nuclei-templates/network/c2/7777botnet.yaml

31 lines
794 B
YAML

id: 7777botnet-detect
info:
name: 7777-Botnet - Detect
author: johnk3r
severity: info
reference:
- https://gi7w0rm.medium.com/the-curious-case-of-the-7777-botnet-86e3464c3ffd
metadata:
verified: true
max-request: 1
shodan-query: 'hash:1357418825'
tags: network,c2,ir,osint,cti,darktrack,botnet,tcp
tcp:
- inputs:
- data: "fffc01fffb1ffffa1f00500018fff0fffd01fffd03"
read: 2048
host:
- "{{Hostname}}"
port: 7777
matchers:
- type: word
part: data
words:
- "xlog"
- "in"
condition: and
# digest: 4b0a00483046022100e357f37402bb259b1f286493d649e53d2a2e4e63432ecdfda050ca7fefdbc79e022100ed45eca12e16c502eaef471e531aa28c7956d7ce19ec741ab5decdbe410d467f:922c64590222798bb761d5b6d8e72950