MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.
MALWARE-CNC Osx.Trojan.Gmera variant outbound connection
This event is generated when a MacOS machine infected with a Gmera variant attempts to send the username and IP address of the system to a remote server. Impact: A Network Trojan was detected Details: This Gmera variant collects the username and IP address from the infected machine via whoami and ‘curl -s ipecho.net/plain’. It then connects to the malware URL and sends the data using the following format: hxxp://malware.com/link.php?username&ip_address Ease of Attack:
No information provided
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None