SID: 2036995

Revision: 1

Class Type: trojan-activity

Metadata: attack_target Client_Endpoint, created_at 2022_06_15, deployment Perimeter, malware_family Mongall, malware_family Loxes, malware_family AoqinDragon, signature_severity Major, updated_at 2022_06_15

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET"

  • Value: !"."

  • Value: !"?"

  • Value: !"&"

  • Value: "User-Agent|3a 20|Mozilla/5.0 (Windows NT 6.1|3b|WOW64) AppleWebKit|20|/537.36 (KHTML,like Gecko) chrome/40.0.2214.115 safari|20|/537.36"

  • Value: !"Referer"

  • Value: !"Content"

Within:

PCRE: "/^\/(?:[a-zA-Z0-9=]{60,408})$/U"

Special Options:

  • http_method

  • http_uri

  • http_uri

  • http_uri

  • http_header

  • http_header

  • http_header

source