  • md5

  • 5ae92b52b0a6df8a64a5f98700bc290f

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET"

  • Value: ".php?info="

  • Value: !"/CADability.php"

  • Value: "|20|HTTP/1.1|0d 0a|Host|3a|"

  • Value: !"User-Agent|3a|"

  • Value: !"Accept"

  • Value: !"Referer|3a|"

Within:

PCRE: "/^Host\x3a\x20[^\r\n]+\r\nConnection\x3a\x20Keep-Alive\r\n(?:\r\n)?$/Hmi"

Special Options:

  • http_method

  • http_uri

  • http_uri

  • nocase

  • http_header

  • http_header

  • http_header

source