alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN [PTsecurity] WeChat? (Ransomware/Stealer) HttpHeader?"; flow:established,to_server; content:"GET"; http_method; content:"AAAAAA"; http_uri; isdataat:!1, relative; content:"Accept|3a 20|*/*"; http_header; depth: 11; content: "Accept-Encoding|3a 20|gzip, deflate"; http_header; within:32; content:"User-Agent|3a 20|Mozilla/4.0 (compatible|3b| MSIE 7.0|3b| Windows NT 6.1|3b| WOW64|3b| Trident/4.0|3b| SLCC2|3b| .NET CLR 2.0.50727|3b| .NET CLR 3.5.30729|3b| .NET CLR 3.0.30729|3b| Media Center PC 6.0|3b| .NET4.0C|3b| .NET4.0E)"; http_header; within: 192; content: "Host|3a 20|"; http_header; fast_pattern; within: 28; content: "Connection|3a 20|Keep-Alive"; http_header; within: 24; isdataat: 3, relative; content:!"Referer|3a|"; http_header; metadata: former_category TROJAN; classtype:trojan-activity; sid:2026688; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2018_12_05, malware_family Ransomware, malware_family Stealer, updated_at 2018_12_05;)

Added 2018-12-05 18:39:00 UTC

Topic revision: r1 - 2018-12-05 - TWikiGuest
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats