Rule Category

MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.

Alert Message

MALWARE-CNC Win.Trojan.Uppercut inbound payload download

Rule Explanation

This event is generated when Win.Trojan.Uppercut is detected on the network. Impact: A Network Trojan was detected Details: Rule looks an inbound connection containing a Win.Trojan.Uppercut variant. Ease of Attack:

What To Look For

This rule looks for an outbound cnc connection made by a Win.Trojan.Uppercut variant.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Command and Control

Technique: Standard Application Layer Protocol

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Additional Links

Rule Vulnerability

N/A

Not Applicable

CVE Additional Information