alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN MedusaHTTP? Variant CnC? Checkin"; flow:established,to_server; content:"POST"; http_method; content:".jsp"; http_uri; isdataat:!1,relative; content:"Mozilla/5.0 (X11|3b 20|Ubuntu|3b 20|Linux i686|3b 20|rv|3a|45.0) Gecko/20100101 Firefox/45.0"; http_user_agent; fast_pattern; isdataat:!1,relative; content:"abc="; http_client_body; depth:4; pcre:"/^[a-z0-9/%=]{100,}$/PRi"; metadata: former_category TROJAN; reference:url,www.arbornetworks.com/blog/asert/medusahttp-ddos-slithers-back-spotlight; classtype:trojan-activity; sid:2027861; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2019_08_13, malware_family MedusaHTTP?, performance_impact Moderate, updated_at 2019_08_13;)

Added 2019-08-13 19:54:22 UTC


Topic revision: r1 - 2019-08-13 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats