alert udp $HOME_NET any -> any 53 (msg:"ET TROJAN W32.Razy Inject Domain in DNS Lookup"; content:"|01|"; offset:2; depth:1; content:"|00 01 00 00 00 00 00|"; distance:1; within:7; content:"|0b|solkoptions|04|host|00|"; nocase; distance:0; fast_pattern; metadata: former_category TROJAN; reference:url,; classtype:trojan-activity; sid:2026858; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2019_01_25, updated_at 2019_01_25;)

Added 2019-01-25 17:54:16 UTC

This topic: Main > 2026858
Topic revision: r1 - 2019-01-25 - TWikiGuest
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats