alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET TROJAN SuperSocialat? Plugin Backdoor Code Execution Attempt"; flow:established,to_server; content:"GET"; http_method; content:"/wp-content"; http_uri; depth:11; content:"/plugins/super-socialat/super_socialat.php?dl="; http_uri; distance:0; fast_pattern; pcre:"/^(?:[A-Z0-9+/]{4})*(?:[A-Z0-9+/]{2}==|[A-Z0-9+/]{3}=|[A-Z0-9+/]{4})$/RUi"; metadata: former_category MALWARE; classtype:trojan-activity; sid:2028992; rev:2; metadata:affected_product Wordpress_Plugins, deployment Perimeter, signature_severity Major, created_at 2019_11_18, performance_impact Low, updated_at 2019_11_18;)

Added 2019-11-18 18:56:15 UTC


Topic revision: r1 - 2019-11-18 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats