Snort mailing list archives

Kuluoz-ishness


From: James Lay <jlay () slave-tothe-box net>
Date: Wed, 10 Jul 2013 11:44:13 -0600

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC 
Win.Trojan.Kuluoz variant outbound connection"; 
flow:to_server,established; content:"|20|HTTP/1.1|0d 0a|User-Agent|3a 
20|"; fast_pattern:only; http_uri; pcre:"/\x2f[A-Z0-9]{88}/U"; 
metadata:policy balanced-ips drop, policy security-ips drop, service 
http; reference:url,http://pastebin.com/raw.php?i=MfwDnAMt; 
classtype:trojan-activity; sid:10000086; rev:1;)

Not sure if I should include that full UA.  Good info on that pastebin 
link.

James

------------------------------------------------------------------------------
See everything from the browser to the database with AppDynamics
Get end-to-end visibility with application monitoring from AppDynamics
Isolate bottlenecks and diagnose root cause in seconds.
Start your free trial of AppDynamics Pro today!
http://pubads.g.doubleclick.net/gampad/clk?id=48808831&iu=/4140/ostg.clktrk
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!


Current thread: