alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET POLICY Data POST to an image file (gif)"; flow:to_server,established; content:"POST"; http_method; content:".gif"; http_uri; fast_pattern:only; pcre:"/\.gif$/U"; pcre:"/POST\s[^\r\n]+?(?<!__utm)\.gif HTTP\/1\./"; content:!".tealiumiq.com"; http_header; reference:url,doc.emergingthreats.net/2010066; classtype:trojan-activity; sid:2010066; rev:11;)

Added 2016-01-07 21:05:23 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET POLICY Data POST to an image file (gif)"; flow:to_server,established; content:"POST"; http_method; content:".gif"; http_uri; fast_pattern:only; pcre:"/\.gif$/U"; pcre:"/POST\s[^\r\n]+?(?<!__utm)\.gif HTTP\/1\./"; reference:url,doc.emergingthreats.net/2010066; classtype:trojan-activity; sid:2010066; rev:9;)

Added 2012-09-06 17:03:00 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET POLICY Data POST to an image file (gif)"; flow:to_server,established; content:"POST"; http_method; content:".gif"; http_uri; fast_pattern:only; pcre:"/\.gif$/U"; pcre:"/POST\s[^\r\n]+?\.gif HTTP\/1\./"; reference:url,doc.emergingthreats.net/2010066; classtype:trojan-activity; sid:2010066; rev:8;)

Added 2012-08-31 21:47:21 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET POLICY Data POST to an image file (gif)"; flow:to_server,established; content:"POST"; http_method; content:".gif"; http_uri; fast_pattern:only; pcre:"/\.gif$/U"; pcre:"/POST\s[^\r\n]+?\.gif HTTP\/1\./"; reference:url,doc.emergingthreats.net/2010066; classtype:trojan-activity; sid:2010066; rev:8;)

Added 2012-08-31 18:30:04 UTC


#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET POLICY Data POST to an image file (gif)"; flow:established,to_server; content:"POST"; nocase; http_method; content:".gif"; nocase; http_uri; content:".gif HTTP"; nocase; pcre:"/\.gif$/Ui"; reference:url,doc.emergingthreats.net/2010066; classtype:trojan-activity; sid:2010066; rev:6;)

Added 2012-03-20 17:59:10 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Data POST to an image file (gif)"; flow:established,to_server; content:"POST"; nocase; http_method; content:".gif"; nocase; http_uri; content:".gif HTTP"; nocase; pcre:"/POST\x20.*\/.+\.gif\x20HTTP\/1\.[0-1]$/i"; reference:url,doc.emergingthreats.net/2010066; classtype:trojan-activity; sid:2010066; rev:5;)

Added 2012-03-19 23:39:06 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Data POST to an image file (gif)"; flow:established,to_server; content:"POST"; http_method; content:".gif"; nocase; http_uri; content:".gif HTTP"; nocase; pcre:"/POST\x20.*\/.+\.gif\x20HTTP\/1\.[0-1]$/i"; reference:url,doc.emergingthreats.net/2010066; classtype:trojan-activity; sid:2010066; rev:4;)

Added 2011-10-12 19:28:53 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Data POST to an image file (gif)"; flow:established,to_server; content:"POST"; http_method; content:".gif"; nocase; http_uri; content:".gif HTTP"; nocase; classtype:trojan-activity; pcre:"/POST\x20.*\/.+\.gif\x20HTTP\/1\.[0-1]$/i"; reference:url,doc.emergingthreats.net/2010066; sid:2010066; rev:4;)

Added 2011-09-14 22:42:09 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Data POST to an image file (gif)"; flow:established,to_server; content:"POST"; http_method; content:".gif"; nocase; http_uri; content:".gif HTTP"; nocase; classtype:trojan-activity; pcre:"/POST\x20.*\/.+\.gif\x20HTTP\/1\.[0-1]$/i"; reference:url,doc.emergingthreats.net/2010066; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Post_to_image; sid:2010066; rev:4;)

Added 2011-02-04 17:29:31 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Data POST to an image file (gif)"; flow:established,to_server; content:"POST "; depth:5; uricontent:".gif"; nocase; content:".gif HTTP"; nocase; classtype:trojan-activity; pcre:"/POST\x20.*\/.+\.gif\x20HTTP\/1\.[0-1]$/i"; reference:url,doc.emergingthreats.net/2010066; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Post_to_image; sid:2010066; rev:3;)

Added 2009-12-01 14:45:41 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Data POST to an image file (gif)"; flow:established,to_server; content:"POST "; depth:5; uricontent:".gif"; nocase; content:".gif HTTP"; nocase; classtype:trojan-activity; pcre:"/POST\x20.*\/.+\.gif\x20HTTP\/1\.[0-1]$/i"; reference:url,doc.emergingthreats.net/2010066; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Post_to_image; sid:2010066; rev:3;)

Added 2009-12-01 14:45:41 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Data POST to an image file (gif)"; flow:established,to_server; content:"POST "; depth:5; uricontent:".gif"; content:".gif HTTP"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2010066; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Post_to_image; sid:2010066; rev:2;)

Added 2009-10-12 20:45:37 UTC

These rules seem to generate considerable false positives. Attaching pcaps.

-- RickChisholm - 14 Oct 2009


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Data POST to an image file (gif)"; flow:established,to_server; content:"POST "; depth:5; uricontent:".gif"; content:".gif HTTP"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2010066; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Post_to_image; sid:2010066; rev:2;)

Added 2009-10-12 20:45:37 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Data POST to an image file (gif)"; flow:established,to_server; content:"POST "; depth:5; uricontent:".gif"; content:".gif HTTP"; classtype:trojan-activity; sid:2010066; rev:1;)

Added 2009-10-09 08:00:42 UTC


Topic revision: r2 - 2009-10-14 - RickChisholm
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats