Skip to content

Predator the Thief C2 traffic #6

@recvfrom

Description

@recvfrom

Overview
Write Snort rules for the command and control (C2) traffic used by Predator the Thief (commodity infostealer malware)

Proposal
Write Snort rules (likely two) for Predator the Thief C2 traffic. For more info, see:

Expected Difficulty
Beginner/Easy - The C2 protocol is very basic, write-ups exist that detail the purpose of the protocol data, etc.

Technical Info

predator-4c18b806dd10733f6e4d1376e769d94b.pcap.zip (password: infected)

Metadata

Metadata

Assignees

No one assigned

    Labels

    BeginnerThis project is good for beginnersSnortSignifies a Snort Rule Project

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions