Rule Category

MALWARE-BACKDOOR -- Snort has detected suspicious communication traffic unrelated to commands, such as exfiltration of data from the infected machine, especially larger chunks of data.

Alert Message

MALWARE-BACKDOOR Win.Backdoor.Chopper webshell inbound request attempt

Rule Explanation

This event is generated when Win.Backdoor.Chopper is detected on the network. Impact: A Network Trojan was detected Details: This rule fires when an inbound request is being attempted by a client connecting to Win.Backdoor.Chopper. Ease of Attack:

What To Look For

This event is generated when Win.Backdoor.Chopper is detected on the network.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

None

Additional Links

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None

MITRE ATT&CK Framework

Tactic: Command and Control

Technique: Standard Application Layer Protocol

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org