JawinaBug Command and Control Traffic Detection(85599)

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

JawinaBug Command and Control Traffic Detection(85599)

L0 Member

Could you guys please throw some light on "JawinaBug Command and Control Traffic Detection(85599)", there is no information related to could you guys please throw some light on "JawinaBug Command and Control Traffic Detection(85599)", there is no information related to JawinaBug at all

What triggers this signature, what are the IOCs?, Please help

I have seen this signature triggering in internal communication with SQL server. 

All I know so far is that the signature is fairly new and by default action of the firewall is reset both connections

2 REPLIES 2

Cyber Elite
Cyber Elite

if you enable extended threat pcap, you can see what triggered the signature

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

Community Team Member

Hi @Lalitb ,

 

To add to reaper's comment... you enable the extended_pcap in the vulnerability profile:

 

extended_pcap.jpg

 

You can edit the length of the extended_pcap as well :

 

Extended PCAP LengthExtended PCAP Length

 

Hope this helps,

-Kiwi.

LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 2362 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!