HttpBrowser is a Remote Access Trojan associated with cyberespionage campaigns. This blog will discuss how to detect its beaconing activity using RSA Security Analytics.
HttpBrowser sends information about the infected system to its C2 server via POST requests:
The querystring is the decimal representation of the value returned by the GetTickCount system call. It is the number of milliseconds that have elapsed since the system was started. In the request body itself, more information is included:
Malware researchers called this family HttpBrowser based on the unique User-Agent string used by its variants. However, recent HttpBrowser binaries dropped that UA string altogether and started using a common one in order to bypass signatures and blend in with other network traffic.
Except for the UA string, everything else stays the same. That’s how the traffic looks in Security Analytics Investigator:
Assuming the appropriate meta keys are enabled, the following query can be used to detect HttpBrowser network activity:
action = 'post' && directory = '/' && filename = 'result' && query exists
Scan results for an HttpBrowser variant can be viewed here.
All the IOC from those HTTP sessions were added to the following RSA FirstWatch Live feeds:
If threat.desc meta key is enabled then you can use the following app rule:
threat.desc = 'apt-httpbrowser-c2'
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.