""ET TROJAN Papercut MF/NG User/Group Sync Python Backdoor Trigger""

SID: 2045611

Revision: 1

Class Type: trojan-activity

Metadata: affected_product HTTP_Server, attack_target Web_Server, created_at 2023_05_05, deployment Perimeter, deployment Internal, deployment SSLDecrypt, confidence High, signature_severity Major, tag Papercut_MF_NG, updated_at 2023_05_05

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HOME_NET

Destination Port: [$HTTP_PORTS,9191]

Flow: established,to_server

Contents:

  • Value: "POST /app HTTP/" Depth: 15

  • Value: "Cookie|3a 20|JSESSIONID|3d|"

  • Value: "service|3d|"

  • Value: "inputUsername"

  • Value: "inputPassword"

  • Value: "|3d|import"

Within:

PCRE:

Special Options:

  • fast_pattern

source