alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET USER_AGENTS Suspicious User Agent (agent)"; flow: to_server,established; content:"User-Agent|3a| agent"; http_header; content:!"battle.net|0d 0a|"; http_header; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; classtype:trojan-activity; sid:2001891; rev:17;)

Added 2016-12-29 17:29:12 UTC

Hi. Still battle.net generate FP

PCAP:

GET /agent/cdns?nocache=4043788756 HTTP/1.1 User-Agent: agent/2.9.2.5362 Host: us.patch.battle.net:1119 Accept: /

HTTP/1.1 200 OK Connection: close X-Patch-Version: Patch/1.3.32-5c48f542a3 Content-Type: application/octet-stream Content-Length: 551

Name!STRING:0|Path!STRING:0|Hosts!STRING:0 us|tpr/bnt001|blzddist1-a.akamaihd.net level3.blizzard.com eu|tpr/bnt001|blzddist1-a.akamaihd.net level3.blizzard.com sg|tpr/bnt001|blzddist1-a.akamaihd.net level3.blizzard.com kr|tpr/bnt001|blzddistkr1-a.akamaihd.net blizzard.nefficient.co.kr blzddist1-a.akamaihd.net tw|tpr/bnt001|blzddist1-a.akamaihd.net level3.blizzard.com cn|tpr/bnt001|client02.pdl.wow.battlenet.com.cn client03.pdl.wow.battlenet.com.cn client04.pdl.wow.battlenet.com.cn blzddist1-a.akamaihd.net client01.pdl.wow.battlenet.com.cn

-- MaksymParpaley - 2017-01-17

battle.net generate FP

PCAP: GET /agent/cdns?nocache=2750385936 HTTP/1.1 User-Agent: agent/2.10.1.5485 Host: us.patch.battle.net:1119 Accept: /

-- PhillipPeterson - 2017-03-25


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (agent)"; flow: to_server,established; content:"User-Agent|3a| agent"; http_header; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; classtype:trojan-activity; sid:2001891; rev:15;)

Added 2011-11-16 19:57:10 UTC

Please consider rule update. During Battle Net agent installation process we observe network flow with User Agent - "agent "

GET /agent/versions?nocache=4042796969 HTTP/1.1

User-Agent: agent/2.9.1.5331 Host: us.patch.battle.net:1119 Accept: /

HTTP/1.1 200 OK Server: Protocol HTTP Content-Length: 559 Connection: close Content-Type: application/octet-stream

Region!STRING:0|BuildConfig!HEX:16|CDNConfig!HEX:16|KeyRing!HEX:16|BuildId!DEC:4|VersionsName!String:0|ProductConfig!HEX:16 us|5181240c246892434c8d5907dd99e0bf|9b49890cdaed976623534d276e513791||5332|2.8.1.5332| eu|5181240c246892434c8d5907dd99e0bf|9b49890cdaed976623534d276e513791||5332|2.8.1.5332| cn|5181240c246892434c8d5907dd99e0bf|9b49890cdaed976623534d276e513791||5332|2.8.1.5332| kr|5181240c246892434c8d5907dd99e0bf|9b49890cdaed976623534d276e513791||5332|2.8.1.5332| tw|5181240c246892434c8d5907dd99e0bf|9b49890cdaed976623534d276e513791||5332|2.8.1.5332|

-- MaksymParpaley - 2016-12-27

thanks! updating with negation for battle.net

-- TravisGreen - 2016-12-29


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (agent)"; flow: to_server,established; content:"User-Agent|3a| agent"; nocase; http_header; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; classtype:trojan-activity; sid:2001891; rev:14;)

Added 2011-10-12 19:11:00 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (agent)"; flow: to_server,established; content:"User-Agent|3a| agent"; nocase; http_header; classtype: trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; sid:2001891; rev:14;)

Added 2011-09-14 21:06:52 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (agent)"; flow: to_server,established; content:"User-Agent|3a| agent"; nocase; http_header; classtype: trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Suspicious; sid:2001891; rev:14;)

Added 2011-02-04 17:21:38 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (agent)"; flow: to_server,established; content:"|0d 0a|User-Agent\: agent"; nocase; classtype: trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Suspicious; sid:2001891; rev:12;)

Added 2010-06-28 22:47:02 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (agent)"; flow: to_server,established; content:"|0d 0a|User-Agent\: agent"; nocase; classtype: trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Suspicious; sid:2001891; rev:12;)

Added 2010-06-28 22:47:02 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (agent)"; flow: to_server,established; content:"|0d 0a|User-Agent\: agent"; nocase; classtype: trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Suspicious; sid: 2001891; rev:12;)

Added 2009-10-19 09:15:43 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS Suspicious User Agent (agent)"; flow: to_server,established; content:"|0d 0a|User-Agent\: agent"; nocase; classtype: trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_Suspicious; sid: 2001891; rev:12;)

Added 2009-10-19 09:15:43 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (agent)"; flow: to_server,established; content:"|0d 0a|User-Agent\: agent"; nocase; classtype: trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_USER_Agents; sid: 2001891; rev:10;)

Added 2009-02-09 21:30:23 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (agent)"; flow: to_server,established; content:"|0d 0a|User-Agent\: agent"; nocase; classtype: trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_USER_Agents; sid: 2001891; rev:10;)

Added 2009-02-09 21:30:23 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (agent)"; flow: to_server,established; content:"|0d 0a|User-Agent\: agent"; nocase; classtype: trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_USER_Agents; sid: 2001891; rev:10;)

Added 2009-02-09 21:29:24 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (agent)"; flow: to_server,established; content:"|0d 0a|User-Agent\: agent"; nocase; classtype: trojan-activity; reference:url,doc.emergingthreats.net/bin/view/Main/2001891; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_USER_Agents; sid: 2001891; rev:10;)

Added 2009-02-09 21:29:24 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (agent)"; flow: to_server,established; content:"|0d 0a|User-Agent\: agent"; nocase; classtype: trojan-activity; sid: 2001891; rev:9;)

Added 2008-07-06 16:19:21 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE Suspicious User Agent (agent)"; flow: to_server,established; content:"|0d 0a|User-Agent\: agent"; nocase; classtype: trojan-activity; sid: 2001891; rev:9;)

Added 2008-07-06 16:19:21 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE ToolbarPartner? User Agent Activity"; flow: to_server,established; content:"User-Agent\: agent"; nocase; classtype: trojan-activity; sid: 2001891; rev:8;)

Added 2008-02-01 14:32:22 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE ToolbarPartner? User Agent Activity"; flow: to_server,established; content:"User-Agent\: agent"; nocase; classtype: trojan-activity; sid: 2001891; rev:8;)

Added 2008-02-01 14:32:22 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET Malware ToolbarPartner? User Agent Activity"; flow: to_server,established; content:"User-Agent\: agent"; nocase; classtype: trojan-activity; sid: 2001891; rev:7;)

Added 2008-01-28 17:24:20 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET Malware ToolbarPartner? User Agent Activity"; flow: to_server,established; content:"User-Agent\: agent"; nocase; classtype: trojan-activity; sid: 2001891; rev:7;)

Added 2008-01-28 17:24:20 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg: "BLEEDING-EDGE Malware ToolbarPartner? User Agent Activity"; flow: to_server,established; content:"User-Agent\: agent"; nocase; classtype: trojan-activity; sid: 2001891; rev:6;)



Topic revision: r5 - 2017-03-25 - PhillipPeterson
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats