recvfrom / contributor

Proof-of-Concept for a program to help people contribute to Snort/ClamAV
https://recvfrom.github.io/contributor/
0 stars 0 forks source link

Predator the Thief C2 traffic #6

Open recvfrom opened 3 years ago

recvfrom commented 3 years ago

Overview Write Snort rules for the command and control (C2) traffic used by Predator the Thief (commodity infostealer malware)

Proposal Write Snort rules (likely two) for Predator the Thief C2 traffic. For more info, see:

Expected Difficulty Beginner/Easy - The C2 protocol is very basic, write-ups exist that detail the purpose of the protocol data, etc.

Technical Info

predator-4c18b806dd10733f6e4d1376e769d94b.pcap.zip (password: infected)