SigmaHQ/rules/proxy/proxy_ua_suspicious.yml

46 lines
1.9 KiB
YAML
Raw Normal View History

title: Suspicious User Agent
2019-11-12 22:12:27 +00:00
id: 7195a772-4b3f-43a4-a210-6a003d65caa1
status: experimental
description: Detects suspicious malformed user agent strings in proxy logs
author: Florian Roth
date: 2017/07/08
2021-08-09 15:23:15 +00:00
modified: 2021/08/09
2020-09-15 13:02:30 +00:00
references:
- https://github.com/fastly/waf_testbed/blob/master/templates/default/scanners-user-agents.data.erb
logsource:
category: proxy
detection:
2020-09-10 08:33:11 +00:00
selection1:
c-useragent|startswith:
- 'user-agent' # User-Agent: User-Agent:
2020-09-10 08:33:11 +00:00
- 'Mozilla/3.0 '
- 'Mozilla/2.0 '
- 'Mozilla/1.0 '
- 'Mozilla ' # missing slash
- ' Mozilla/' # leading space
- 'Mozila/' # single 'l'
- 'Mozilla/4.0 (compatible; MSIE 6.0; MS Web Services Client Protocol' # https://twitter.com/NtSetDefault/status/1303643299509567488
selection2:
c-useragent|contains:
- ' (compatible;MSIE ' # typical typo - missing space
- '.0;Windows NT ' # typical typo - missing space
selection3:
c-useragent:
- '_'
- 'CertUtil URL Agent' # https://twitter.com/stvemillertime/status/985150675527974912
2019-02-05 13:32:29 +00:00
- 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0)' # CobaltStrike Beacon https://unit42.paloaltonetworks.com/tracking-oceanlotus-new-downloader-kerrdown/
2019-08-30 09:53:55 +00:00
- 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0' # used by APT28 malware https://threatvector.cylance.com/en_us/home/inside-the-apt28-dll-backdoor-blitz.html
- 'HTTPS' # https://twitter.com/stvemillertime/status/1204437531632250880
falsepositives:
2021-08-09 15:23:15 +00:00
c-useragent: 'Mozilla/3.0 * Acrobat *' # Acrobat with linked content
2020-09-10 08:33:11 +00:00
condition: ( selection1 or selection2 or selection3 ) and not falsepositives
2017-09-12 21:54:04 +00:00
fields:
- ClientIP
2019-12-06 23:11:33 +00:00
- c-uri
- c-useragent
falsepositives:
- Unknown
level: high
2020-09-15 13:02:30 +00:00
tags:
- attack.command_and_control
- attack.t1071.001