alert dns $HOME_NET any -> any any (msg:"ET TROJAN Mozart Loader Command Request (getupdates)"; flow:to_server; threshold:type both, track by_src, count 30, seconds 60; content:"|0a|getupdates|00 00 10 00 01|"; fast_pattern; metadata: former_category MALWARE; reference:md5,cb20d25c5e5e31ffaa8101449d50745a; classtype:trojan-activity; sid:2029409; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2020_02_11, malware_family MozartLoader?, updated_at 2020_02_11;)

Added 2020-02-11 19:27:41 UTC

Topic revision: r1 - 2020-02-12 - TWikiGuest
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats