""ET TROJAN [ANY.RUN] Stealc/Vidar Stealer TLS Certificate""
SID: 2049253
Revision: 1
Class Type: trojan-activity
Metadata: attack_target Client_Endpoint, created_at 2023_11_17, deployment Perimeter, malware_family Stealc, malware_family VidarStealer, confidence High, signature_severity Major, updated_at 2023_12_28
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: 443
Destination Network: $HOME_NET
Destination Port: any
Flow: established,to_client
Contents:
-
Value: "|16|"
-
Value: "|0b|"
-
Value: "|06 03 55 04 03|"
-
Value: "|00|"
-
Value: "|06 03 55 04 0b|"
-
Value: "|09|privateIP"
-
Value: "|06 03 55 04 0a|"
-
Value: "|08|StaticIP"
-
Value: "|06 03 55 04 07|"
-
Value: "|02|NY"
-
Value: "|06 03 55 04 08|"
-
Value: "|02|NY"
-
Value: "|06 03 55 04 06|"
-
Value: "|02|XX"
Within: 3
PCRE: "/^(?:25[0-5]|2[0-4]\d|[0-1]?\d{1,2})(?:.(?:25[0-5]|2[0-4]\d|[0-1]?\d{1,2})){3}$/R"
Special Options:
- fast_pattern