Pnscan Binary Data Transmission Activity
Detects command line patterns associated with the use of Pnscan for sending and receiving binary data across the network. This behavior has been identified in a Linux malware campaign targeting Docker, Apache Hadoop, Redis, and Confluence and was previously used by the threat actor known as TeamTNT
Sigma rule (View on GitHub)
1title: Pnscan Binary Data Transmission Activity
2id: 97de11cd-4b67-4abf-9a8b-1020e670aa9e
3status: experimental
4description: |
5 Detects command line patterns associated with the use of Pnscan for sending and receiving binary data across the network.
6 This behavior has been identified in a Linux malware campaign targeting Docker, Apache Hadoop, Redis, and Confluence and was previously used by the threat actor known as TeamTNT
7author: David Burkett (@signalblur)
8date: 2024-04-16
9references:
10 - https://www.cadosecurity.com/blog/spinning-yarn-a-new-linux-malware-campaign-targets-docker-apache-hadoop-redis-and-confluence
11 - https://intezer.com/wp-content/uploads/2021/09/TeamTNT-Cryptomining-Explosion.pdf
12 - https://regex101.com/r/RugQYK/1
13 - https://www.virustotal.com/gui/file/beddf70a7bab805f0c0b69ac0989db6755949f9f68525c08cb874988353f78a9/content
14tags:
15 - attack.discovery
16 - attack.t1046
17logsource:
18 category: process_creation
19 product: linux
20detection:
21 selection:
22 CommandLine|re: -(W|R)\s?(\s|"|')([0-9a-fA-F]{2}\s?){2,20}(\s|"|')
23 condition: selection
24falsepositives:
25 - Unknown
26level: medium
References
Related rules
- Advanced IP Scanner - File Event
- Linux Network Service Scanning - Auditd
- MacOS Network Service Scanning
- PUA - Advanced IP Scanner Execution
- PUA - Advanced Port Scanner Execution