<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MALWARE-CNC User-Agent known malicious user-agent string AutoIt in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054858#M1068402</link>
    <description>&lt;P&gt;Let me summarize our discussion. every time i get IPS event, first i must look at Packet's User-agent string and if it is same with snort rule it means it is definitely true positive. If i am right, please confirm. thanks so much&lt;/P&gt;</description>
    <pubDate>Mon, 30 Mar 2020 08:04:16 GMT</pubDate>
    <dc:creator>ccna_security</dc:creator>
    <dc:date>2020-03-30T08:04:16Z</dc:date>
    <item>
      <title>MALWARE-CNC User-Agent known malicious user-agent string AutoIt</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054761#M1068393</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;&lt;P&gt;Who could tell me how to be sure whether this IPS event (MALWARE-CNC User-Agent known malicious user-agent string AutoIt ) is false positive. I get this notification very often.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device : firepower&lt;BR /&gt;Timestamp : 2020-03-30 10:18:53&lt;BR /&gt;Protocol : tcp&lt;BR /&gt;Alert Message : MALWARE-CNC User-Agent known malicious user-agent string AutoIt (1:18347:10)&lt;BR /&gt;Session : x.x.x.x:49644 -&amp;gt; 209.95.55.249:80&lt;BR /&gt;[*] 0 more events originated from this Source IP&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 05:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054761#M1068393</guid>
      <dc:creator>ccna_security</dc:creator>
      <dc:date>2020-03-30T05:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: MALWARE-CNC User-Agent known malicious user-agent string AutoIt</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054799#M1068396</link>
      <description>&lt;P&gt;If you are getting an Intrusion Event, you can drill down in FMC under Analysis &amp;gt; Intrusions &amp;gt; Events and go into the Packets workflow. There you can see the actual packets and verify if the user-agent string specified in the Snort rule is present.&lt;/P&gt;
&lt;P&gt;Here's the reference for that rule:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://snort.org/rule_docs/1-18347" target="_blank" rel="noopener"&gt;https://snort.org/rule_docs/1-18347&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;...and the associated Snort rule:&lt;/P&gt;
&lt;PRE&gt;alert tcp $HOME_NET any -&amp;gt; $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent known malicious user-agent string AutoIt"; flow:to_server,established; content:"User-Agent|3A| AutoIt|0D 0A|"; fast_pattern:only; http_header:; metadata:impact_flag red, service http; reference:url,snort.org/rule_docs/1-18347; classtype:trojan-activity; sid:18347; rev:10; gid:1; )&lt;/PRE&gt;
&lt;P&gt;That rule is disabled by default in a Balanced Security and Connectivity IPS ruleset.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 06:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054799#M1068396</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-30T06:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: MALWARE-CNC User-Agent known malicious user-agent string AutoIt</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054817#M1068398</link>
      <description>&lt;P&gt;Thank you Marvin for you info. I checked the packet in firewall and observed that the string in the packet is same with Snor rule. so this means that it is not false positive right? I should use the method you taught me when i need to be sure whether the event is false positive or not, right? If user string in the packet is same with Snort rule, it means it is 100 persent true positive&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is packet firewall captured, and snort rule&lt;/P&gt;&lt;P&gt;alert tcp $HOME_NET any -&amp;gt; $EXTERNAL_NET $HTTP_PORTS&lt;BR /&gt;(msg:"MALWARE-CNC User-Agent known malicious user-agent string AutoIt";&lt;BR /&gt;flow:to_server,established; content:"User-Agent|3A| AutoIt|0D 0A|";&lt;BR /&gt;fast_pattern:only; http_header; metadata:impact_flag red, service http; reference:url,snort.org/rule_docs/1-18347; classtype:trojan-activity; sid:18347; rev:10; gid:1; )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;Packet Text&lt;/H3&gt;&lt;DIV class="content"&gt;&lt;PRE&gt;..u.L=.M..0.......E...(.@.......S@._7....P....$.2.P.......GET /drupal/sites/default/files/WebFM/admin/files/Spreadsheet_Compare/Version.ini HTTP/1.1
User-Agent: AutoIt
Host: thefoolonthehill.net
Cache-Control: no-cache&lt;/PRE&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 30 Mar 2020 07:14:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054817#M1068398</guid>
      <dc:creator>ccna_security</dc:creator>
      <dc:date>2020-03-30T07:14:26Z</dc:date>
    </item>
    <item>
      <title>Re: MALWARE-CNC User-Agent known malicious user-agent string AutoIt</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054847#M1068401</link>
      <description>&lt;P&gt;Well we have a saying "the packets don't lie".&lt;/P&gt;
&lt;P&gt;Your packet view that you provided clearly shows the user string so it's definitely not a false positive.&lt;/P&gt;
&lt;P&gt;If I am ever in doubt, I use that method to prove (usually to a customer) why Firepower (or more accurately the Talos security intelligence researchers who develop the rules) considers the rule as a true positive.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 07:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054847#M1068401</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-30T07:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: MALWARE-CNC User-Agent known malicious user-agent string AutoIt</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054858#M1068402</link>
      <description>&lt;P&gt;Let me summarize our discussion. every time i get IPS event, first i must look at Packet's User-agent string and if it is same with snort rule it means it is definitely true positive. If i am right, please confirm. thanks so much&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 08:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4054858#M1068402</guid>
      <dc:creator>ccna_security</dc:creator>
      <dc:date>2020-03-30T08:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: MALWARE-CNC User-Agent known malicious user-agent string AutoIt</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4055843#M1068454</link>
      <description>&lt;P&gt;No, you don't need to check every time because Firepower has a VERY low false positive rate. I only check the packets if there is doubt or question from the customer that the event may not be a true positive.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 11:28:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4055843#M1068454</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-31T11:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: MALWARE-CNC User-Agent known malicious user-agent string AutoIt</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4055881#M1068461</link>
      <description>&lt;P&gt;Hello Marvin&lt;/P&gt;&lt;P&gt;i get same notification every day. what i shoud do with that notification? i asked the user to run antivirus maybe some agent would be found and deleted but we fail to find out what cause the event being triggered. do you think blocking that ip address would solve the problem?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 12:26:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4055881#M1068461</guid>
      <dc:creator>ccna_security</dc:creator>
      <dc:date>2020-03-31T12:26:29Z</dc:date>
    </item>
    <item>
      <title>Re: MALWARE-CNC User-Agent known malicious user-agent string AutoIt</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4056142#M1068486</link>
      <description>&lt;P&gt;Since the Firepower is identifying it as an intrusion event it should already be blocking the destination IP address.&lt;/P&gt;
&lt;P&gt;To ascertain what might be causing it on the endpoint can be a bit more difficult. If whatever endpoint protection is not already catching it, a deeper investigation may be required. I would typically use something like SysInternals tcpview utility in Windows to determine what process (if it's not the browser) is making the connections to the address shown in the event.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 17:39:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-user-agent-known-malicious-user-agent-string-autoit/m-p/4056142#M1068486</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-31T17:39:19Z</dc:date>
    </item>
  </channel>
</rss>

