-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathPAW-PATRULES_TRICKBOT_FQDN.rules
44 lines (43 loc) · 6.38 KB
/
PAW-PATRULES_TRICKBOT_FQDN.rules
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
# KXK00OOkxxkO00KX0
# ,NXKxo:,'... ...';cdOXN:
# l;. ..,:ldxkOOOOOOkkxol:,.. .o
# dk lOOOOOOkkkkkkkkkkkOOOOOOx dk
# KNXOc. :0OkkkkkkkkkkkkkkkkkkkkkO0l. :kXNX
# x. .'ckOOkkkkkkkkkkkookkkkkkkkkkOOOl,. .k
# d. o0Okkkkkkkkkkkkk. okkkkkkkkkkOO0k x
# l. c0kkkkkkko. .ckk .kd..'xkkkkkk0x .o
# ;, ;0kkkkkkkc ;ko. .dk. :kkkkkk0l ':
# .l .OOkkkkkkkl. .lkocldkkl. 'xkkkkkOO, c.
# l o0kkkk:..'dkkk. .;okkkkkkkkk0x l
# .: .OOkkk; xk, .:kkkkkO0; ;.
# ;. :0kkkko;,cko :kkkk0d .:
# : oOkkkkkkkk .dkkk0k. :
# : dOkkkkkkk .:odxkkkkkOk. ;
# ; oOkkkkkkx:,,ckkkkkkkkkkOx. ,
# '. ;OOkkkkkkkkkkkkkkkkkOOc '
# ' .lOOkkkkkkkkkkkkkOOd. .
# . .lOOkkkkkkkkkOOo' ..
# ' .;dOOOkOOOx:. .
# .. .,lxo;. ..
# .. ..
#
# ____ ___ __ ____ _ _
#| _ \ / \ \ / / | _ \ __ _| |_ _ __ _ _| | ___ ___
#| |_) / _ \ \ /\ / / | |_) / _` | __| '__| | | | |/ _ \/ __|
#| __/ ___ \ V V / | __/ (_| | |_| | | |_| | | __/\__ \
#|_| /_/ \_\_/\_/ |_| \__,_|\__|_| \__,_|_|\___||___/
#
# IDS Rules for Suricata
# 📜 Charles BLANC-ROLIN ⠵ - https://pawpatrules.fr - https://www.apssis.com - https://github.com/woundride
# Licence CC BY-NC-SA 4.0 : https://creativecommons.org/licenses/by-nc-sa/4.0/
# ♞ Trickbot trojan - FQDN
alert dns any any -> any any (msg:"🐾 - ☠ DNS request 🌐 - wizardmagik.best - 🎛 C2 ♞ Trickbot trojan ➡ 🔒 Rançongiciel Ryuk"; flow:to_server, stateless; dns_query; content:"wizardmagik.best"; nocase; reference: url,https://labs.sentinelone.com/inside-a-trickbot-cobaltstrike-attack-server/; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.ryuk; metadata:created_at 2020_07_05, updated_at 2020_07_05; sid:3315813; rev:1; classtype:trojan-activity;)
alert dns any any -> any any (msg:"🐾 - ☠ DNS request 🌐 - 🎛 C2 ♞ Trickbot trojan / Anchor_DNS 🐧 Linux"; flow:to_server, stateless; dns_query; content:"biillpi.com"; nocase; reference: url,https://medium.com/stage-2-security/anchor-dns-malware-family-goes-cross-platform-d807ba13ca30; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot; metadata:created_at 2020_07_29, updated_at 2020_07_29; sid:3315814; rev:1; classtype:trojan-activity;)
alert dns any any -> any any (msg:"🐾 - ☠ DNS request 🌐 - 🎛 C2 ♞ Trickbot trojan / Anchor_DNS 🐧 Linux"; flow:to_server, stateless; dns_query; content:"ns1.chishir.com"; nocase; reference: url,https://hello.global.ntt/zh-cn/insights/blog/trickbot-variant-communicating-over-dns; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot; metadata:created_at 2020_07_31, updated_at 2020_07_31; sid:3315815; rev:1; classtype:trojan-activity;)
alert dns any any -> any any (msg:"🐾 - ☠ DNS request 🌐 - 🎛 C2 ♞ Trickbot trojan / Anchor_DNS 🐧 Linux"; flow:to_server, stateless; dns_query; content:"ns2.chishir.com"; nocase; reference: url,https://hello.global.ntt/zh-cn/insights/blog/trickbot-variant-communicating-over-dns; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot; metadata:created_at 2020_07_31, updated_at 2020_07_31; sid:3315816; rev:1; classtype:trojan-activity;)
alert dns any any -> any any (msg:"🐾 - ☠ DNS request 🌐 - 🎛 C2 ♞ Trickbot trojan / Anchor_DNS 🐧 Linux"; flow:to_server, stateless; dns_query; content:"westurn.in"; nocase; reference: url,https://www.netscout.com/blog/asert/dropping-anchor; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot; metadata:created_at 2020_10_31, updated_at 2020_10_31; sid:3315817; rev:1; classtype:trojan-activity;)
alert dns any any -> any any (msg:"🐾 - ☠ DNS request 🌐 - 🎛 C2 ♞ Trickbot trojan / Anchor_DNS 🐧 Linux"; flow:to_server, stateless; dns_query; content:"onixcellent.com"; nocase; reference: url,https://www.netscout.com/blog/asert/dropping-anchor; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot; metadata:created_at 2020_10_31, updated_at 2020_10_31; sid:3315818; rev:1; classtype:trojan-activity;)
alert dns any any -> any any (msg:"🐾 - ☠ DNS request 🌐 - 🎛 C2 ♞ Trickbot trojan / Anchor_DNS 🐧 Linux"; flow:to_server, stateless; dns_query; content:"wonto.pro"; nocase; reference: url,https://www.netscout.com/blog/asert/dropping-anchor; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot; metadata:created_at 2020_10_31, updated_at 2020_10_31; sid:3315819; rev:1; classtype:trojan-activity;)
alert dns any any -> any any (msg:"🐾 - ☠ DNS request 🌐 - 🎛 C2 ♞ Trickbot trojan / Anchor_DNS 🐧 Linux"; flow:to_server, stateless; dns_query; content:"ericrause.com"; nocase; reference: url,https://www.netscout.com/blog/asert/dropping-anchor; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot; metadata:created_at 2020_10_31, updated_at 2020_10_31; sid:3315820; rev:1; classtype:trojan-activity;)
alert tls any any -> any any (msg:"🐾 - 🚨 Outgoing connection ↗ 🎛 C2 ♞ Trickbot trojan"; flow:established,to_server; tls_sni; content:"wideri.com"; nocase; reference: url,https://thedfirreport.com/2021/05/02/trickbot-brief-creds-and-beacons/; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot; metadata:created_at 2021_05_03, updated_at 2021_05_03; sid:3315821; rev:1; classtype:trojan-activity;)
alert dns any any -> any any (msg:"🐾 - ☠ DNS request 🌐 - 🎛 C2 ♞ Trickbot trojan"; flow:to_server, stateless; dns_query; content:"wideri.com"; nocase; reference: url,https://thedfirreport.com/2021/05/02/trickbot-brief-creds-and-beacons/; reference: url,https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot; metadata:created_at 2021_05_03, updated_at 2021_05_03; sid:3315822; rev:1; classtype:trojan-activity;)