Snort mailing list archives
Muhstik Botnet scan requests
From: Y M via Snort-sigs <snort-sigs () lists snort org>
Date: Fri, 25 May 2018 18:43:11 +0000
Hi, The rules detect Muhstik botnet user-agent scanning (inbound/outbound) devices for further exploitation as explained in the references. No pcaps available. # -------------------- # Date: 2018-05-08 # Title: Muhstik Botnet # Reference: https://twitter.com/GreyNoiseIO/status/992524772180414464, https://blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/ alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-OTHER muhstik botnet inbound HTTP scanner request"; flow:to_server,established; content:"User-Agent: muhstik-scan"; fast_pattern:only; http_header; metadata:ruleset community; reference:url,blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/; reference:url,twitter.com/GreyNoiseIO/status/992524772180414464; classtype:attempted-recon; sid:8000049; rev:1;) alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER muhstik botnet outbound HTTP scanner request"; flow:to_server,established; content:"User-Agent: muhstik-scan"; fast_pattern:only; http_header; metadata:ruleset community; reference:url,blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/; reference:url,twitter.com/GreyNoiseIO/status/992524772180414464; classtype:attempted-recon; sid:8000050; rev:1;) Thanks. YM
_______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org https://lists.snort.org/mailman/listinfo/snort-sigs Please visit http://blog.snort.org for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
Current thread:
- Muhstik Botnet scan requests Y M via Snort-sigs (May 25)
