alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Fake AV - Downloader likely malicious payload download src=xrun)"; flow:established,to_server; content:"GET /get?src=xrun HTTP/1."; nocase; content:"|0d 0a|Request\: "; nocase; classtype:trojan-activity; reference:url,www.bluetack.co.uk/forums/lofiversion/index.php/t18462.html; reference:url,doc.emergingthreats.net/2010831; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Fake_AV; sid:2010831; rev:2;)

Added 2010-02-23 10:55:59 UTC


Topic revision: r1 - 2010-02-23 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats