EmergingThreats> Main Web>2008276 (revision 2)EditAttach

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User-Agent (contains loader)"; flow:to_server,established; content:"|0d 0a|User-Agent\: "; content:"loader"; distance:0; within:100; pcre:"/User-Agent\:[^\n]+loader/i"; classtype:trojan-activity; sid:2008276; rev:4;)

Added 2008-09-10 13:15:20 UTC

False positives on "Adobe Flash Player Downloader"

SRC: GET /get/flashplayer/current/gtb/install_flash.foo.s HTTP/1.1 SRC: User-Agent: Adobe Flash Player Downloader SRC: Host: fpdownload2.macromedia.com

-- MikeWazowski - 19 Sep 2008


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User-Agent (contains loader)"; flow:to_server,established; content:"|0d 0a|User-Agent\: "; content:"loader"; distance:0; within:100; pcre:"/User-Agent\:[^\n]+loader/i"; classtype:trojan-activity; sid:2008276; rev:4;)

Added 2008-09-10 13:15:20 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User-Agent (contains loader)"; flow:to_server,established; content:"|0d 0a|User-Agent\: "; content:" loader"; distance:0; within:100; pcre:"/User-Agent\:[^\n]+loader/i"; classtype:trojan-activity; sid:2008276; rev:3;)

Added 2008-05-30 13:10:21 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User-Agent (contains loader)"; flow:to_server,established; content:"|0d 0a|User-Agent\: "; content:" loader"; distance:0; within:100; pcre:"/User-Agent\:[^\n]+loader/i"; classtype:trojan-activity; sid:2008276; rev:3;)

Added 2008-05-30 13:10:21 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User-Agent (contains loader)"; flow:to_server,established; content:"|0d 0a|User-Agent\: "; content:" loader"; distance:0; within:100; pcre:"/User-Agent\:[^\n]loader/"; classtype:trojan-activity; sid:2008276; rev:2;)

Added 2008-05-30 12:43:58 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User-Agent (contains loader)"; flow:to_server,established; content:"|0d 0a|User-Agent\: "; content:" loader"; distance:0; within:100; pcre:"/User-Agent\:[^\n]loader/"; classtype:trojan-activity; sid:2008276; rev:2;)

Added 2008-05-30 12:43:58 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User-Agent (contains loader)"; flow: to_server,established; content:"|0d 0a|User-Agent\: "; content:" loader"; distance:0; within:80; pcre:"/User-Agent\:[^\n] loader/i"; classtype:trojan-activity; sid:2008276; rev:1;)

Added 2008-05-30 12:24:55 UTC


Edit | Attach | Print version | History: r4 < r3 < r2 < r1 | Backlinks | Raw View | Raw edit | More topic actions...
Topic revision: r2 - 2008-09-19 - MikeWazowski
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats