MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.
MALWARE-CNC Win.Trojan.Autophyte RAT variant outbound connection
This event is generated when an infected internal machine accesses Autophyte's Command and Control servers outside the network. Impact: Trojan Activity. Details: Autophyte is a remote administration tool believed to be built and run by the Lazarus Group. It is used to collect victim data and potentially drop additional malware. Ease of Attack:
No information provided
No public information
No known false positives
Yaser Mansour
No rule groups
None
No information provided
None