alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32/Korklic.A"; flow:to_server,established; content:"GET"; nocase; http_method; content:"mode=boot&MyValue="; http_uri; content:"&code="; http_uri; pcre:"/MyValue=[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:/Ui"; reference:url,doc.emergingthreats.net/2009003; classtype:trojan-activity; sid:2009003; rev:6;)

Added 2011-10-12 19:26:24 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32/Korklic.A"; flow:to_server,established; content:"GET"; nocase; http_method; content:"mode=boot&MyValue="; http_uri; content:"&code="; http_uri; pcre:"/MyValue=[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:/Ui"; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2009003; sid:2009003; rev:6;)

Added 2011-09-14 22:39:47 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32/Korklic.A"; flow:to_server,established; content:"GET"; nocase; http_method; content:"mode=boot&MyValue="; http_uri; content:"&code="; http_uri; pcre:"/MyValue=[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:/Ui"; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2009003; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Korklic; sid:2009003; rev:6;)

Added 2011-02-04 17:28:14 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32/Korklic.A"; flow:to_server,established; content:"GET "; depth:4; uricontent:"mode=boot&MyValue="; uricontent:"&code="; pcre:"/MyValue=[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:/Ui"; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2009003; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Korklic; sid:2009003; rev:3;)

Added 2010-06-28 22:46:58 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32/Korklic.A"; flow:to_server,established; content:"GET "; depth:4; uricontent:"mode=boot&MyValue="; uricontent:"&code="; pcre:"/MyValue=[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:/Ui"; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2009003; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Korklic; sid:2009003; rev:3;)

Added 2010-06-28 22:46:58 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32/Korklic.A"; flow:to_server,established; content:"GET "; depth:4; uricontent:"mode=boot&MyValue="; uricontent:"&code="; pcre:"/MyValue=[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:/Ui"; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2009003; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Korklic; sid: 2009003; rev:3;)

Added 2009-02-13 19:30:23 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32/Korklic.A"; flow:to_server,established; content:"GET "; depth:4; uricontent:"mode=boot&MyValue="; uricontent:"&code="; pcre:"/MyValue=[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:/Ui"; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2009003; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Korklic; sid: 2009003; rev:3;)

Added 2009-02-13 19:30:23 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32/Korklic.A"; flow:to_server,established; content:"GET "; depth:4; uricontent:"mode=boot&MyValue="; uricontent:"&code="; pcre:"/MyValue=[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:/Ui"; classtype: trojan-activity; sid: 2009003; rev:2;)

Added 2009-01-09 14:24:44 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32/Korklic.A"; flow:to_server,established; content:"GET "; depth:4; uricontent:"mode=boot&MyValue="; uricontent:"&code="; pcre:"/MyValue=[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:[a-f0-9]{2}\:/Ui"; classtype: trojan-activity; sid: 2009003; rev:2;)

Added 2009-01-09 14:24:44 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Win32/Korklic.A"; flow:to_server,established; content:"GET "; depth:4; uricontent:"mode=boot&MyValue="; uricontent:"&code="; pcre:"/MyValue=[a-f0-9]{2}:[a-f0-9]{2}:[a-f0-9]{2}:[a-f0-9]{2}:/Ui"; classtype: trojan-activity; sid: 2009003; rev:1;)

Added 2009-01-09 11:15:22 UTC


Topic revision: r1 - 2011-10-12 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats