""ET TROJAN AMOS CnC Exfiltration - /p2p (POST) M2""

SID: 2052605

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, tls_state plaintext, created_at 2024_05_14, deployment Perimeter, confidence High, signature_severity Critical, tag c2, updated_at 2024_05_14, mitre_tactic_id TA0011, mitre_tactic_name Command_And_Control, mitre_technique_id T1071, mitre_technique_name Application_Layer_Protocol

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "POST"

  • Value: "/p2p"

  • Value: "|0d 0a|uuid|3a 20|"

  • Value: "|0d 0a|user|3a 20|Lackycat888|0d 0a|"

  • Value: "|50 4b|" Depth: 2

  • Value: !"Referer|3a 20|"

  • Value: "|0d 0a|uuid|3a 20|"

Within:

PCRE: "/[\r\n]uuid\x3a\x20[a-f0-9]{8}\x2d[a-f0-9]{4}\x2d[a-f0-9]{4}\x2d[a-f0-9]{4}\x2d[a-f0-9]{12}[\r\n]/H"

Special Options:

  • http_method

  • http_uri

  • http_header

  • http_header

  • fast_pattern

  • http_client_body

  • http_header

  • nocase

  • http_header

source