Created
June 23, 2021 17:06
-
-
Save malwareforme/ad33af6b8a8a5a5477ff45292c1ea6dc to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE Win32/Unk.Lebov Stealer CnC Exfil"; flow:established,to_server; http.method; content:"POST"; http.uri; content:".php"; endswith; http.request_body; content:"Content-Disposition|3a 20|form-data|3b 20|name=|22|file|22 0d 0a 0d 0a|"; content:".zip|0d 0a|"; distance:0; within:50; content:"|0d 0a|PK"; distance:0; content:"system.txt"; distance:0; fast_pattern; http.header_names; content:!"Referer"; content:!"User-Agent"; reference:md5,8124a572f854007e63cc7337547a37af; classtype:trojan-activity; sid:12345; rev:1;) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment