alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET TROJAN Dyreza RAT Fake Server Header"; flow:established,to_client; content:"Server|3a 20|Stalin"; http_header; fast_pattern; http_protocol; content:"HTTP/1."; reference:md5,7e3e28320d209a586917668e3b8eac40; classtype:trojan-activity; sid:2018775; rev:5; metadata:created_at 2014_07_25, updated_at 2020_02_10;)

Added 2020-02-10 18:52:31 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET TROJAN Dyreza RAT Fake Server Header"; flow:established,to_client; content:"Server|3a 20|Stalin"; http_header; fast_pattern; http_protocol; content:"HTTP/1."; reference:md5,7e3e28320d209a586917668e3b8eac40; classtype:trojan-activity; sid:2018775; rev:5; metadata:created_at 2014_07_25, updated_at 2020_02_10;)

Added 2020-02-10 18:51:26 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET TROJAN Dyreza RAT Fake Server Header"; flow:established,to_client; content:"HTTP/1."; depth:7; content:"Server|3A| Stalin"; http_header; fast_pattern:only; reference:md5,7e3e28320d209a586917668e3b8eac40; classtype:trojan-activity; sid:2018775; rev:3; metadata:created_at 2014_07_25, updated_at 2019_10_07;)

Added 2019-10-07 19:58:47 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET TROJAN Dyreza RAT Fake Server Header"; flow:established,to_client; content:"HTTP/1."; depth:7; content:"Server|3A| Stalin"; http_header; fast_pattern:only; reference:md5,7e3e28320d209a586917668e3b8eac40; classtype:trojan-activity; sid:2018775; rev:3; metadata:created_at 2014_07_25, updated_at 2014_07_25;)

Added 2018-09-13 19:49:00 UTC


Added 2018-09-13 17:58:49 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET TROJAN Dyreza RAT Fake Server Header"; flow:established,to_client; content:"HTTP/1."; depth:7; content:"Server|3A| Stalin"; http_header; fast_pattern:only; reference:md5,7e3e28320d209a586917668e3b8eac40; classtype:trojan-activity; sid:2018775; rev:3; metadata:created_at 2014_07_25, updated_at 2014_07_25;)

Added 2017-08-07 21:12:55 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET TROJAN Backdoor.Win32.Androm.dtrv CnC? Server Fake Server Header"; flow:established,to_client; content:"HTTP/1."; depth:7; content:"Server|3A| Stalin"; http_header; fast_pattern:only; reference:md5,7e3e28320d209a586917668e3b8eac40; classtype:trojan-activity; sid:2018775; rev:2;)

Added 2014-07-25 17:26:28 UTC


Topic revision: r1 - 2020-02-10 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats