alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE Invoke-Phant0m Payload Request (GET)"; flow:established,to_server; http.method; content:"GET"; http.uri; content:"Invoke-Phant0m.ps1"; endswith; fast_pattern; http.host; content:"github.com"; endswith; reference:url,github.com/olafhartong/Invoke-Phant0m; classtype:trojan-activity; sid:2048090; rev:1; metadata:attack_target Client_Endpoint, created_at 2023_09_14, deployment Perimeter, deployment SSLDecrypt, former_category MALWARE, confidence High, signature_severity Major, updated_at 2023_09_14;)
Metadata | |
---|
attack_target | Client_Endpoint |
created_at | 2023_09_14 |
deployment | Perimeter |
deployment | SSLDecrypt |
former_category | MALWARE |
confidence | High |
signature_severity | Major |
updated_at | 2023_09_14 |