#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET DELETED User-Agent (MSIE XPSP2)"; flow:to_server,established; content:"MSIE XPSP2"; fast_pattern:only; http_header; reference:url,doc.emergingthreats.net/2003200; classtype:trojan-activity; sid:2003200; rev:13;)

Added 2011-12-15 18:09:08 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"MSIEXPSP2"; http_header; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/iH"; reference:url,doc.emergingthreats.net/2003200; classtype:trojan-activity; sid:2003200; rev:11;)

Added 2011-10-12 19:13:01 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"MSIEXPSP2"; http_header; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/iH"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2003200; sid:2003200; rev:11;)

Added 2011-09-14 22:25:59 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"MSIEXPSP2"; http_header; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/iH"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2003200; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Metafisher; sid:2003200; rev:11;)

Added 2011-02-04 17:22:18 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent|3a|"; nocase; content:"MSIEXPSP2"; within:150; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2003200; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Metafisher; sid:2003200; rev:7;)

Added 2010-07-29 22:05:01 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent|3a|"; nocase; content:"MSIEXPSP2"; within:150; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2003200; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Metafisher; sid:2003200; rev:7;)

Added 2010-07-29 22:05:01 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; content:"MSIEXPSP2"; within:150; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2003200; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Metafisher; sid:2003200; rev:6;)

Added 2009-11-25 11:39:03 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; content:"MSIEXPSP2"; within:150; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2003200; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Metafisher; sid:2003200; rev:6;)

Added 2009-11-25 11:39:03 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; content:"MSIEXPSP2"; within:150; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2003200; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_USER_Agents; sid:2003200; rev:4;)

Added 2009-02-09 21:30:23 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; content:"MSIEXPSP2"; within:150; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2003200; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_USER_Agents; sid:2003200; rev:4;)

Added 2009-02-09 21:30:23 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; content:"MSIEXPSP2"; within:150; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2003200; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_USER_Agents; sid:2003200; rev:4;)

Added 2009-02-09 21:29:24 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; content:"MSIEXPSP2"; within:150; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2003200; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_USER_Agents; sid:2003200; rev:4;)

Added 2009-02-09 21:29:24 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; content:"MSIEXPSP2"; within:150; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; sid:2003200; rev:3;)

Added 2008-05-09 17:01:40 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; content:"MSIEXPSP2"; within:150; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; sid:2003200; rev:3;)

Added 2008-05-09 17:01:40 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; sid:2003200; rev:2;)

Added 2008-01-28 17:24:20 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; sid:2003200; rev:2;)

Added 2008-01-28 17:24:20 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"BLEEDING-EDGE MALWARE Suspicious User Agent (MSIE XPSP2)"; flow:to_server,established; content:"User-Agent\:"; nocase; pcre:"/User-Agent\:[^\n]+MSIE XPSP2/i"; classtype:trojan-activity; sid:2003200; rev:1;)



Topic revision: r1 - 2011-12-15 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats