Ursnif Malware C2 URL Pattern
Detects Ursnif C2 traffic.
Sigma rule (View on GitHub)
1title: Ursnif Malware C2 URL Pattern
2id: 932ac737-33ca-4afd-9869-0d48b391fcc9
3status: stable
4description: Detects Ursnif C2 traffic.
5references:
6 - https://www.fortinet.com/blog/threat-research/ursnif-variant-spreading-word-document.html
7author: Thomas Patzke
8date: 2019-12-19
9modified: 2021-08-09
10tags:
11 - attack.initial-access
12 - attack.t1566.001
13 - attack.execution
14 - attack.t1204.002
15 - attack.command-and-control
16 - attack.t1071.001
17 - detection.emerging-threats
18logsource:
19 category: proxy
20detection:
21 b64encoding:
22 c-uri|contains:
23 - '_2f'
24 - '_2b'
25 urlpatterns:
26 c-uri|contains|all:
27 - '.avi'
28 - '/images/'
29 condition: b64encoding and urlpatterns
30falsepositives:
31 - Unknown
32level: critical
References
Related rules
- Droppers Exploiting CVE-2017-11882
- Exploit for CVE-2017-0261
- Exploit for CVE-2017-8759
- APT40 Dropbox Tool User Agent
- Chafer Malware URL Pattern