#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET DELETED Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; reference:url,doc.emergingthreats.net/2007603; classtype:trojan-activity; sid:2007603; rev:4; metadata:created_at 2010_07_30, updated_at 2010_07_30;)
Added 2018-09-13 19:39:16 UTC
Added 2018-09-13 17:53:32 UTC
#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET DELETED Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; reference:url,doc.emergingthreats.net/2007603; classtype:trojan-activity; sid:2007603; rev:4; metadata:created_at 2010_07_30, updated_at 2010_07_30;)
Added 2017-08-07 21:00:52 UTC
#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; reference:url,doc.emergingthreats.net/2007603; classtype:trojan-activity; sid:2007603; rev:4;)
Added 2012-01-18 18:00:55 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; reference:url,doc.emergingthreats.net/2007603; classtype:trojan-activity; sid:2007603; rev:4;)
Added 2011-10-12 19:23:25 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2007603; sid:2007603; rev:4;)
Added 2011-09-14 22:36:58 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2007603; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Win32.Wopla; sid:2007603; rev:4;)
Added 2011-02-04 17:26:43 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2007603; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Win32.Wopla; sid:2007603; rev:4;)
Added 2009-02-13 19:47:26 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2007603; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Win32.Wopla; sid:2007603; rev:4;)
Added 2009-02-13 19:47:26 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2007603; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Win32.Wopla; sid:2007603; rev:4;)
Added 2009-02-13 19:46:39 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2007603; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Win32.Wopla; sid:2007603; rev:4;)
Added 2009-02-13 19:46:39 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2007603; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Win32.Wopla; sid:2007603; rev:4;)
Added 2009-02-13 19:45:24 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2007603; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Win32.Wopla; sid:2007603; rev:4;)
Added 2009-02-13 19:45:24 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; sid:2007603; rev:3;)
Added 2008-01-31 10:12:24 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; sid:2007603; rev:3;)
Added 2008-01-31 10:12:24 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"BLEEDING-EDGE TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; sid:2007603; rev:2;)
Added 2007-11-13 00:46:15 UTC
From the sandnet analysis
--
ShirkDog? - 14 Nov 2007
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"BLEEDING-EDGE TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; dsize:12; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; classtype:trojan-activity; sid:2007603; rev:2;)
Added 2007-11-13 00:46:15 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"BLEEDING-EDGE TROJAN Proxy.Win32.Wopla.ag Check-In"; flow:established,to_server; content:"|0a 00 00 00 00 00 00 00 00 00 00 00|"; depth:12; classtype:trojan-activity; sid:2007603; rev:1;)
Added 2007-09-06 01:49:00 UTC
Possible FP when desktop replies with CEIP message back to MS ??
Partial Packet capture follows:
Event ID : 3:1:2051713 Timestamp : 9/27/2007 7:59:17 AM
Event Name : BLEEDING-EDGE TROJAN Proxy.Win32.Wopla.ag Check-In
Classification : trojan-activity
IP Header Information :
IPv4: 000.000.000.000 -> 131.107.113.76
Source: Local Tech's Desktop -> sqm.msn.com
hlen=5 TOS=0 dlen=1172 ID=7303 flags=2 offset=0 TTL=127 chksum=43777
TCP Header Information :
sport=1320 -> dport=80 flags=***AP*** seq=4000293484
ack=2468127061 off=5 res=0 win=65535 urp=0 chksum=64373
Options:
Packet Payload:
0A 00 00 00 00 00 00 00 00 00 00 00 D3 C5 00 00 ............??..
00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 ................
28 CE 00 00 00 00 00 00 04 00 00 00 00 00 00 00 (?..............
00 00 00 00 36 CF 00 00 00 00 00 00 04 00 00 00 ....6?..........
00 00 00 00 00 00 00 00 60 D4 00 00 00 00 00 00 ........`?......
02 00 00 00 00 00 00 00 00 00 00 00 20 3A 01 00 ............ :..
04 10 ED 0D 09 00 00 00 00 00 00 00 00 00 00 00 ..?.............
0B 6A 01 00 00 00 00 00 0A 00 00 00 00 00 00 00 .j..............
00 00 00 00 8D 6A 01 00 00 00 00 00 02 00 00 00 ....?j..........
00 00 00 00 00 00 00 00 D6 76 01 00 00 00 00 00 ........?v......
0D 00 00 00 00 00 00 00 00 00 00 00 A5 D4 01 00 ............??..
-- RichardUllrich - 27 Sep 2007