""ET ATTACK_RESPONSE VBA/Subdoc.B Obfuscated Payload Inbound""

SID: 2039080

Revision: 2

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2022_10_03, deployment Perimeter, signature_severity Major, updated_at 2023_04_03, reviewed_at 2024_01_26, mitre_tactic_id TA0005, mitre_tactic_name Defense_Evasion, mitre_technique_id T1027, mitre_technique_name Obfuscated_Files_or_Information

Reference:

  • md5

  • 9a6d8883adc662b4f53cd0b9cd1b28c3

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "200"

  • Value: "Content|2d|Type|3a 20|text|2f|plain|0d 0a|"

  • Value: "|25 7b 20 5b|System|2e|Text|2e|Encoding|5d 3a 3a|UTF8|2e|GetString|28 5b|System|2e|Convert|5d 3a 3a|ToInt32|28 24 5f 2c|2|29 29 20 7d|"

  • Value: "|3b 28 5b|system|2e|String|5d 3a 3a|Join|28 27 27 2c 20 24|"

Within:

PCRE: "/\x24[0-9A-Za-z]{1,5}\x3d\x28\x27?(?:[0-9]{8}\x2c){4,}/"

Special Options:

  • http_stat_code

  • http_header

  • file_data

source