Snort mailing list archives
Win32/64 Napolar sig
From: James Lay <jlay () slave-tothe-box net>
Date: Wed, 25 Sep 2013 13:30:29 -0600
First attempt...hope it doesn't stink :) alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC W32/64.Napolar initial POST"; flow:to_server, established; file_data; content:"|26|u=USER_NAME|26|c=COMP_NAME|26|s="; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service http, ruleset community; reference:url,blog.avast.com/2013/09/25/win3264napolar-new-trojan-shines-on-the-cyber-crime-scene/; classtype:trojan-activity; sid:10000099; rev:1;) James ------------------------------------------------------------------------------ October Webinars: Code for Performance Free Intel webinars can help you accelerate application performance. Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from the latest Intel processors and coprocessors. See abstracts and register > http://pubads.g.doubleclick.net/gampad/clk?id=60133471&iu=/4140/ostg.clktrk _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- Win32/64 Napolar sig James Lay (Sep 25)
- Re: Win32/64 Napolar sig Nick Randolph (Sep 25)
- Re: Win32/64 Napolar sig James Lay (Sep 25)
- Re: Win32/64 Napolar sig James Lay (Sep 25)
- Re: Win32/64 Napolar sig James Lay (Sep 25)
- Re: Win32/64 Napolar sig Nick Randolph (Sep 30)
- Re: Win32/64 Napolar sig Nick Randolph (Sep 25)