Snort mailing list archives

Muhstik Botnet scan requests


From: Y M via Snort-sigs <snort-sigs () lists snort org>
Date: Fri, 25 May 2018 18:43:11 +0000

Hi,

The rules detect Muhstik botnet user-agent scanning (inbound/outbound) devices for further exploitation as explained in 
the references. No pcaps available.

# --------------------
# Date: 2018-05-08
# Title: Muhstik Botnet
# Reference: https://twitter.com/GreyNoiseIO/status/992524772180414464, 
https://blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/

alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-OTHER muhstik botnet inbound HTTP scanner request"; 
flow:to_server,established; content:"User-Agent: muhstik-scan"; fast_pattern:only; http_header; metadata:ruleset 
community; reference:url,blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/; 
reference:url,twitter.com/GreyNoiseIO/status/992524772180414464; classtype:attempted-recon; sid:8000049; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER muhstik botnet outbound HTTP scanner request"; 
flow:to_server,established; content:"User-Agent: muhstik-scan"; fast_pattern:only; http_header; metadata:ruleset 
community; reference:url,blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/; 
reference:url,twitter.com/GreyNoiseIO/status/992524772180414464; classtype:attempted-recon; sid:8000050; rev:1;)

Thanks.
YM
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: