#alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET DELETED JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http|3a|//"; nocase; content:"|3a|3531/.pkt"; nocase; within: 20; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; reference:url,doc.emergingthreats.net/bin/view/Main/2001679; classtype:trojan-activity; sid:2001679; rev:14; metadata:created_at 2010_07_30, updated_at 2010_07_30;)

Added 2017-08-07 20:55:37 UTC


#alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http|3a|//"; nocase; content:"|3a|3531/.pkt"; nocase; within: 20; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; reference:url,doc.emergingthreats.net/bin/view/Main/2001679; classtype:trojan-activity; sid:2001679; rev:13;)

Added 2011-10-12 19:10:47 UTC


#alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http|3a|//"; nocase; content:"|3a|3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; reference:url,doc.emergingthreats.net/bin/view/Main/2001679; sid:2001679; rev:13;)

Added 2011-09-14 21:02:37 UTC


#alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http|3a|//"; nocase; content:"|3a|3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; reference:url,doc.emergingthreats.net/bin/view/Main/2001679; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_JoltID; sid:2001679; rev:13;)

Added 2011-02-04 17:21:34 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http\://"; nocase; content:"\:3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; reference:url,doc.emergingthreats.net/bin/view/Main/2001679; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_JoltID; sid:2001679; rev:11;)

Added 2010-06-23 13:46:05 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http\://"; nocase; content:"\:3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; reference:url,doc.emergingthreats.net/bin/view/Main/2001679; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_JoltID; sid:2001679; rev:11;)

Added 2010-06-23 13:46:05 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http\://"; nocase; content:"\:3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; reference:url,doc.emergingthreats.net/bin/view/Main/2001679; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_JoltID; sid: 2001679; rev:11;)

Added 2009-02-08 17:30:24 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http\://"; nocase; content:"\:3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; reference:url,doc.emergingthreats.net/bin/view/Main/2001679; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_JoltID; sid: 2001679; rev:11;)

Added 2009-02-08 17:30:24 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http\://"; nocase; content:"\:3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; sid: 2001679; rev:10;)

Added 2008-05-18 19:52:12 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http\://"; nocase; content:"\:3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; sid: 2001679; rev:10;)

Added 2008-05-18 19:52:12 UTC


alert tcp $HOME_NET any -> any any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http\://"; nocase; content:"\:3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; sid: 2001679; rev:9;)

Added 2008-01-28 17:24:17 UTC


alert tcp $HOME_NET any -> any any (msg:"ET MALWARE JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http\://"; nocase; content:"\:3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; sid: 2001679; rev:9;)

Added 2008-01-28 17:24:17 UTC


alert tcp $HOME_NET any -> any any (msg: "BLEEDING-EDGE Malware JoltID? Agent P2P? via Proxy Server"; flow: to_server,established; content:"POST http\://"; nocase; content:"\:3531/.pkt"; nocase; within: 20; classtype: trojan-activity; reference:url,securityresponse.symantec.com/avcenter/venc/data/adware.p2pnetworking.html; sid: 2001679; rev:8; )



Topic revision: r1 - 2017-08-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats