MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.
MALWARE-CNC Win.Backdoor.Chopper web shell connection
This event is generated when activity relating to malware is detected. Impact: Serious. Possible existance of malware on the target host. Details: This activity is indicative of malware activity on a host. In this case the MALWARE-CNC Win.Backdoor.Chopper web shell connection was detected. Ease of Attack: Simple. This may be an indication of a malware infestation.
This rule is triggered by activity produced by the Chopper webshell tool, attempting to gain control of a target server.
No public information
No known false positives
Cisco Talos
No rule groups
None
No information provided
None
Tactic: Command and Control
Technique: Remote Access Tools
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org