Snort mailing list archives

New sig for detecting possible Hancitor maldoc bypass via PNG


From: rmkml <rmkml () ligfy org>
Date: Sun, 6 Nov 2016 21:11:36 +0100 (CET)

Hi,

First, Thx @didierstevens and @sans_isc,

Please check a new sig for detecting possible Hancitor maldoc bypass via PNG:

alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"WEB-CLIENT possible Hancitor maldoc bypass via PNG image 
attempt";
flow:to_client,established; file_data; content:"|89|PNG|0D 0A 1A 0A|"; within:8; distance:0; content:"|00 00 00 
00|IEND"; distance:0;
content:"STARFALL"; fast_pattern; within:12; distance:0; 
reference:url,isc.sans.edu/forums/diary/Hancitor+Maldoc+Bypasses+Application+Whitelisting/21683/;
classtype:attempted-user; sid:1; rev:1;)

Don't forget check variables.

Please send any comments.

Regards
@Rmkml

------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today. http://sdm.link/xeonphi
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: