alert dns $HOME_NET any -> any any (msg:"ET MALWARE [ANY.RUN] Lu0bot-Style DNS Query in DNS Lookup M4"; dns.query; content:"172"; offset:12; depth:3; fast_pattern; pcre:"/^\d{10}(?:[0-9a-z]{36})?\./R"; content:!".safeframe.googlesyndication.com"; bsize:31<>85; reference:url,any.run/cybersecurity-blog/lu0bot-analysis; classtype:trojan-activity; sid:2048327; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_and_Server, created_at 2023_09_28, deployment Perimeter, former_category MALWARE, malware_family lu0bot, performance_impact Low, confidence Low, signature_severity Major, updated_at 2023_10_02, reviewed_at 2023_10_02; target:src_ip;)
Metadata | |
---|
affected_product | Windows_XP_Vista_7_8_10_Server_32_64_Bit |
attack_target | Client_and_Server |
created_at | 2023_09_28 |
deployment | Perimeter |
former_category | MALWARE |
malware_family | lu0bot |
performance_impact | Low |
confidence | Low |
signature_severity | Major |
updated_at | 2023_10_02 |
reviewed_at | 2023_10_02 |