alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Netwire RAT Client Check-in (socket created)"; flow:established,to_server; dsize:5; content:"|01 00 00 00 98|"; flowbits:isset,ET.NetwireRAT.Client; metadata: former_category MALWARE; reference:md5,b0e58a8f45a3e45fd7ee2b4cc20474b3; classtype:trojan-activity; sid:2028918; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2019_10_29, malware_family Netwire_RAT, performance_impact Moderate, updated_at 2019_10_29;)

Added 2019-10-29 20:11:10 UTC


Topic revision: r1 - 2019-10-30 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats