Snort mailing list archives

Win32/64 Napolar sig


From: James Lay <jlay () slave-tothe-box net>
Date: Wed, 25 Sep 2013 13:30:29 -0600

First attempt...hope it doesn't stink :)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC 
W32/64.Napolar initial POST"; flow:to_server, established; file_data; 
content:"|26|u=USER_NAME|26|c=COMP_NAME|26|s="; fast_pattern:only; 
metadata:policy balanced-ips drop, policy security-ips drop, service 
http, ruleset community; 
reference:url,blog.avast.com/2013/09/25/win3264napolar-new-trojan-shines-on-the-cyber-crime-scene/; 
classtype:trojan-activity; sid:10000099; rev:1;)

James

------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60133471&iu=/4140/ostg.clktrk
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!


Current thread: