<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic MortiAgent Malware and Palo Alto in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/mortiagent-malware-and-palo-alto/m-p/327475#M83337</link>
    <description>&lt;P&gt;MortiAgent Malware is added to the Palo Alto signatures database?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's Palo Alto aware of this Malware?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;want to stop the MoriAgent malware.&lt;BR /&gt;&lt;BR /&gt;How to configure this in Palo alto to&amp;nbsp; ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 May 2020 06:05:29 GMT</pubDate>
    <dc:creator>Mohammed_Yasin</dc:creator>
    <dc:date>2020-05-12T06:05:29Z</dc:date>
    <item>
      <title>MortiAgent Malware and Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/mortiagent-malware-and-palo-alto/m-p/327475#M83337</link>
      <description>&lt;P&gt;MortiAgent Malware is added to the Palo Alto signatures database?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's Palo Alto aware of this Malware?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;want to stop the MoriAgent malware.&lt;BR /&gt;&lt;BR /&gt;How to configure this in Palo alto to&amp;nbsp; ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 06:05:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/mortiagent-malware-and-palo-alto/m-p/327475#M83337</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2020-05-12T06:05:29Z</dc:date>
    </item>
    <item>
      <title>Re: MortiAgent Malware and Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/mortiagent-malware-and-palo-alto/m-p/327487#M83343</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131110"&gt;@Mohammed_Yasin&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was unable to find MortiAgent in the PAN threat vault:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;Palo Alto Networks Threat Vault&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That said, I can't find ANY hits on MortiAgent Malware in google either (except for your posts ^_^ ).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you mean the following TID's that refer to .morti in the PAN Threat Vault ? :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.0"&gt;Name: Virus/OSX.WGeneric.morti&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.1"&gt;Unique Threat ID: 183519795&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.2"&gt;Create Time: 2017-07-29 02:11:02 (UTC)&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.2"&gt;or maybe this one ?&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.0.0.0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.0.0.0"&gt;Name: Worm/Win32.allaple.morti&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.0.0.1"&gt;Unique Threat ID: 86806904&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.0.0.2"&gt;Create Time: 2015-12-14 10:50:28 (UTC)&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.2"&gt;If you don't mean the above TID's then please provide more information on the malware and/or check how to create custom signatures to help you block it:&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.2"&gt;&lt;A title="How to Create Custom Threat Signatures" href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/threat-prevention/custom-signatures" target="_blank" rel="noopener"&gt;How to Create Custom Threat Signatures&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.2"&gt;Cheers,&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$FYruJ.1.1.1.0.2"&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 May 2020 08:28:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/mortiagent-malware-and-palo-alto/m-p/327487#M83343</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2020-05-12T08:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: MortiAgent Malware and Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/mortiagent-malware-and-palo-alto/m-p/327495#M83346</link>
      <description>&lt;P&gt;Thank you so much for your valuable information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, &lt;SPAN&gt;absolutely&lt;/SPAN&gt; I m agree that even I could not able to find it,&lt;/P&gt;&lt;P&gt;Let me share the briefly about the &lt;SPAN class="lia-message-read"&gt;MortiAgent Malware,&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OVERVIEW&lt;/P&gt;&lt;P&gt;Based on reports from our threat Intel partners, there has been observed, an ongoing&lt;/P&gt;&lt;P&gt;campaign targeting government organizations in various sectors including that of healthcare,&lt;/P&gt;&lt;P&gt;education, diplomacy and telecommunication among others. The campaign involves the&lt;/P&gt;&lt;P&gt;spread of backdoors targeted at agencies within these high value sectors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One among the many backdoors, dubbed &lt;STRONG&gt;MoriAgent&lt;/STRONG&gt; - allows attackers to list and fetch victim’s files,&lt;/P&gt;&lt;P&gt;download other files from the C2, and run arbitrary commands on the victim’s machine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The backdoor was earlier associated with the &lt;STRONG&gt;TEMP.Zagros&lt;/STRONG&gt; activity targeting the Afghan&lt;/P&gt;&lt;P&gt;communications provider - but the latest reports is indicative of them spreading wings to the&lt;/P&gt;&lt;P&gt;entire Middle East.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;THREAT DETAILS&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Technical Details&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;According to researchers, MORIAGENT is a fully functional backdoor written in native C++. It&lt;/P&gt;&lt;P&gt;uses statically linked custom libraries to make analysis more difficult. In a recent update to the&lt;/P&gt;&lt;P&gt;malware, a 200 MB random resource was added to avoid anti-virus scans and sandboxes.&lt;/P&gt;&lt;P&gt;Debug messages containing paths were also removed in this version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also noted is that the malware uses a unique dictionary for Base64 encoding and a specific&lt;/P&gt;&lt;P&gt;implementation of the LZMAT compression library. The command and control (C&amp;amp;C)&lt;/P&gt;&lt;P&gt;configuration of the malware and its ID are written to the registry by the dropper.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Researchers have listed spear-phishing email as the most likely method of delivery of the&lt;/P&gt;&lt;P&gt;backdoor.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;U&gt;&amp;nbsp;&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;U&gt;There are three stages to the working of this backdoor&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;First stage&lt;/STRONG&gt; involves the user of a downloader to obtain the other components and stage&lt;/P&gt;&lt;P&gt;them in memory. It contains a number of obfuscation and anti-analysis techniques.&lt;/P&gt;&lt;P&gt;Once the Loader finds that it is running in a safe environment, it decodes the C2 URL&lt;/P&gt;&lt;P&gt;that was hardcoded in the binary - resulting in a URL as per the below syntax, which is&lt;/P&gt;&lt;P&gt;then queried in a loop to obtain orders:&lt;/P&gt;&lt;P&gt;http://[host]/[page].php?c=[backdoor identifier]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Second stage&lt;/STRONG&gt; DLL Dropper: Operated by the loader, it is invoked using an export&lt;/P&gt;&lt;P&gt;function named ‘init’ as the entry point. A compressed, custom-encoded file is&lt;/P&gt;&lt;P&gt;grabbed from the C&amp;amp;C, based on the file internal ID on the server and hash. The file is&lt;/P&gt;&lt;P&gt;dropped to a location chosen by the attacker. A callback table with commands is&lt;/P&gt;&lt;P&gt;prepared for executing the final payload.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Third Stage&lt;/STRONG&gt; Payload (&lt;STRONG&gt;MoriAgent&lt;/STRONG&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; This final stage embodies a simple remote&lt;/P&gt;&lt;P&gt;administration tool written in C++, which supports several commands to control the&lt;/P&gt;&lt;P&gt;victim’s machine. After installation, the attacker is capable of listing and fetching&lt;/P&gt;&lt;P&gt;victims files, as well as downloading other files from the C2 and running arbitrary&lt;/P&gt;&lt;P&gt;commands on the machine using a “cmd.exe” shell.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;U&gt;During this phase, two types of requests are used.&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The first &lt;/STRONG&gt;is a ‘beacon’ request, which is sent periodically once per minute and intended&lt;/P&gt;&lt;P&gt;to keep a steady heartbeat to the C2 server, the request has the following format:&lt;/P&gt;&lt;P&gt;http://domain[.]com/Index.php?i=%Info_value%&amp;amp;t=t&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The second&lt;/STRONG&gt; is a ‘beam’ request, which is sent once every 20 beacons and is used to&lt;/P&gt;&lt;P&gt;convey information on the contacting implant, the request has the following pattern&lt;/P&gt;&lt;P&gt;for file execution:&lt;/P&gt;&lt;P&gt;http://domain[.]com/Index.php?i=%Info_value%&amp;amp;t=u&amp;amp;cv=64&amp;amp;ch=%hash_of_a_file%&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Additionally the backdoor POWERSTATS has also been observed as part of the same&lt;/P&gt;&lt;P&gt;campaign. This version of POWERSTATS achieves self-persistence by creating a registry key or&lt;/P&gt;&lt;P&gt;a scheduled task named GoogleUpdateNT. This involved the execution of a JScript file to pass&lt;/P&gt;&lt;P&gt;the flow to Windows’ Management Interface (WMI) in order to execute an inline Powershell&lt;/P&gt;&lt;P&gt;command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After the installation of MoriAgent and Powerstats, the attacker would most likely be able to&lt;/P&gt;&lt;P&gt;perform lateral movement within the target network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IMPACT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;MoriAgent&lt;/STRONG&gt; has the capability to remotely control affected devices and steal data. The&lt;/P&gt;&lt;P&gt;information gained through a successful infection could lead to follow-up attacks - including&lt;/P&gt;&lt;P&gt;unauthorized access to a victim’s network, privilege escalation, data exfiltration, data&lt;/P&gt;&lt;P&gt;modification/destruction, and denial of service.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;RECOMMENDATIONS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Monitor and block malicious samples/traffic associated with the IOCs in the appendix&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Implement least privileges policy within the organization:&lt;/P&gt;&lt;P&gt;Reduce adversaries’ ability to escalate privileges or pivot laterally to other hosts.&lt;/P&gt;&lt;P&gt;Control creation and execution of files in important directories.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Deploy and update firewalls and configure rules to detect similar patterns&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Review systems logs and Deploy file monitoring to detect changes to files in web&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; directories of a web server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Review system logs and investigate any anomalies, suspicious behavior, or unusual&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; login activity such as unorthodox work hours or outside of geographic region.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Search for infections with an updated endpoint detection system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Spread awareness among employees to be cautious while vising websites or opening emails.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ensure a secure configuration of web servers. All unnecessary services and ports should&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; be disabled or blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The below SNORT rule can be used to detect the MoriAgent Beacon.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;alert tcp $HOME_NET any -&amp;gt; $EXTERNAL_NET $HTTP_PORTS (msg:" MoriAgent Beacon&lt;/P&gt;&lt;P&gt;HTTP Request"; content:"/Index.php?i="; depth:200; content:"&amp;amp;t="; within:64;&lt;/P&gt;&lt;P&gt;content:"HTTP/1.1"; within:64; content:"Content-Type: application/json"; within:32;&lt;/P&gt;&lt;P&gt;content:"Content-Length: 0"; within:90; threshold:type limit,track by_src,count&lt;/P&gt;&lt;P&gt;1,seconds 120; sid:1000001; rev:001;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Below are YARA rules to detect POWERSTATS.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;YARA rule to detect the substitution table used in PowerShell code.&lt;/P&gt;&lt;P&gt;rule SubstitutionTable_in_PowerShell {&lt;/P&gt;&lt;P&gt;meta:&lt;/P&gt;&lt;P&gt;description = "Detect the substitution table used in PowerShell code (2019-2020)"&lt;/P&gt;&lt;P&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;/P&gt;&lt;P&gt;strings:&lt;/P&gt;&lt;P&gt;$a1 = "Replace('(','a'"&lt;/P&gt;&lt;P&gt;$a2 = "Replace(')','b'"&lt;/P&gt;&lt;P&gt;$a3 = "Replace('{','c'"&lt;/P&gt;&lt;P&gt;$a4 = "Replace('}','d'"&lt;/P&gt;&lt;P&gt;$a5 = "Replace('[','e'"&lt;/P&gt;&lt;P&gt;$a6 = "Replace(']','f'"&lt;/P&gt;&lt;P&gt;condition:&lt;/P&gt;&lt;P&gt;$a1 and&lt;/P&gt;&lt;P&gt;$a2 in (@a1..@a1+200) and&lt;/P&gt;&lt;P&gt;$a3 in (@a1..@a1+200) and&lt;/P&gt;&lt;P&gt;$a4 in (@a1..@a1+200) and&lt;/P&gt;&lt;P&gt;$a5 in (@a1..@a1+200) and&lt;/P&gt;&lt;P&gt;$a6 in (@a1..@a1+200) and&lt;/P&gt;&lt;P&gt;filesize &amp;lt; 100000&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;YARA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;YARA rule to detect PowerStats backdoor.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;rule POWERSTATS_JscriptLauncher {&lt;/P&gt;&lt;P&gt;meta:&lt;/P&gt;&lt;P&gt;description = "POWERSTATS Jscript Launcher"&lt;/P&gt;&lt;P&gt;hash = "6C97A39A7FFC292BAF8BE1391FCE7DA0"&lt;/P&gt;&lt;P&gt;strings:&lt;/P&gt;&lt;P&gt;$a1 = "$s=(get-content"&lt;/P&gt;&lt;P&gt;$a2 = "Get('Win32_Process').Create(cm"&lt;/P&gt;&lt;P&gt;$a3 = "var cm="&lt;/P&gt;&lt;P&gt;condition:&lt;/P&gt;&lt;P&gt;all of them and filesize &amp;lt; 600&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;YARA rule to detect PowerStats de-obfuscated&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;rule POWERSTATSLite {&lt;/P&gt;&lt;P&gt;meta:&lt;/P&gt;&lt;P&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;/P&gt;&lt;P&gt;strings:&lt;/P&gt;&lt;P&gt;$a1 = "$global:key"&lt;/P&gt;&lt;P&gt;$a2 = "$global:time"&lt;/P&gt;&lt;P&gt;$a3 = "webreq = [System.Net.WebRequest]::Create($url)"&lt;/P&gt;&lt;P&gt;condition:&lt;/P&gt;&lt;P&gt;all of them and filesize &amp;lt; 3000&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;YARA rule to detect MoriAgent implant&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;rule MoriAgent {&lt;/P&gt;&lt;P&gt;meta:&lt;/P&gt;&lt;P&gt;description = "C++ MuddyWater implant"&lt;/P&gt;&lt;P&gt;hash = "12755B210EC1171045144480ACD05AA8"&lt;/P&gt;&lt;P&gt;strings:&lt;/P&gt;&lt;P&gt;$f1 = "|x7d873iqq" ascii fullword&lt;/P&gt;&lt;P&gt;$f2 = "ljyfiiwnskt" ascii fullword&lt;/P&gt;&lt;P&gt;$f3 = "htssjhy" ascii fullword&lt;/P&gt;&lt;P&gt;$f4 = "kwjjfiiwnskt" ascii fullword&lt;/P&gt;&lt;P&gt;$f5 = "hqtxjxthpjy" ascii fullword&lt;/P&gt;&lt;P&gt;$f6 = "\\XFXyfwyzu" ascii fullword&lt;/P&gt;&lt;P&gt;$f7 = "\\XFHqjfszu" ascii fullword&lt;/P&gt;&lt;P&gt;$f8 = "ZmilXzwkm{{Umuwz" ascii fullword&lt;/P&gt;&lt;P&gt;$f9 = "^qz|}itXzw|mk|" ascii fullword&lt;/P&gt;&lt;P&gt;$f10 = "_zq|mXzwkm{{Umuwz" ascii fullword&lt;/P&gt;&lt;P&gt;$content = "Content-Type: application/json" ascii fullword&lt;/P&gt;&lt;P&gt;condition:&lt;/P&gt;&lt;P&gt;uint16(0) == 0x5A4D and filesize &amp;lt; 2MB and&lt;/P&gt;&lt;P&gt;$content and 5 of ($f*)&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;YARA rule to detect PowerStats Implants&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;rule POWERSTATS_Implants&lt;/P&gt;&lt;P&gt;{ meta:&lt;/P&gt;&lt;P&gt;description = "Detects all POWERSTATS implants"&lt;/P&gt;&lt;P&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;/P&gt;&lt;P&gt;hash = "409558610BE62655FBA0B1F93F2D9596" hash =&lt;/P&gt;&lt;P&gt;"DD32B95F865374C31A1377E31FA79E87" strings:&lt;/P&gt;&lt;P&gt;$a1 = "if ($resp -ne $null){"&lt;/P&gt;&lt;P&gt;$a2 = "out = $_.Exception.Message"&lt;/P&gt;&lt;P&gt;$a3 = "IEX $cmd -ErrorAction SilentlyContinue"&lt;/P&gt;&lt;P&gt;condition:&lt;/P&gt;&lt;P&gt;all of them and filesize &amp;lt; 50000&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 09:04:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/mortiagent-malware-and-palo-alto/m-p/327495#M83346</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2020-05-12T09:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: MortiAgent Malware and Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/mortiagent-malware-and-palo-alto/m-p/327498#M83347</link>
      <description>&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;Whether Palo alto support will be able to validate the custom signature created?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where this IPS should be applied on, Inbound or outbound security rule?&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 10:00:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/mortiagent-malware-and-palo-alto/m-p/327498#M83347</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2020-05-12T10:00:53Z</dc:date>
    </item>
  </channel>
</rss>

