""ET TROJAN DCRAT Checkin via Telegram""
SID: 2043288
Revision: 1
Class Type: trojan-activity
Metadata: attack_target Client_Endpoint, created_at 2023_01_12, deployment Perimeter, deployment SSLDecrypt, malware_family DCRat, performance_impact Low, signature_severity Major, updated_at 2023_01_12
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "/bot" Depth: 4
-
Value: "|2f|sendPhoto|3f|chat|5f|id|3d|"
-
Value: "caption|3d e2 9d 95 20|User|20|connected|20 e2 9d 95|"
-
Value: "|e2 80 a2 20|ID|3a 20|"
-
Value: "|0a e2 80 a2 20|Comment|3a 20|"
-
Value: "|0a 0a e2 80 a2 20|User|20|Name|3a 20|"
-
Value: "|0a e2 80 a2 20|PC|20|Name|3a 20|"
-
Value: "|0a e2 80 a2 20|OS|20|Info|3a 20|"
-
Value: "|0a e2 80 a2 20|IP|3a 20|"
-
Value: "|0a e2 80 a2 20|GEO|3a 20|"
-
Value: "|e2 80 a2 20|Working|20|Directory|3a 20|"
-
Value: "api.telegram.org"
Within: 100
PCRE: "/^Host\x3a\x20[^\r\n]+api.telegram.org/Hmi"
Special Options:
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
fast_pattern
-
http_header