ET MALWARE Invoke-Phant0m Payload Request (GET)Source: et/open
alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE Invoke-Phant0m Payload Request (GET)"; flow:established,to_server; http.method; content:"GET"; http.uri; content:"Invoke-Phant0m.ps1"; endswith; fast_pattern; http.host; content:"github.com"; endswith; reference:url,github.com/olafhartong/Invoke-Phant0m; classtype:trojan-activity; sid:2048090; rev:1; metadata:attack_target Client_Endpoint, created_at 2023_09_14, deployment Perimeter, deployment SSLDecrypt, former_category MALWARE, confidence High, signature_severity Major, updated_at 2023_09_14;)
Reference
URLhttp://github.com/olafhartong/Invoke-Phant0m
Metadata
attack_targetClient_Endpoint
created_at2023_09_14
deploymentPerimeter
deploymentSSLDecrypt
former_categoryMALWARE
confidenceHigh
signature_severityMajor
updated_at2023_09_14