8af1ab8cac
new: HackTool - CobaltStrike Malleable Profile Patterns - Proxy remove: CobaltStrike Malformed UAs in Malleable Profiles remove: CobaltStrike Malleable (OCSP) Profile remove: CobaltStrike Malleable Amazon Browsing Traffic Profile remove: CobaltStrike Malleable OneDrive Browsing Traffic Profile remove: iOS Implant URL Pattern update: Chafer Malware URL Pattern - Reduce level to high and move to ET folder
33 lines
844 B
YAML
33 lines
844 B
YAML
title: iOS Implant URL Pattern
|
|
id: e06ac91d-b9e6-443d-8e5b-af749e7aa6b6
|
|
status: deprecated # Deprecated to being related to Ios so logging will vary and its old
|
|
description: Detects URL pattern used by iOS Implant
|
|
references:
|
|
- https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html
|
|
- https://twitter.com/craiu/status/1167358457344925696
|
|
author: Florian Roth (Nextron Systems)
|
|
date: 2019/08/30
|
|
modified: 2024/02/26
|
|
tags:
|
|
- attack.execution
|
|
- attack.t1203
|
|
- attack.collection
|
|
- attack.t1005
|
|
- attack.t1119
|
|
- attack.credential_access
|
|
- attack.t1528
|
|
- attack.t1552.001
|
|
logsource:
|
|
category: proxy
|
|
detection:
|
|
selection:
|
|
c-uri|contains: '/list/suc\?name='
|
|
condition: selection
|
|
fields:
|
|
- ClientIP
|
|
- c-uri
|
|
- c-useragent
|
|
falsepositives:
|
|
- Unknown
|
|
level: critical
|