#alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET DELETED CoolEK? Payload Download (6)"; flow:established,to_server; content:"/mypic.dll"; http_uri; nocase; fast_pattern:only; pcre:"/\/(w(?:hite|orld)|step)\/mypic\.dll$/U"; classtype:trojan-activity; sid:2016547; rev:10; metadata:created_at 2013_03_06, former_category EXPLOIT_KIT, updated_at 2021_06_23;)

Added 2021-06-23 19:31:50 UTC


#alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET DELETED CoolEK? Payload Download (6)"; flow:established,to_server; content:"/mypic.dll"; http_uri; nocase; fast_pattern:only; pcre:"/\/(w(?:hite|orld)|step)\/mypic\.dll$/U"; classtype:trojan-activity; sid:2016547; rev:10; metadata:created_at 2013_03_06, former_category EXPLOIT_KIT, updated_at 2013_03_06;)

Added 2020-08-05 19:08:56 UTC


#alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET DELETED CoolEK? Payload Download (6)"; flow:established,to_server; content:"/mypic.dll"; http_uri; nocase; fast_pattern:only; pcre:"/\/(w(?:hite|orld)|step)\/mypic\.dll$/U"; metadata: former_category EXPLOIT_KIT; classtype:trojan-activity; sid:2016547; rev:10; metadata:created_at 2013_03_06, updated_at 2013_03_06;)

Added 2019-09-26 19:57:21 UTC


#alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET DELETED CoolEK? Payload Download (6)"; flow:established,to_server; content:"/mypic.dll"; http_uri; nocase; fast_pattern:only; pcre:"/\/(w(?:hite|orld)|step)\/mypic\.dll$/U"; classtype:trojan-activity; sid:2016547; rev:10; metadata:created_at 2013_03_06, updated_at 2013_03_06;)

Added 2018-09-13 19:46:32 UTC


Added 2018-09-13 17:57:25 UTC


#alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET DELETED CoolEK? Payload Download (6)"; flow:established,to_server; content:"/mypic.dll"; http_uri; nocase; fast_pattern:only; pcre:"/\/(w(?:hite|orld)|step)\/mypic\.dll$/U"; classtype:trojan-activity; sid:2016547; rev:10; metadata:created_at 2013_03_06, updated_at 2013_03_06;)

Added 2017-08-07 21:10:17 UTC


##alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET DELETED CoolEK? Payload Download (6)"; flow:established,to_server; content:"/mypic.dll"; http_uri; nocase; fast_pattern:only; pcre:"/\/(w(?:hite|orld)|step)\/mypic\.dll$/U"; classtype:trojan-activity; sid:2016547; rev:10;)

Added 2015-01-26 17:20:08 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS CoolEK? Payload Download (6)"; flow:established,to_server; content:"/mypic.dll"; http_uri; nocase; fast_pattern:only; pcre:"/\/(w(?:hite|orld)|step)\/mypic\.dll$/U"; classtype:trojan-activity; sid:2016547; rev:9;)

Added 2013-04-08 22:12:51 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS CoolEK? Payload Download (6)"; flow:established,to_server; content:"/mypic.dll"; http_uri; nocase; fast_pattern:only; pcre:"/\/w(?:hite|orld)\/mypic\.dll$/U"; classtype:trojan-activity; sid:2016547; rev:7;)

Added 2013-03-28 23:46:23 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS CoolEK? Payload Download (6)"; flow:established,to_server; content:"/mypic.dll"; http_uri; nocase; fast_pattern:only; pcre:"/\/w(?:hite|orld)\/mypic\.dll$/U"; classtype:trojan-activity; sid:2016547; rev:7;)

Added 2013-03-28 18:53:43 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS CoolEK? Payload Download (6)"; flow:established,to_server; content:"/world/mypic.dll"; http_uri; nocase; fast_pattern:only; pcre:"/\/world\/mypic\.dll$/U"; classtype:trojan-activity; sid:2016547; rev:6;)

Added 2013-03-07 01:16:54 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS Unknown Exploit KIt seen with O1/O2.class /search"; flow:established,to_server; content:"/L"; http_uri; depth:2; content:"/form|0d 0a|"; http_header; fast_pattern:only; pcre:"/^\/L[a-zA-Z0-9]+\/[a-zA-Z0-9\x5f]+\?[a-z]+=[A-Za-z0-9\x2e]{10,}$/Um"; classtype:trojan-activity; sid:2015647; rev:2;)

Added 2012-08-20 18:42:03 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS Unknown Exploit KIt seen with O1/O2.class /form"; flow:established,to_server; content:"/L"; http_uri; depth:2; content:"/search|0d 0a|"; http_header; fast_pattern:only; pcre:"/^\/L[a-zA-Z0-9]+\/[a-zA-Z0-9\x5f]+\?[a-z]+=[A-Za-z0-9\x2e]{10,}$/Um"; classtype:trojan-activity; sid:2016547; rev:1;)

Added 2012-08-17 16:41:00 UTC


Topic revision: r1 - 2021-06-23 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats