alert http $EXTERNAL_NET any -> any any (msg:"ET TROJAN ELF/Mirai Variant UA Inbound (Shaolin)"; flow:established,to_server; content:"Shaolin"; http_user_agent; nocase; depth:7; pcre:"/^Shaolin(?:\/[0-9]\.0)?$/Vi"; classtype:trojan-activity; sid:2027140; rev:2; metadata:attack_target IoT?, created_at 2019_03_27, deployment Perimeter, former_category USER_AGENTS, malware_family Mirai, performance_impact Low, signature_severity Informational, updated_at 2020_10_23;)

Added 2020-10-23 18:45:10 UTC


alert http $EXTERNAL_NET any -> any any (msg:"ET TROJAN ELF/Mirai Variant UA Inbound (Shaolin)"; flow:established,to_server; content:"Shaolin"; http_user_agent; nocase; depth:7; pcre:"/^Shaolin(?:\/[0-9]\.0)?$/Vi"; classtype:trojan-activity; sid:2027140; rev:2; metadata:attack_target IoT?, created_at 2019_03_27, deployment Perimeter, former_category USER_AGENTS, malware_family Mirai, performance_impact Low, signature_severity Informational, updated_at 2019_11_21;)

Added 2020-08-05 19:16:05 UTC


alert http $EXTERNAL_NET any -> any any (msg:"ET TROJAN ELF/Mirai Variant UA Inbound (Shaolin)"; flow:established,to_server; content:"Shaolin"; http_user_agent; nocase; depth:7; pcre:"/^Shaolin(?:\/[0-9]\.0)?$/Vi"; metadata: former_category USER_AGENTS; classtype:trojan-activity; sid:2027140; rev:2; metadata:attack_target IoT?, deployment Perimeter, signature_severity Informational, created_at 2019_03_27, malware_family Mirai, performance_impact Low, updated_at 2019_11_21;)

Added 2019-11-21 20:14:20 UTC


alert http any any -> $HOME_NET any (msg:"ET USER_AGENTS ELF/Mirai Variant UA Inbound (Shaolin)"; flow:established,to_server; content:"Shaolin"; http_user_agent; nocase; depth:7; pcre:"/^Shaolin(?:\/[0-9]\.0)?$/Vi"; metadata: former_category USER_AGENTS; classtype:trojan-activity; sid:2027140; rev:1; metadata:attack_target IoT?, deployment Perimeter, signature_severity Informational, created_at 2019_03_27, malware_family Mirai, performance_impact Low, updated_at 2019_03_27;)

Added 2019-08-16 19:27:25 UTC


alert http any any -> $HOME_NET any (msg:"ET USER_AGENTS ELF/Mirai Variant UA Inbound (Shaolin)"; flow:established,to_server; content:"Shaolin"; http_user_agent; nocase; depth:7; pcre:"/^Shaolin(?:\/[0-9]\.0)?$/Vi"; metadata: former_category USER_AGENTS; classtype:trojan-activity; sid:2027140; rev:1; metadata:attack_target IoT?, deployment Perimeter, signature_severity Audit, created_at 2019_03_27, malware_family Mirai, performance_impact Low, updated_at 2019_03_27;)

Added 2019-03-27 17:41:23 UTC


Topic revision: r1 - 2020-10-23 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats