alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32 Dialer Variant"; flow:established,to_server; content:"GET"; nocase; http_method; content:"icp="; http_uri; content:"&id_site="; http_uri; content:"&dl_tracker"; http_uri; content:"&connection_type="; http_uri; content:"&asked_mdl_id="; http_uri; content:"&dialer="; http_uri; reference:url,doc.emergingthreats.net/2008441; classtype:trojan-activity; sid:2008441; rev:7;)

Added 2012-03-16 17:32:32 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32 Dialer Variant"; flow:established,to_server; content:"GET"; http_method; content:"icp="; http_uri; content:"&id_site="; http_uri; content:"&dl_tracker"; http_uri; content:"&connection_type="; http_uri; content:"&asked_mdl_id="; http_uri; content:"&dialer="; http_uri; reference:url,doc.emergingthreats.net/2008441; classtype:trojan-activity; sid:2008441; rev:6;)

Added 2011-10-12 19:25:08 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32 Dialer Variant"; flow:established,to_server; content:"GET"; http_method; content:"icp="; http_uri; content:"&id_site="; http_uri; content:"&dl_tracker"; http_uri; content:"&connection_type="; http_uri; content:"&asked_mdl_id="; http_uri; content:"&dialer="; http_uri; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2008441; sid:2008441; rev:6;)

Added 2011-09-14 22:38:35 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32 Dialer Variant"; flow:established,to_server; content:"GET"; http_method; content:"icp="; http_uri; content:"&id_site="; http_uri; content:"&dl_tracker"; http_uri; content:"&connection_type="; http_uri; content:"&asked_mdl_id="; http_uri; content:"&dialer="; http_uri; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2008441; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Dialers; sid:2008441; rev:6;)

Added 2011-02-04 17:27:37 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32 Dialer Variant"; flow:established,to_server; content:"GET "; depth:4; uricontent:"icp="; uricontent:"&id_site="; uricontent:"&dl_tracker"; uricontent:"&connection_type="; uricontent:"&asked_mdl_id="; uricontent:"&dialer="; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2008441; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Dialers; sid:2008441; rev:3;)

Added 2009-09-15 15:09:29 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32 Dialer Variant"; flow:established,to_server; content:"GET "; depth:4; uricontent:"icp="; uricontent:"&id_site="; uricontent:"&dl_tracker"; uricontent:"&connection_type="; uricontent:"&asked_mdl_id="; uricontent:"&dialer="; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2008441; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Dialers; sid:2008441; rev:3;)

Added 2009-09-15 15:09:29 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32 Dialer Variant"; flow:established,to_server; content:"GET "; depth:4; uricontent:"icp="; uricontent:"&id_site="; uricontent:"&referer1="; uricontent:"&dl_tracker"; uricontent:"&connection_type="; uricontent:"&asked_mdl_id="; uricontent:"&dialer="; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2008441; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Dialers; sid:2008441; rev:2;)

Added 2009-02-12 18:21:15 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32 Dialer Variant"; flow:established,to_server; content:"GET "; depth:4; uricontent:"icp="; uricontent:"&id_site="; uricontent:"&referer1="; uricontent:"&dl_tracker"; uricontent:"&connection_type="; uricontent:"&asked_mdl_id="; uricontent:"&dialer="; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2008441; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Dialers; sid:2008441; rev:2;)

Added 2009-02-12 18:21:15 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32 Dialer Variant"; flow:established,to_server; content:"GET "; depth:4; uricontent:"icp="; uricontent:"&id_site="; uricontent:"&referer1="; uricontent:"&dl_tracker"; uricontent:"&connection_type="; uricontent:"&asked_mdl_id="; uricontent:"&dialer="; classtype:trojan-activity; sid:2008441; rev:1;)

Added 2008-07-18 11:00:24 UTC


Topic revision: r1 - 2012-03-16 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats