""ET TROJAN [ANY.RUN] Hydrochasma Fast Reverse Proxy M3""

SID: 2046950

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_07_27, deployment Perimeter, malware_family hydrochasma, confidence High, signature_severity Critical, updated_at 2023_07_27

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "|16 03 01 00 ee 01 00 00 ea 03 03|" Depth: 11 Offset: 3

  • Value: "|20|"

  • Value: "|00 26|"

  • Value: "|c0|"

  • Value: "|c0|"

  • Value: "|c0 09 c0 13 c0 0a c0 14 00 9c 00 9d 00 2f 00 35 c0 12 00 0a 13|"

  • Value: "|13|"

  • Value: "|13|"

  • Value: "|01 00 00 7b 00 05 00 05 01 00 00 00 00 00 0a 00 0a 00 08 00 1d 00 17 00 18 00 19 00 0b 00 02 01 00 00 0d 00 1a 00 18 08 04 04 03 08 07 08 05 08 06 04 01 05 01 06 01 05 03 06 03 02 01 02 03 ff 01 00 01 00 00 12 00 00 00 2b 00 09 08 03 04 03 03 03 02 03 01 00 33 00 26 00 24 00 1d 00 20|"

  • Value: "|14 03 03 00 01 01 17 03 03 00 35|"

  • Value: "|17 03 03 00|"

Within: 4

PCRE:

Special Options:

  • fast_pattern

source