alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET"; http_method; content:"User-Agent|3a| ERRN200"; http_header; reference:url,doc.emergingthreats.net/2009861; classtype:trojan-activity; sid:2009861; rev:6; metadata:created_at 2010_07_30, updated_at 2010_07_30;)

Added 2017-08-07 21:02:59 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET"; nocase; http_method; content:"User-Agent|3a| ERRN200"; http_header; reference:url,doc.emergingthreats.net/2009861; classtype:trojan-activity; sid:2009861; rev:7;)

Added 2012-03-15 22:32:41 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET"; http_method; content:"User-Agent|3a| ERRN200"; http_header; reference:url,doc.emergingthreats.net/2009861; classtype:trojan-activity; sid:2009861; rev:6;)

Added 2011-12-15 18:09:42 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET"; http_method; content:"User-Agent|3a| ERRN200"; http_header; reference:url,doc.emergingthreats.net/2009861; classtype:trojan-activity; sid:2009861; rev:6;)

Added 2011-10-12 19:28:25 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET"; http_method; content:"User-Agent|3a| ERRN200"; http_header; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2009861; sid:2009861; rev:6;)

Added 2011-09-14 22:41:43 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET"; http_method; content:"User-Agent|3a| ERRN200"; http_header; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2009861; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_ErrorNuker; sid:2009861; rev:6;)

Added 2011-02-04 17:29:16 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET "; depth:4; content:"|0d 0a|User-Agent|3a| ERRN200"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2009861; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_ErrorNuker; sid:2009861; rev:4;)

Added 2010-07-29 22:05:00 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET "; depth:4; content:"|0d 0a|User-Agent|3a| ERRN200"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2009861; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_ErrorNuker; sid:2009861; rev:4;)

Added 2010-07-29 22:05:00 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET "; depth:4; content:"|0d 0a|User-Agent\: ERRN200"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2009861; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_ErrorNuker; sid:2009861; rev:3;)

Added 2009-11-25 11:39:02 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET USER_AGENTS ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET "; depth:4; content:"|0d 0a|User-Agent\: ERRN200"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2009861; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/USER_AGENTS/USER_AGENTS_ErrorNuker; sid:2009861; rev:3;)

Added 2009-11-25 11:39:02 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET MALWARE ErrorNuker? FakeAV? User-Agent (ERRN2004 (Windows XP))"; flow:established,to_server; content:"GET "; depth:4; content:"|0d 0a|User-Agent\: ERRN200"; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2009861; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/MALWARE/MALWARE_USER_Agents; sid:2009861; rev:1;)

Added 2009-09-04 09:00:39 UTC


Topic revision: r1 - 2017-08-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats