alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE Atomic MacOS Stealer CnC Exfil (POST)"; flow:established,to_server; urilen:8; http.method; content:"POST"; http.uri; content:"/sendlog"; fast_pattern; http.header_names; content:"|0d 0a|Host|0d 0a|Content-Type|0d 0a|Content-Length|0d 0a 0d 0a|"; bsize:40; http.content_type; content:"application|2f|x|2d|www|2d|form|2d|urlencoded"; bsize:33; http.host; pcre:"/^(?:[0-9]{1,3}\.){3}[0-9]{1,3}$/"; reference:url,twitter.com/x3ph1/status/1703492680951509154; classtype:trojan-activity; sid:2048103; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_09_18, deployment Perimeter, former_category MALWARE, confidence Medium, signature_severity Major, updated_at 2023_09_18, reviewed_at 2023_09_18;)
Metadata | |
---|
affected_product | Windows_XP_Vista_7_8_10_Server_32_64_Bit |
attack_target | Client_Endpoint |
created_at | 2023_09_18 |
deployment | Perimeter |
former_category | MALWARE |
confidence | Medium |
signature_severity | Major |
updated_at | 2023_09_18 |
reviewed_at | 2023_09_18 |