#alert http $HOME_NET any -> 184.105.245.17 8080 (msg:"ET DELETED DroidDream? Android Trojan info upload"; flow:to_server,established; content:"/GMServer/GMServlet"; http_uri; reference:url,androguard.blogspot.com/2011/03/droiddream.html; reference:url,blog.aegislab.com/index.php?op=ViewArticle&articleId=79&blogId=1; reference:url,blog.mylookout.com/2011/03/android-malware-droiddream-how-it-works/; reference:url,countermeasures.trendmicro.eu/google-android-rooted-backdoored-infected/; classtype:trojan-activity; sid:2012410; rev:3; metadata:created_at 2011_03_03, updated_at 2011_03_03;)

Added 2017-08-07 21:05:33 UTC


##alert http $HOME_NET any -> 184.105.245.17 8080 (msg:"ET DELETED DroidDream? Android Trojan info upload"; flow:to_server,established; content:"/GMServer/GMServlet"; http_uri; reference:url,androguard.blogspot.com/2011/03/droiddream.html; reference:url,blog.aegislab.com/index.php?op=ViewArticle&articleId=79&blogId=1; reference:url,blog.mylookout.com/2011/03/android-malware-droiddream-how-it-works/; reference:url,countermeasures.trendmicro.eu/google-android-rooted-backdoored-infected/; classtype:trojan-activity; sid:2012410; rev:3;)

Added 2014-08-28 18:33:51 UTC


#alert tcp $HOME_NET any -> 184.105.245.17 8080 (msg:"ET MOBILE_MALWARE DroidDream? Android Trojan info upload"; flow:to_server,established; content:"/GMServer/GMServlet"; http_uri; reference:url,androguard.blogspot.com/2011/03/droiddream.html; reference:url,blog.aegislab.com/index.php?op=ViewArticle&articleId=79&blogId=1; reference:url,blog.mylookout.com/2011/03/android-malware-droiddream-how-it-works/; reference:url,countermeasures.trendmicro.eu/google-android-rooted-backdoored-infected/; classtype:trojan-activity; sid:2012410; rev:1;)

Added 2011-10-12 19:34:14 UTC


#alert tcp $HOME_NET any -> 184.105.245.17 8080 (msg:"ET MOBILE_MALWARE DroidDream? Android Trojan info upload"; flow:to_server,established; content:"/GMServer/GMServlet"; http_uri; classtype:trojan-activity; reference:url,androguard.blogspot.com/2011/03/droiddream.html; reference:url,blog.aegislab.com/index.php?op=ViewArticle&articleId=79&blogId=1; reference:url,blog.mylookout.com/2011/03/android-malware-droiddream-how-it-works/; reference:url,countermeasures.trendmicro.eu/google-android-rooted-backdoored-infected/; sid:2012410; rev:1;)

Added 2011-03-10 16:05:16 UTC


alert tcp $HOME_NET any -> 184.105.245.17 8080 (msg:"ET CURRENT_EVENTS DroidDream? Android Trojan info upload"; flow:to_server,established; content:"/GMServer/GMServlet"; http_uri; classtype:trojan-activity; reference:url,androguard.blogspot.com/2011/03/droiddream.html; reference:url,blog.aegislab.com/index.php?op=ViewArticle&articleId=79&blogId=1; reference:url,blog.mylookout.com/2011/03/android-malware-droiddream-how-it-works/; reference:url,countermeasures.trendmicro.eu/google-android-rooted-backdoored-infected/; sid:2012410; rev:1;)

Added 2011-03-03 09:26:31 UTC


Topic revision: r1 - 2017-08-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats