""ET TROJAN Papercut MF/NG User/Group Sync FTP Backdoor trigger""

SID: 2045612

Revision: 1

Class Type: trojan-activity

Metadata: affected_product HTTP_Server, attack_target Web_Server, created_at 2023_05_05, deployment Perimeter, deployment Internal, deployment SSLDecrypt, performance_impact Low, confidence High, signature_severity Major, tag Papercut_MF_NG, updated_at 2023_05_05

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HOME_NET

Destination Port: [$HTTP_PORTS,9191]

Flow: established,to_server

Contents:

  • Value: "POST /app HTTP/" Depth: 15

  • Value: "Cookie|3a 20|JSESSIONID|3d|"

  • Value: "Form0|3d|"

  • Value: "inputUsername"

  • Value: "inputPassword"

  • Value: "|3d 21|"

Within:

PCRE:

Special Options:

  • fast_pattern

source