Rule Category

MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.

Alert Message

MALWARE-CNC Win.Trojan.SectorA05 outbound connection attempt

Rule Explanation

This event is generated when command and control communication related to SectorA05 Operation Kitty Phishing is detected. Impact: A Remote Administration Tool was detected Details: Operation Kitty Phishing was a spear phishing campaign in which an executable file masquerading as a Hangul Word Processor file was sent to reporter covering topics related to the Unification Ministry of South Korea. This executable file dropped two script-based Remote Administration Tools, "2.wsf" and "3.wsf". "2.wsf" attempts to connect to command and control servers identified via a Google Doc and then download, decrypt and execute "Freedom.dll" malware. Ease of Attack:

What To Look For

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

MITRE ATT&CK Framework



For reference, see the MITRE ATT&CK vulnerability types here:

Additional Links

Rule Vulnerability

CVE Additional Information