alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT"; http_method; http_header_names; content:"HoST|0d 0a|"; content:"UsER-AgENt|0d 0a|"; fast_pattern; http_protocol; content:"HttP"; reference:url,doc.emergingthreats.net/2010129; classtype:trojan-activity; sid:2010129; rev:8; metadata:created_at 2010_07_30, former_category MALWARE, updated_at 2020_11_02;)

Added 2020-11-02 18:29:13 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT"; http_method; http_header_names; content:"HoST|0d 0a|"; content:"UsER-AgENt|0d 0a|"; fast_pattern; http_protocol; content:"HttP"; reference:url,doc.emergingthreats.net/2010129; classtype:trojan-activity; sid:2010129; rev:8; metadata:created_at 2010_07_30, former_category MALWARE, updated_at 2020_02_25;)

Added 2020-08-05 19:06:05 UTC


alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT"; http_method; content:"HttP"; depth:200; content:"|0d 0a|HoST|3a| "; content:"UsER-AgENt|3a| |0d 0a|"; http_header; reference:url,doc.emergingthreats.net/2010129; classtype:trojan-activity; sid:2010129; rev:7; metadata:created_at 2010_07_30, updated_at 2019_09_26;)

Added 2019-09-26 19:56:31 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT"; http_method; content:"HttP"; depth:200; content:"|0d 0a|HoST|3a| "; content:"UsER-AgENt|3a| |0d 0a|"; http_header; reference:url,doc.emergingthreats.net/2010129; classtype:trojan-activity; sid:2010129; rev:6; metadata:created_at 2010_07_30, updated_at 2010_07_30;)

Added 2018-09-13 19:41:09 UTC


Added 2018-09-13 17:54:31 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT"; http_method; content:"HttP"; depth:200; content:"|0d 0a|HoST|3a| "; content:"UsER-AgENt|3a| |0d 0a|"; http_header; reference:url,doc.emergingthreats.net/2010129; classtype:trojan-activity; sid:2010129; rev:6; metadata:created_at 2010_07_30, updated_at 2010_07_30;)

Added 2017-08-07 21:03:14 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT"; http_method; content:"HttP"; depth:200; content:"|0d 0a|HoST|3a| "; content:"UsER-AgENt|3a| |0d 0a|"; http_header; reference:url,doc.emergingthreats.net/2010129; classtype:trojan-activity; sid:2010129; rev:6;)

Added 2011-12-15 18:09:42 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT"; http_method; content:"HttP"; depth:200; content:"|0d 0a|HoST|3a| "; content:"UsER-AgENt|3a| |0d 0a|"; http_header; reference:url,doc.emergingthreats.net/2010129; classtype:trojan-activity; sid:2010129; rev:6;)

Added 2011-10-12 19:28:59 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT"; http_method; content:"HttP"; depth:200; content:"|0d 0a|HoST|3a| "; content:"UsER-AgENt|3a| |0d 0a|"; http_header; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2010129; sid:2010129; rev:6;)

Added 2011-09-14 22:42:16 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT"; http_method; content:"HttP"; depth:200; content:"|0d 0a|HoST|3a| "; content:"UsER-AgENt|3a| |0d 0a|"; http_header; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2010129; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Suspicious; sid:2010129; rev:6;)

Added 2011-02-04 17:29:34 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT "; depth:4; content:"HttP"; depth:200; content:"|0d 0a|HoST\: "; content:"|0d 0a|UsER-AgENt\: |0d 0a|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2010129; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Suspicious; sid:2010129; rev:2;)

Added 2009-11-02 20:30:42 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT "; depth:4; content:"HttP"; depth:200; content:"|0d 0a|HoST\: "; content:"|0d 0a|UsER-AgENt\: |0d 0a|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2010129; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Suspicious; sid:2010129; rev:2;)

Added 2009-11-02 20:30:42 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT "; depth:4; content:"HttP"; depth:200; content:"|0d 0a|HoST\: "; content:"|0d 0a|UsER-AgENt\: |0d 0a|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2010129; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Suspicious; sid:2010129; rev:2;)

Added 2009-11-02 20:26:39 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT "; depth:4; content:"HttP"; depth:200; content:"|0d 0a|HoST\: "; content:"|0d 0a|UsER-AgENt\: |0d 0a|"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2010129; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Suspicious; sid:2010129; rev:2;)

Added 2009-11-02 20:26:39 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS TROJAN Drop.Agent.bfsv HTTP Activity (UsER?-AgENt)"; flow:established,to_server; content:"GeT "; depth:4; content:"HttP"; depth:200; content:"|0d 0a|HoST\: "; content:"|0d 0a|UsER-AgENt\: |0d 0a|"; classtype:trojan-activity; sid:2010129; rev:1;)

Added 2009-10-15 17:30:37 UTC


Topic revision: r1 - 2020-11-02 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats