""ET TROJAN Win32/Emotet CnC Checkin Response""
SID: 2035054
Revision: 4
Class Type: trojan-activity
Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2019_03_15, deployment Perimeter, signature_severity Major, tag Emotet, updated_at 2019_03_20
Reference:
-
md5
-
4ca520895d86beb6f8cab93639f26f50
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: [7080,8080,443,80,4143,995,21,50000,20,8090,8443,990,22]
Destination Network: $HOME_NET
Destination Port: any
Flow: established,to_client
Contents:
-
Value: "HTTP/1.1 200 OK|0d 0a|Server|3a|" Depth: 24
-
Value: "Content-Type|3a 20|text/html|3b 20|charset=UTF-8|0d 0a|Content-Length|3a 20|132|0d 0a|"
-
Value: "|78 63 e0 c7 31 a5 dd f1 f4 55 30 e4 67 f7 ab f2 c6 68 a2 26|"
Within:
PCRE:
Special Options:
- fast_pattern