""ET TROJAN RaccoonStealer Admin Console Inbound""
SID: 2044933
Revision: 2
Class Type: trojan-activity
Metadata: attack_target Client_Endpoint, created_at 2023_04_13, deployment Perimeter, deployment SSLDecrypt, malware_family Raccoon_Stealer, confidence High, signature_severity Major, updated_at 2023_12_13
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: $HTTP_PORTS
Destination Network: $HOME_NET
Destination Port: any
Flow: established,to_client
Contents:
-
Value: "class|3d 22|MuiOutlinedInput|2d|notchedOutline"
-
Value: "data|2d|testid|3d 22|AccountCircleTwoToneIcon|22 3e|"
-
Value: "|3c|b|3e 5b 3c 2f|b|3e 20|welcome|20|back|20 3c|b|3e 5d 3c 2f|b|3e|"
-
Value: "|3c|span|3e|Username|3c 2f|span|3e|"
Within:
PCRE:
Special Options:
- file_data