<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to stop MortiAgent Malware using the snort rule ? in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-stop-mortiagent-malware-using-the-snort-rule/m-p/326591#M809</link>
    <description>&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="150"&gt;&lt;P&gt;Software Version&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;9.0.5&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Problem Description:&amp;nbsp; How to stop MortiAgent Malware using snort rule ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to stop the MoriAgent malware by applying /using snort rule &amp;amp; also using yara rule?&lt;BR /&gt;&lt;BR /&gt;How to configure this in Palo alto ?&lt;BR /&gt;&lt;BR /&gt;Below are snort &amp;amp; Yara Rules:&lt;BR /&gt;&lt;BR /&gt;1. The below SNORT rule can be used to detect the MoriAgent Beacon.&lt;BR /&gt;alert tcp $HOME_NET any -&amp;gt; $EXTERNAL_NET $HTTP_PORTS (msg:" MoriAgent Beacon&lt;BR /&gt;HTTP Request"; content:"/Index.php?i="; depth:200; content:"&amp;amp;t="; within:64;&lt;BR /&gt;content:"HTTP/1.1"; within:64; content:"Content-Type: application/json"; within:32;&lt;BR /&gt;content:"Content-Length: 0"; within:90; threshold:type limit,track by_src,count&lt;BR /&gt;1,seconds 120; sid:1000001; rev:001;)&lt;BR /&gt;&lt;BR /&gt;2. Below are YARA rules to detect POWERSTATS.&lt;BR /&gt;YARA rule to detect the substitution table used in PowerShell code.&lt;BR /&gt;rule SubstitutionTable_in_PowerShell {&lt;BR /&gt;meta:&lt;BR /&gt;description = "Detect the substitution table used in PowerShell code (2019-2020)"&lt;BR /&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;BR /&gt;strings:&lt;BR /&gt;$a1 = "Replace('(','a'"&lt;BR /&gt;$a2 = "Replace(')','b'"&lt;BR /&gt;$a3 = "Replace('{','c'"&lt;BR /&gt;$a4 = "Replace('}','d'"&lt;BR /&gt;$a5 = "Replace('[','e'"&lt;BR /&gt;$a6 = "Replace(']','f'"&lt;BR /&gt;condition:&lt;BR /&gt;$a1 and&lt;BR /&gt;$a2 in (@a1..@a1+200) and&lt;BR /&gt;$a3 in (@a1..@a1+200) and&lt;BR /&gt;$a4 in (@a1..@a1+200) and&lt;BR /&gt;$a5 in (@a1..@a1+200) and&lt;BR /&gt;$a6 in (@a1..@a1+200) and&lt;BR /&gt;filesize &amp;lt; 100000&lt;BR /&gt;}&lt;BR /&gt;YARA rule to detect PowerStats backdoor.&lt;BR /&gt;rule POWERSTATS_JscriptLauncher {&lt;BR /&gt;meta:&lt;BR /&gt;description = "POWERSTATS Jscript Launcher"&lt;BR /&gt;hash = "6C97A39A7FFC292BAF8BE1391FCE7DA0"&lt;BR /&gt;strings:&lt;BR /&gt;$a1 = "$s=(get-content"&lt;BR /&gt;$a2 = "Get('Win32_Process').Create(cm"&lt;BR /&gt;$a3 = "var cm="&lt;BR /&gt;condition:&lt;BR /&gt;all of them and filesize &amp;lt; 600&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;YARA rule to detect PowerStats de-obfuscated&lt;BR /&gt;rule POWERSTATSLite {&lt;BR /&gt;meta:&lt;BR /&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;BR /&gt;strings:&lt;BR /&gt;$a1 = "$global:key"&lt;BR /&gt;$a2 = "$global:time"&lt;BR /&gt;$a3 = "webreq = [System.Net.WebRequest]::Create($url)"&lt;BR /&gt;condition:&lt;BR /&gt;all of them and filesize &amp;lt; 3000&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;YARA rule to detect MoriAgent implant&lt;BR /&gt;rule MoriAgent {&lt;BR /&gt;meta:&lt;BR /&gt;description = "C++ MuddyWater implant"&lt;BR /&gt;hash = "12755B210EC1171045144480ACD05AA8"&lt;BR /&gt;strings:&lt;BR /&gt;$f1 = "|x7d873iqq" ascii fullword&lt;BR /&gt;$f2 = "ljyfiiwnskt" ascii fullword&lt;BR /&gt;$f3 = "htssjhy" ascii fullword&lt;BR /&gt;$f4 = "kwjjfiiwnskt" ascii fullword&lt;BR /&gt;$f5 = "hqtxjxthpjy" ascii fullword&lt;BR /&gt;$f6 = "\\XFXyfwyzu" ascii fullword&lt;BR /&gt;$f7 = "\\XFHqjfszu" ascii fullword&lt;BR /&gt;$f8 = "ZmilXzwkm{{Umuwz" ascii fullword&lt;BR /&gt;$f9 = "^qz|}itXzw|mk|" ascii fullword&lt;BR /&gt;$f10 = "_zq|mXzwkm{{Umuwz" ascii fullword&lt;BR /&gt;$content = "Content-Type: application/json" ascii fullword&lt;BR /&gt;condition:&lt;BR /&gt;uint16(0) == 0x5A4D and filesize &amp;lt; 2MB and&lt;BR /&gt;$content and 5 of ($f*)&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;YARA rule to detect PowerStats Implants&lt;BR /&gt;rule POWERSTATS_Implants&lt;BR /&gt;{ meta:&lt;BR /&gt;description = "Detects all POWERSTATS implants"&lt;BR /&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;BR /&gt;hash = "409558610BE62655FBA0B1F93F2D9596" hash =&lt;BR /&gt;"DD32B95F865374C31A1377E31FA79E87" strings:&lt;BR /&gt;$a1 = "if ($resp -ne $null){"&lt;BR /&gt;$a2 = "out = $_.Exception.Message"&lt;BR /&gt;$a3 = "IEX $cmd -ErrorAction SilentlyContinue"&lt;BR /&gt;condition:&lt;BR /&gt;all of them and filesize &amp;lt; 50000&lt;BR /&gt;}&lt;/P&gt;</description>
    <pubDate>Thu, 07 May 2020 08:06:09 GMT</pubDate>
    <dc:creator>Mohammed_Yasin</dc:creator>
    <dc:date>2020-05-07T08:06:09Z</dc:date>
    <item>
      <title>How to stop MortiAgent Malware using the snort rule ?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-stop-mortiagent-malware-using-the-snort-rule/m-p/326591#M809</link>
      <description>&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="150"&gt;&lt;P&gt;Software Version&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;9.0.5&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Problem Description:&amp;nbsp; How to stop MortiAgent Malware using snort rule ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to stop the MoriAgent malware by applying /using snort rule &amp;amp; also using yara rule?&lt;BR /&gt;&lt;BR /&gt;How to configure this in Palo alto ?&lt;BR /&gt;&lt;BR /&gt;Below are snort &amp;amp; Yara Rules:&lt;BR /&gt;&lt;BR /&gt;1. The below SNORT rule can be used to detect the MoriAgent Beacon.&lt;BR /&gt;alert tcp $HOME_NET any -&amp;gt; $EXTERNAL_NET $HTTP_PORTS (msg:" MoriAgent Beacon&lt;BR /&gt;HTTP Request"; content:"/Index.php?i="; depth:200; content:"&amp;amp;t="; within:64;&lt;BR /&gt;content:"HTTP/1.1"; within:64; content:"Content-Type: application/json"; within:32;&lt;BR /&gt;content:"Content-Length: 0"; within:90; threshold:type limit,track by_src,count&lt;BR /&gt;1,seconds 120; sid:1000001; rev:001;)&lt;BR /&gt;&lt;BR /&gt;2. Below are YARA rules to detect POWERSTATS.&lt;BR /&gt;YARA rule to detect the substitution table used in PowerShell code.&lt;BR /&gt;rule SubstitutionTable_in_PowerShell {&lt;BR /&gt;meta:&lt;BR /&gt;description = "Detect the substitution table used in PowerShell code (2019-2020)"&lt;BR /&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;BR /&gt;strings:&lt;BR /&gt;$a1 = "Replace('(','a'"&lt;BR /&gt;$a2 = "Replace(')','b'"&lt;BR /&gt;$a3 = "Replace('{','c'"&lt;BR /&gt;$a4 = "Replace('}','d'"&lt;BR /&gt;$a5 = "Replace('[','e'"&lt;BR /&gt;$a6 = "Replace(']','f'"&lt;BR /&gt;condition:&lt;BR /&gt;$a1 and&lt;BR /&gt;$a2 in (@a1..@a1+200) and&lt;BR /&gt;$a3 in (@a1..@a1+200) and&lt;BR /&gt;$a4 in (@a1..@a1+200) and&lt;BR /&gt;$a5 in (@a1..@a1+200) and&lt;BR /&gt;$a6 in (@a1..@a1+200) and&lt;BR /&gt;filesize &amp;lt; 100000&lt;BR /&gt;}&lt;BR /&gt;YARA rule to detect PowerStats backdoor.&lt;BR /&gt;rule POWERSTATS_JscriptLauncher {&lt;BR /&gt;meta:&lt;BR /&gt;description = "POWERSTATS Jscript Launcher"&lt;BR /&gt;hash = "6C97A39A7FFC292BAF8BE1391FCE7DA0"&lt;BR /&gt;strings:&lt;BR /&gt;$a1 = "$s=(get-content"&lt;BR /&gt;$a2 = "Get('Win32_Process').Create(cm"&lt;BR /&gt;$a3 = "var cm="&lt;BR /&gt;condition:&lt;BR /&gt;all of them and filesize &amp;lt; 600&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;YARA rule to detect PowerStats de-obfuscated&lt;BR /&gt;rule POWERSTATSLite {&lt;BR /&gt;meta:&lt;BR /&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;BR /&gt;strings:&lt;BR /&gt;$a1 = "$global:key"&lt;BR /&gt;$a2 = "$global:time"&lt;BR /&gt;$a3 = "webreq = [System.Net.WebRequest]::Create($url)"&lt;BR /&gt;condition:&lt;BR /&gt;all of them and filesize &amp;lt; 3000&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;YARA rule to detect MoriAgent implant&lt;BR /&gt;rule MoriAgent {&lt;BR /&gt;meta:&lt;BR /&gt;description = "C++ MuddyWater implant"&lt;BR /&gt;hash = "12755B210EC1171045144480ACD05AA8"&lt;BR /&gt;strings:&lt;BR /&gt;$f1 = "|x7d873iqq" ascii fullword&lt;BR /&gt;$f2 = "ljyfiiwnskt" ascii fullword&lt;BR /&gt;$f3 = "htssjhy" ascii fullword&lt;BR /&gt;$f4 = "kwjjfiiwnskt" ascii fullword&lt;BR /&gt;$f5 = "hqtxjxthpjy" ascii fullword&lt;BR /&gt;$f6 = "\\XFXyfwyzu" ascii fullword&lt;BR /&gt;$f7 = "\\XFHqjfszu" ascii fullword&lt;BR /&gt;$f8 = "ZmilXzwkm{{Umuwz" ascii fullword&lt;BR /&gt;$f9 = "^qz|}itXzw|mk|" ascii fullword&lt;BR /&gt;$f10 = "_zq|mXzwkm{{Umuwz" ascii fullword&lt;BR /&gt;$content = "Content-Type: application/json" ascii fullword&lt;BR /&gt;condition:&lt;BR /&gt;uint16(0) == 0x5A4D and filesize &amp;lt; 2MB and&lt;BR /&gt;$content and 5 of ($f*)&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;YARA rule to detect PowerStats Implants&lt;BR /&gt;rule POWERSTATS_Implants&lt;BR /&gt;{ meta:&lt;BR /&gt;description = "Detects all POWERSTATS implants"&lt;BR /&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;BR /&gt;hash = "409558610BE62655FBA0B1F93F2D9596" hash =&lt;BR /&gt;"DD32B95F865374C31A1377E31FA79E87" strings:&lt;BR /&gt;$a1 = "if ($resp -ne $null){"&lt;BR /&gt;$a2 = "out = $_.Exception.Message"&lt;BR /&gt;$a3 = "IEX $cmd -ErrorAction SilentlyContinue"&lt;BR /&gt;condition:&lt;BR /&gt;all of them and filesize &amp;lt; 50000&lt;BR /&gt;}&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 08:06:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-stop-mortiagent-malware-using-the-snort-rule/m-p/326591#M809</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2020-05-07T08:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to stop MortiAgent Malware using the snort rule ?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-stop-mortiagent-malware-using-the-snort-rule/m-p/326672#M810</link>
      <description>&lt;P&gt;Please refer to:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/threat-prevention/custom-signatures" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/threat-prevention/custom-signatures&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 15:21:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-stop-mortiagent-malware-using-the-snort-rule/m-p/326672#M810</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-05-07T15:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to stop MortiAgent Malware using the snort rule ?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-stop-mortiagent-malware-using-the-snort-rule/m-p/327473#M816</link>
      <description>&lt;P&gt;Thanks for the update.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's Palo Alto aware of this Malware?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MortiAgent Malware is added to the Palo Alto signatures database &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What should we do to protect our network?&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 05:52:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-stop-mortiagent-malware-using-the-snort-rule/m-p/327473#M816</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2020-05-12T05:52:04Z</dc:date>
    </item>
  </channel>
</rss>

