""ET TROJAN RShell Backdoor Initial CnC Checkin""

SID: 2038540

Revision: 1

Class Type: trojan-activity

Metadata: attack_target Client_and_Server, created_at 2022_08_16, deployment Perimeter, malware_family Rshell, performance_impact Low, signature_severity Major, updated_at 2022_08_16

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: any

Flow: to_server,established

Contents:

  • Value: "|00 00 00 02|guid|00 25 00 00 00|"

Offset: 1

  • Value: "|00 02|hostname"

  • Value: "|00 02|lan"

  • Value: "|00 02|type"

  • Value: "login"

  • Value: "|00 02|username"

  • Value: "|00 02|version"

Within:

PCRE: "/^[a-f0-9]{8}-(?:[a-f0-9]{4}-){3}[a-f0-9]{12}/R"

Special Options:

  • fast_pattern

source