ET MALWARE [ANY.RUN] Lu0bot-Style DNS Query in DNS Lookup M5Source: et/open
alert dns $HOME_NET any -> any any (msg:"ET MALWARE [ANY.RUN] Lu0bot-Style DNS Query in DNS Lookup M5"; dns.query; content:"173"; offset:12; depth:3; fast_pattern; pcre:"/^\d{10}(?:[0-9a-z]{36})?\./R"; content:!".safeframe.googlesyndication.com"; bsize:31<>85; reference:url,any.run/cybersecurity-blog/lu0bot-analysis; classtype:trojan-activity; sid:2048328; rev:3; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_and_Server, created_at 2023_09_28, deployment Perimeter, former_category MALWARE, malware_family lu0bot, performance_impact Low, confidence High, signature_severity Major, updated_at 2023_10_02, reviewed_at 2023_10_02; target:src_ip;)
Reference
URLhttp://any.run/cybersecurity-blog/lu0bot-analysis
Metadata
affected_productWindows_XP_Vista_7_8_10_Server_32_64_Bit
attack_targetClient_and_Server
created_at2023_09_28
deploymentPerimeter
former_categoryMALWARE
malware_familylu0bot
performance_impactLow
confidenceHigh
signature_severityMajor
updated_at2023_10_02
reviewed_at2023_10_02