""ET TROJAN [ANY.RUN] Hydrochasma Fast Reverse Proxy M3""
SID: 2046950
Revision: 1
Class Type: trojan-activity
Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_07_27, deployment Perimeter, malware_family hydrochasma, confidence High, signature_severity Critical, updated_at 2023_07_27
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: any
Flow: established,to_server
Contents:
-
Value: "|16 03 01 00 ee 01 00 00 ea 03 03|" Depth: 11 Offset: 3
-
Value: "|20|"
-
Value: "|00 26|"
-
Value: "|c0|"
-
Value: "|c0|"
-
Value: "|c0 09 c0 13 c0 0a c0 14 00 9c 00 9d 00 2f 00 35 c0 12 00 0a 13|"
-
Value: "|13|"
-
Value: "|13|"
-
Value: "|01 00 00 7b 00 05 00 05 01 00 00 00 00 00 0a 00 0a 00 08 00 1d 00 17 00 18 00 19 00 0b 00 02 01 00 00 0d 00 1a 00 18 08 04 04 03 08 07 08 05 08 06 04 01 05 01 06 01 05 03 06 03 02 01 02 03 ff 01 00 01 00 00 12 00 00 00 2b 00 09 08 03 04 03 03 03 02 03 01 00 33 00 26 00 24 00 1d 00 20|"
-
Value: "|14 03 03 00 01 01 17 03 03 00 35|"
-
Value: "|17 03 03 00|"
Within: 4
PCRE:
Special Options:
- fast_pattern