0% found this document useful (0 votes)
15K views403 pages

4 2 2

This document contains a collection of rules for detecting malware and backdoors. It includes over 30 rules describing network signatures for various malware families such as Dagger, QAZ Worm, Netbus, and more. The rules specify things like ports, traffic directions, and content matching to detect malware network activity and communications.

Uploaded by

jo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15K views403 pages

4 2 2

This document contains a collection of rules for detecting malware and backdoors. It includes over 30 rules describing network signatures for various malware families such as Dagger, QAZ Worm, Netbus, and more. The rules specify things like ports, traffic directions, and content matching to detect malware network activity and communications.

Uploaded by

jo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 403

# Copyright 2001-2018 Sourcefire, Inc. All Rights Reserved.

#
# This file contains rules that were created by Sourcefire, Inc. and other third
parties
# (the "GPL Rules") that are distributed under the GNU General Public License
(GPL),
# v2. The GPL Rules created by Sourcefire are owned by Sourcefire, Inc., and the
GPL
# Rules not created by Sourcefire are owned by their respective owners. Please see
# the AUTHORS file included in the community package for a list of third party
owners and their
# respective copyrights.
#
# This file does not contain any Sourcefire VRT Certified Rules; the VRT Certified
# Rules are distributed by Sourcefire separately under the VRT Certified Rules
License
# Agreement (v 2.0)
#
#-----------------
# COMMUNITY RULES
#-----------------

# alert tcp $HOME_NET 2589 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR -


Dagger_1.4.0"; flow:to_client,established; content:"2|00 00 00 06 00 00 00|Drives|
24 00|"; depth:16; metadata:ruleset community; classtype:misc-activity; sid:105;
rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7597 (msg:"MALWARE-BACKDOOR QAZ Worm
Client Login access"; flow:to_server,established; content:"qazwsx.hsq";
metadata:ruleset community; reference:mcafee,98775; classtype:misc-activity;
sid:108; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 12345:12346 (msg:"MALWARE-BACKDOOR
netbus getinfo"; flow:to_server,established; content:"GetInfo|0D|";
metadata:ruleset community; classtype:trojan-activity; sid:110; rev:10;)
# alert tcp $HOME_NET 20034 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR NetBus Pro
2.0 connection established"; flow:to_client,established;
flowbits:isset,backdoor.netbus_2.connect; content:"BN|10 00 02 00|"; depth:6;
content:"|05 00|"; depth:2; offset:8; metadata:ruleset community; classtype:trojan-
activity; sid:115; rev:15;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR
Infector.1.x"; flow:established,to_client; content:"WHATISIT"; depth:9;
metadata:impact_flag red, ruleset community; reference:nessus,11157;
classtype:misc-activity; sid:117; rev:17;)
# alert tcp $HOME_NET 666 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR
SatansBackdoor.2.0.Beta"; flow:to_client,established; content:"Remote|3A| ";
depth:11; nocase; content:"You are connected to me.|0D 0A|Remote|3A| Ready for
commands"; distance:0; nocase; metadata:ruleset community;
reference:url,www.megasecurity.org/trojans/s/satanzbackdoor/SBD2.0b.html;
reference:url,www3.ca.com/securityadvisor/pest/pest.aspx?id=5260; classtype:trojan-
activity; sid:118; rev:12;)
# alert tcp $HOME_NET 6789 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR Doly 2.0
access"; flow:established,to_client; content:"Wtzup Use"; depth:32;
metadata:ruleset community; classtype:misc-activity; sid:119; rev:11;)
# alert tcp $EXTERNAL_NET 1000:1300 -> $HOME_NET 146 (msg:"MALWARE-BACKDOOR
Infector 1.6 Client to Server Connection Request"; flow:to_server,established;
content:"FC "; metadata:ruleset community; reference:nessus,11157; classtype:misc-
activity; sid:121; rev:14;)
# alert tcp $HOME_NET 31785 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR HackAttack
1.20 Connect"; flow:established,to_client; content:"host"; metadata:ruleset
community; classtype:misc-activity; sid:141; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP ADMw0rm ftp login
attempt"; flow:to_server,established; content:"USER"; nocase; content:"w0rm";
distance:1; nocase; pcre:"/^USER\s+w0rm/smi"; metadata:ruleset community, service
ftp; classtype:suspicious-login; sid:144; rev:16;)
# alert tcp $HOME_NET 30100:30102 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR
NetSphere access"; flow:established,to_client; content:"NetSphere";
metadata:ruleset community; classtype:trojan-activity; sid:146; rev:13;)
# alert tcp $HOME_NET 6969 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR
GateCrasher"; flow:established,to_client; content:"GateCrasher"; depth:11; nocase;
content:"Server"; distance:0; nocase; content:"On-Line..."; distance:0; nocase;
pcre:"/^GateCrasher\s+v\d+\x2E\d+\x2C\s+Server\s+On-Line\x2E\x2E\x2E/smi";
metadata:ruleset community; reference:url,www.spywareguide.com/product_show.php?
id=973; classtype:trojan-activity; sid:147; rev:11;)
# alert tcp $HOME_NET 5401:5402 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR
BackConstruction 2.1 Connection"; flow:established,to_client; content:"c|3A 5C|";
metadata:ruleset community; classtype:misc-activity; sid:152; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 666 (msg:"MALWARE-BACKDOOR
BackConstruction 2.1 Client FTP Open Request"; flow:to_server,established;
content:"FTPON"; metadata:ruleset community; classtype:misc-activity; sid:157;
rev:9;)
# alert tcp $HOME_NET 666 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR
BackConstruction 2.1 Server FTP Open Reply"; flow:to_client,established;
content:"FTP Port open"; metadata:ruleset community; classtype:misc-activity;
sid:158; rev:10;)
# alert udp $EXTERNAL_NET 3344 -> $HOME_NET 3345 (msg:"MALWARE-BACKDOOR Matrix 2.0
Client connect"; flow:to_server; content:"activate"; metadata:ruleset community;
classtype:misc-activity; sid:161; rev:10;)
# alert udp $EXTERNAL_NET 3345 -> $HOME_NET 3344 (msg:"MALWARE-BACKDOOR Matrix 2.0
Server access"; flow:to_server; content:"logged in"; metadata:ruleset community;
classtype:misc-activity; sid:162; rev:10;)
# alert tcp $HOME_NET 5714 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR WinCrash 1.0
Server Active"; flow:stateless; flags:SA,12; content:"|B4 B4|"; metadata:ruleset
community; classtype:misc-activity; sid:163; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"MALWARE-BACKDOOR CDK";
flow:to_server,established; content:"ypi0ca"; depth:15; nocase; metadata:ruleset
community; classtype:misc-activity; sid:185; rev:10;)
# alert udp $HOME_NET 2140 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR DeepThroat
3.1 Server Response"; flow:to_client; content:"Ahhhh My Mouth Is Open";
metadata:ruleset community; reference:mcafee,98574; reference:nessus,10053;
classtype:trojan-activity; sid:195; rev:14;)
# alert tcp $HOME_NET 555 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR PhaseZero
Server Active on Network"; flow:established,to_client; content:"phAse zero server";
depth:17; nocase; metadata:ruleset community;
reference:url,www.megasecurity.org/trojans/p/phasezero/PhaseZero1.0b.html;
reference:url,www3.ca.com/securityadvisor/pest/pest.aspx?id=4539; classtype:trojan-
activity; sid:208; rev:12;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR w00w00
attempt"; flow:to_server,established; content:"w00w00"; metadata:ruleset community;
classtype:attempted-admin; sid:209; rev:9;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR
attempt"; flow:to_server,established; content:"backdoor"; nocase; metadata:ruleset
community; classtype:attempted-admin; sid:210; rev:7;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR MISC
r00t attempt"; flow:to_server,established; content:"r00t"; metadata:ruleset
community; classtype:attempted-admin; sid:211; rev:7;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR MISC
rewt attempt"; flow:to_server,established; content:"rewt"; metadata:ruleset
community; classtype:attempted-admin; sid:212; rev:7;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR MISC
Linux rootkit attempt"; flow:to_server,established; content:"wh00t!";
metadata:ruleset community; classtype:attempted-admin; sid:213; rev:8;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR MISC
Linux rootkit attempt lrkr0x"; flow:to_server,established; content:"lrkr0x";
metadata:ruleset community; classtype:attempted-admin; sid:214; rev:8;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR MISC
Linux rootkit attempt"; flow:to_server,established; content:"d13hh["; nocase;
metadata:ruleset community; classtype:attempted-admin; sid:215; rev:8;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR MISC
Linux rootkit satori attempt"; flow:to_server,established; content:"satori";
metadata:ruleset community; classtype:attempted-admin; sid:216; rev:11;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR MISC
sm4ck attempt"; flow:to_server,established; content:"hax0r"; metadata:ruleset
community; classtype:attempted-admin; sid:217; rev:7;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR MISC
Solaris 2.5 attempt"; flow:to_server,established; content:"friday";
metadata:ruleset community; classtype:attempted-user; sid:218; rev:8;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR HidePak
backdoor attempt"; flow:to_server,established; content:"StoogR"; metadata:ruleset
community; classtype:misc-activity; sid:219; rev:10;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"MALWARE-BACKDOOR
HideSource backdoor attempt"; flow:to_server,established; content:"wank";
metadata:ruleset community; classtype:misc-activity; sid:220; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP TFN Probe";
icmp_id:678; itype:8; content:"1234"; fast_pattern:only; metadata:ruleset
community; reference:cve,2000-0138; classtype:attempted-dos; sid:221; rev:12;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP tfn2k icmp
possible communication"; icmp_id:0; itype:0; content:"AAAAAAAAAA";
fast_pattern:only; metadata:ruleset community; reference:cve,2000-0138;
classtype:attempted-dos; sid:222; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET [31335,35555] (msg:"MALWARE-OTHER Trin00
Daemon to Master PONG message detected"; flow:to_server; content:"PONG";
fast_pattern:only; metadata:ruleset community; reference:cve,2000-0138;
classtype:attempted-dos; sid:223; rev:13;)
# alert icmp 3.3.3.3/32 any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Stacheldraht
server spoof"; icmp_id:666; itype:0; metadata:ruleset community;
reference:cve,2000-0138; classtype:attempted-dos; sid:224; rev:10;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Stacheldraht
gag server response"; icmp_id:669; itype:0; content:"sicken"; metadata:ruleset
community; reference:cve,2000-0138; classtype:attempted-dos; sid:225; rev:13;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Stacheldraht
server response"; icmp_id:667; itype:0; content:"ficken"; metadata:ruleset
community; reference:cve,2000-0138; classtype:attempted-dos; sid:226; rev:13;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Stacheldraht
client spoofworks"; icmp_id:1000; itype:0; content:"spoofworks"; metadata:ruleset
community; reference:cve,2000-0138; classtype:attempted-dos; sid:227; rev:13;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP TFN client
command BE"; icmp_id:456; icmp_seq:0; itype:0; pcre:"/^[0-9]{1,5}\x00/";
metadata:ruleset community; reference:cve,2000-0138; classtype:attempted-dos;
sid:228; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Stacheldraht
client check skillz"; icmp_id:666; itype:0; content:"skillz"; metadata:ruleset
community; reference:cve,2000-0138; classtype:attempted-dos; sid:229; rev:12;)
# alert tcp $HOME_NET 20432 -> $EXTERNAL_NET any (msg:"MALWARE-OTHER shaft client
login to handler"; flow:to_client,established; content:"login|3A|";
fast_pattern:only; metadata:ruleset community; reference:cve,2000-0138;
reference:url,security.royans.net/info/posts/bugtraq_ddos3.shtml;
classtype:attempted-dos; sid:230; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 31335 (msg:"MALWARE-OTHER Trin00 Daemon
to Master message detected"; flow:to_server; content:"l44"; fast_pattern:only;
metadata:ruleset community; reference:cve,2000-0138; classtype:attempted-dos;
sid:231; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 31335 (msg:"MALWARE-OTHER Trin00 Daemon
to Master *HELLO* message detected"; flow:to_server; content:"*HELLO*";
metadata:ruleset community; reference:cve,2000-0138;
reference:url,www.sans.org/newlook/resources/IDFAQ/trinoo.htm; classtype:attempted-
dos; sid:232; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 27665 (msg:"MALWARE-OTHER Trin00
Attacker to Master default startup password"; flow:established,to_server;
content:"betaalmostdone"; metadata:ruleset community; reference:cve,2000-0138;
classtype:attempted-dos; sid:233; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 27665 (msg:"MALWARE-OTHER Trin00
Attacker to Master default password"; flow:established,to_server; content:"gOrave";
metadata:ruleset community; reference:cve,2000-0138; classtype:attempted-dos;
sid:234; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 27665 (msg:"MALWARE-OTHER Trin00
Attacker to Master default mdie password"; flow:established,to_server;
content:"killme"; metadata:ruleset community; reference:cve,2000-0138;
classtype:attempted-dos; sid:235; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Stacheldraht
client check gag"; icmp_id:668; itype:0; content:"gesundheit!"; metadata:ruleset
community; reference:cve,2000-0138; classtype:attempted-dos; sid:236; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 27444 (msg:"MALWARE-OTHER Trin00 Master
to Daemon default password attempt"; flow:to_server; content:"l44adsl";
metadata:ruleset community; reference:cve,2000-0138; classtype:attempted-dos;
sid:237; rev:10;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP TFN server
response"; icmp_id:123; itype:0; content:"shell bound"; metadata:ruleset community;
reference:cve,2000-0138; classtype:attempted-dos; sid:238; rev:14;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 18753 (msg:"MALWARE-OTHER shaft handler
to agent"; flow:to_server; content:"alive tijgu"; metadata:ruleset community;
reference:cve,2000-0138; classtype:attempted-dos; sid:239; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 20433 (msg:"MALWARE-OTHER shaft agent to
handler"; flow:to_server; content:"alive"; metadata:ruleset community;
reference:cve,2000-0138; classtype:attempted-dos; sid:240; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 6838 (msg:"MALWARE-OTHER mstream agent
to handler"; flow:to_server; content:"newserver"; metadata:ruleset community;
reference:cve,2000-0138; classtype:attempted-dos; sid:243; rev:8;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 10498 (msg:"MALWARE-OTHER mstream
handler to agent"; flow:to_server; content:"stream/"; metadata:ruleset community;
reference:cve,2000-0138; classtype:attempted-dos; sid:244; rev:8;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 10498 (msg:"MALWARE-OTHER mstream
handler ping to agent"; flow:to_server; content:"ping"; metadata:ruleset community;
reference:cve,2000-0138; classtype:attempted-dos; sid:245; rev:8;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 10498 (msg:"MALWARE-OTHER mstream agent
pong to handler"; flow:to_server; content:"pong"; metadata:ruleset community;
reference:cve,2000-0138; classtype:attempted-dos; sid:246; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 12754 (msg:"MALWARE-OTHER mstream client
to handler"; flow:to_server,established; content:">"; metadata:ruleset community;
reference:cve,2000-0138; classtype:attempted-dos; sid:247; rev:8;)
# alert tcp $HOME_NET 12754 -> $EXTERNAL_NET any (msg:"MALWARE-OTHER mstream
handler to client"; flow:to_client,established; content:">"; metadata:ruleset
community; reference:cve,2000-0138; classtype:attempted-dos; sid:248; rev:8;)
# alert tcp $HOME_NET 15104 -> $EXTERNAL_NET any (msg:"MALWARE-OTHER mstream
handler to client"; flow:to_client,established; content:">"; metadata:ruleset
community; reference:cve,2000-0138; classtype:attempted-dos; sid:250; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP - TFN client
command LE"; icmp_id:51201; icmp_seq:0; itype:0; pcre:"/^[0-9]{1,5}\x00/";
metadata:ruleset community; reference:cve,2000-0138; classtype:attempted-dos;
sid:251; rev:11;)
# alert udp $EXTERNAL_NET 53 -> $HOME_NET any (msg:"PROTOCOL-DNS SPOOF query
response PTR with TTL of 1 min. and no authority"; flow:to_client; content:"|85 80
00 01 00 01 00 00 00 00|"; content:"|C0 0C 00 0C 00 01 00 00 00|<|00 0F|";
fast_pattern:only; metadata:ruleset community, service dns; classtype:bad-unknown;
sid:253; rev:14;)
# alert udp $EXTERNAL_NET 53 -> $HOME_NET any (msg:"PROTOCOL-DNS SPOOF query
response with TTL of 1 min. and no authority"; flow:to_client; content:"|81 80|";
depth:4; offset:2; fast_pattern; byte_test:2,>,0,0,relative,big;
byte_test:2,>,0,2,relative,big; content:"|00 00 00 00|"; within:4; distance:4;
content:"|C0 0C 00 01 00 01|"; distance:0; byte_test:4,<,61,0,relative,big;
byte_test:4,>,0,0,relative,big; metadata:ruleset community, service dns;
classtype:bad-unknown; sid:254; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS dns zone transfer
via TCP detected"; flow:to_server,established; content:"|00 01 00 00 00 00 00|";
depth:8; offset:6; byte_test:1,!&,0xF8,4; content:"|00 00 FC 00 01|"; fast_pattern;
isdataat:!1,relative; metadata:ruleset community, service dns; reference:cve,1999-
0532; reference:nessus,10595; classtype:attempted-recon; sid:255; rev:23;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS named authors
attempt"; flow:to_server; content:"|07|authors"; offset:12; nocase; content:"|04|
bind|00|"; offset:12; nocase; metadata:ruleset community, service dns;
reference:nessus,10728; classtype:attempted-recon; sid:256; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS named version
attempt"; flow:to_server,established; content:"|07|version"; offset:12; nocase;
content:"|04|bind|00|"; offset:12; nocase; metadata:ruleset community, service dns;
reference:nessus,10028; classtype:attempted-recon; sid:257; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"SERVER-OTHER Bind Buffer
Overflow via NXT records"; flow:to_server,established; content:"../../../";
fast_pattern:only; metadata:ruleset community, service dns; reference:bugtraq,788;
reference:cve,1999-0833; classtype:attempted-admin; sid:258; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"SERVER-OTHER Bind Buffer
Overflow via NXT records named overflow ADM"; flow:to_server,established;
content:"thisissometempspaceforthesockinaddrinyeahyeahiknowthisislamebutanywaywhoca
reshorizongotitworkingsoalliscool"; fast_pattern:only; metadata:ruleset community,
service dns; reference:bugtraq,788; reference:cve,1999-0833; classtype:attempted-
admin; sid:259; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"SERVER-OTHER Bind Buffer
Overflow via NXT records named overflow ADMROCKS"; flow:to_server,established;
content:"ADMROCKS"; metadata:ruleset community, service dns; reference:bugtraq,788;
reference:cve,1999-0833; reference:url,www.cert.org/advisories/CA-1999-14.html;
classtype:attempted-admin; sid:260; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"SERVER-OTHER Bind named
overflow attempt"; flow:to_server,established; content:"|CD 80 E8 D7 FF FF
FF|/bin/sh"; fast_pattern:only; metadata:ruleset community, service dns;
reference:url,www.cert.org/advisories/CA-1998-05.html; classtype:attempted-admin;
sid:261; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"OS-LINUX x86 Linux overflow
attempt"; flow:to_server,established; content:"1|C0 B0|?1|DB B3 FF|1|C9 CD 80|1|
C0|"; fast_pattern:only; metadata:ruleset community, service dns;
classtype:attempted-admin; sid:262; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"OS-LINUX x86 Linux overflow
attempt"; flow:to_server,established; content:"1|C0 B0 02 CD 80 85 C0|uL|EB|L^|
B0|"; metadata:ruleset community, service dns; classtype:attempted-admin; sid:264;
rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"OS-LINUX x86 Linux overflow
attempt ADMv2"; flow:to_server,established; content:"|89 F7 29 C7 89 F3 89 F9 89 F2
AC|<|FE|"; fast_pattern:only; metadata:ruleset community, service dns;
classtype:attempted-admin; sid:265; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"OS-OTHER x86 FreeBSD overflow
attempt"; flow:to_server,established; content:"|EB|n^|C6 06 9A|1|C9 89|N|01 C6|F|
05|"; metadata:ruleset community, service dns; classtype:attempted-admin; sid:266;
rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"OS-SOLARIS EXPLOIT sparc
overflow attempt"; flow:to_server,established; content:"|90 1A C0 0F 90 02| |08 92
02| |0F D0 23 BF F8|"; fast_pattern:only; metadata:ruleset community, service dns;
classtype:attempted-admin; sid:267; rev:13;)
# alert udp any 19 <> any 7 (msg:"SERVER-OTHER UDP echo+chargen bomb";
flow:to_server; metadata:ruleset community; reference:cve,1999-0103;
reference:cve,1999-0635; classtype:attempted-dos; sid:271; rev:11;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"OS-WINDOWS Microsoft WIndows
IGMP dos attack"; fragbits:M+; ip_proto:2; metadata:ruleset community;
reference:bugtraq,514; reference:cve,1999-0918;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS99-034;
classtype:attempted-dos; sid:272; rev:16;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP ath"; itype:8;
content:"+++ath"; fast_pattern:only; metadata:ruleset community;
reference:cve,1999-1228; classtype:attempted-dos; sid:274; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7070 (msg:"SERVER-OTHER RealNetworks
Audio Server denial of service attempt"; flow:to_server,established; content:"|FF
F4 FF FD 06|"; fast_pattern:only; metadata:ruleset community; reference:cve,1999-
0271; reference:nessus,10183; classtype:attempted-dos; sid:276; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7070 (msg:"SERVER-OTHER RealNetworks
Server template.html"; flow:to_server,established;
content:"/viewsource/template.html?"; fast_pattern:only; metadata:ruleset
community; reference:bugtraq,1288; reference:cve,2000-0474; reference:nessus,10461;
classtype:attempted-dos; sid:277; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8080 (msg:"SERVER-OTHER RealNetworks
Server template.html"; flow:to_server,established;
content:"/viewsource/template.html?"; fast_pattern:only; metadata:ruleset
community; reference:bugtraq,1288; reference:cve,2000-0474; classtype:attempted-
dos; sid:278; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"SERVER-OTHER Bay/Nortel
Nautica Marlin"; flow:to_server; dsize:0; metadata:ruleset community;
reference:bugtraq,1009; reference:cve,2000-0221; classtype:attempted-dos; sid:279;
rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 9 (msg:"SERVER-OTHER Ascend Route";
flow:to_server; content:"NAMENAME"; depth:50; offset:25; metadata:ruleset
community; reference:bugtraq,714; reference:cve,1999-0060; classtype:attempted-dos;
sid:281; rev:12;)
# alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"BROWSER-OTHER Netscape 4.7
client overflow"; flow:to_client,established; content:"3|C9 B1 10|?|E9 06|Q<|FA|G3|
C0|P|F7 D0|P"; metadata:ruleset community; reference:bugtraq,822;
reference:cve,1999-1189; reference:cve,2000-1187; classtype:attempted-user;
sid:283; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP EXPLOIT x86 BSD
overflow"; flow:to_server,established; content:"^|0E|1|C0 B0 3B 8D|~|0E 89 FA 89
F9|"; fast_pattern:only; metadata:ruleset community, service pop3;
reference:bugtraq,133; reference:cve,1999-0006; reference:nessus,10196;
classtype:attempted-admin; sid:286; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP EXPLOIT x86 BSD
overflow"; flow:to_server,established; content:"h]^|FF D5 FF D4 FF F5 8B F5 90|f1";
fast_pattern:only; metadata:ruleset community, service pop3; classtype:attempted-
admin; sid:287; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP EXPLOIT x86 Linux
overflow"; flow:to_server,established; content:"|D8|@|CD 80 E8 D9 FF FF
FF|/bin/sh"; fast_pattern:only; metadata:ruleset community, service pop3;
classtype:attempted-admin; sid:288; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP EXPLOIT x86 SCO
overflow"; flow:to_server,established; content:"V|0E|1|C0 B0 3B 8D|~|12 89 F9 89
F9|"; fast_pattern:only; metadata:ruleset community, service pop3;
reference:bugtraq,133; reference:bugtraq,156; reference:cve,1999-0006;
classtype:attempted-admin; sid:289; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP EXPLOIT qpopper
overflow"; flow:to_server,established; content:"|E8 D9 FF FF FF|/bin/sh";
fast_pattern:only; metadata:ruleset community, service pop3; reference:bugtraq,830;
reference:cve,1999-0822; reference:nessus,10184; classtype:attempted-admin;
sid:290; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"OS-LINUX x86 Linux samba
overflow"; flow:to_server,established; content:"|EB|/_|EB|J^|89 FB 89|>|89 F2|";
metadata:ruleset community; reference:bugtraq,1816; reference:bugtraq,536;
reference:cve,1999-0182; reference:cve,1999-0811; classtype:attempted-admin;
sid:292; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 2766 (msg:"OS-SOLARIS Oracle Solaris
npls x86 overflow"; flow:to_server,established; content:"|EB 23|^3|C0 88|F|FA 89|F|
F5 89|6"; metadata:ruleset community; reference:bugtraq,2319; reference:cve,1999-
1588; classtype:attempted-admin; sid:300; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 515 (msg:"SERVER-OTHER LPRng overflow";
flow:to_server,established; content:"C|07 89|[|08 8D|K|08 89|C|0C B0 0B CD 80|1|C0
FE C0 CD 80 E8 94 FF FF FF|/bin/sh|0A|"; metadata:ruleset community;
reference:bugtraq,1712; reference:cve,2000-0917; classtype:attempted-admin;
sid:301; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 515 (msg:"OS-LINUX Redhat 7.0 lprd
overflow"; flow:to_server,established; content:"XXXX%.172u%300|24|n";
metadata:ruleset community; reference:bugtraq,1712; reference:cve,2000-0917;
classtype:attempted-admin; sid:302; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"SERVER-OTHER Bind Buffer
Overflow named tsig overflow attempt"; flow:to_server,established; content:"|AB CD
09 80 00 00 00 01 00 00 00 00 00 00 01 00 01| |02|a"; metadata:ruleset
community, service dns; reference:bugtraq,2302; reference:cve,2001-0010;
reference:nessus,10605; classtype:attempted-admin; sid:303; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 6373 (msg:"SERVER-OTHER SCO calserver
overflow"; flow:to_server,established; content:"|EB 7F|]U|FE|M|98 FE|M|9B|";
metadata:ruleset community; reference:bugtraq,2353; reference:cve,2000-0306;
classtype:attempted-admin; sid:304; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8080 (msg:"SERVER-OTHER delegate proxy
overflow"; flow:to_server,established; isdataat:1000; content:"whois|3A|//";
nocase; metadata:ruleset community; reference:bugtraq,808; reference:cve,2000-0165;
classtype:attempted-admin; sid:305; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 9090 (msg:"SERVER-OTHER VQServer admin";
flow:to_server,established; content:"GET / HTTP/1.1"; nocase; metadata:ruleset
community; reference:bugtraq,1610; reference:cve,2000-0766; reference:nessus,10354;
reference:url,www.vqsoft.com/vq/server/docs/other/control.html;
classtype:attempted-admin; sid:306; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 6666:7000 (msg:"SERVER-OTHER CHAT IRC
topic overflow"; flow:to_client,established; content:"|EB|K[S2|E4 83 C3 0B|K|88 23
B8|Pw"; metadata:ruleset community; reference:bugtraq,573; reference:cve,1999-0672;
classtype:attempted-user; sid:307; rev:12;)
# alert tcp $EXTERNAL_NET 21 -> $HOME_NET any (msg:"SERVER-OTHER NextFTP client
overflow"; flow:to_client,established; content:"|B4| |B4|!|8B CC 83 E9 04 8B 19|3|
C9|f|B9 10|"; metadata:ruleset community, service ftp; reference:bugtraq,572;
reference:cve,1999-0671; classtype:attempted-user; sid:308; rev:14;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL sniffit
overflow"; flow:to_server,established; dsize:>512; flags:A+; content:"from|3A 90 90
90 90 90 90 90 90 90 90 90|"; nocase; metadata:ruleset community, service smtp;
reference:bugtraq,1158; reference:cve,2000-0343; classtype:attempted-admin;
sid:309; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL x86 windows
MailMax overflow"; flow:to_server,established; content:"|EB|E|EB| [|FC|3|C9 B1 82
8B F3 80|+"; fast_pattern:only; metadata:ruleset community, service smtp;
reference:bugtraq,2312; reference:cve,1999-0404; classtype:attempted-admin;
sid:310; rev:13;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"BROWSER-OTHER Netscape 4.7
unsucessful overflow"; flow:to_server,established; content:"3|C9 B1 10|?|E9 06|Q<|
FA|G3|C0|P|F7 D0|P"; metadata:ruleset community; reference:bugtraq,822;
reference:cve,1999-1189; reference:cve,2000-1187; classtype:unsuccessful-user;
sid:311; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 518 (msg:"OS-LINUX ntalkd x86 Linux
overflow"; flow:to_server; content:"|01 03 00 00 00 00 00 01 00 02 02 E8|";
fast_pattern:only; metadata:ruleset community; reference:bugtraq,210;
classtype:attempted-admin; sid:313; rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"SERVER-OTHER Bind Buffer
Overflow named tsig overflow attempt"; flow:to_server; content:"|80 00 07 00 00 00
00 00 01|?|00 01 02|"; fast_pattern:only; metadata:ruleset community, service dns;
reference:bugtraq,2302; reference:cve,2001-0010; classtype:attempted-admin;
sid:314; rev:22;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 635 (msg:"OS-LINUX x86 Linux mountd
overflow"; flow:to_server; content:"^|B0 02 89 06 FE C8 89|F|04 B0 06 89|F";
metadata:ruleset community; reference:bugtraq,121; reference:cve,1999-0002;
classtype:attempted-admin; sid:315; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 635 (msg:"OS-LINUX x86 Linux mountd
overflow"; flow:to_server; content:"|EB|V^VVV1|D2 88|V|0B 88|V|1E|";
metadata:ruleset community; reference:bugtraq,121; reference:cve,1999-0002;
classtype:attempted-admin; sid:316; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 635 (msg:"OS-LINUX x86 Linux mountd
overflow"; flow:to_server; content:"|EB|@^1|C0|@|89|F|04 89 C3|@|89 06|";
metadata:ruleset community; reference:bugtraq,121; reference:cve,1999-0002;
classtype:attempted-admin; sid:317; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER cmd_rootsh
backdoor attempt"; flow:to_server,established; content:"cmd_rootsh";
metadata:ruleset community; reference:nessus,10070;
reference:url,www.sans.org/y2k/TFN_toolkit.htm;
reference:url,www.sans.org/y2k/fingerd.htm; classtype:attempted-admin; sid:320;
rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER account
enumeration attempt"; flow:to_server,established; content:"a b c d e f"; nocase;
metadata:ruleset community; reference:nessus,10788; classtype:attempted-recon;
sid:321; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER search query";
flow:to_server,established; content:"search"; metadata:ruleset community;
reference:cve,1999-0259; classtype:attempted-recon; sid:322; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER root query";
flow:to_server,established; content:"root"; metadata:ruleset community;
classtype:attempted-recon; sid:323; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER null request";
flow:to_server,established; content:"|00|"; metadata:ruleset community;
reference:cve,1999-0612; classtype:attempted-recon; sid:324; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER remote command
execution attempt"; flow:to_server,established; content:"|3B|"; metadata:ruleset
community; reference:bugtraq,974; reference:cve,1999-0150; classtype:attempted-
user; sid:326; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER remote command
pipe execution attempt"; flow:to_server,established; content:"|7C|";
metadata:ruleset community; reference:bugtraq,2220; reference:cve,1999-0152;
classtype:attempted-user; sid:327; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER bomb attempt";
flow:to_server,established; content:"@@"; metadata:ruleset community;
reference:cve,1999-0106; classtype:attempted-dos; sid:328; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER redirection
attempt"; flow:to_server,established; content:"@"; metadata:ruleset community;
reference:cve,1999-0105; reference:nessus,10073; classtype:attempted-recon;
sid:330; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER cybercop
query"; flow:to_server,established; content:"|0A| "; depth:10; metadata:ruleset
community; reference:cve,1999-0612; classtype:attempted-recon; sid:331; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER 0 query";
flow:to_server,established; content:"0"; metadata:ruleset community;
reference:cve,1999-0197; reference:nessus,10069; classtype:attempted-recon;
sid:332; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER . query";
flow:to_server,established; content:"."; metadata:ruleset community;
reference:cve,1999-0198; reference:nessus,10072; classtype:attempted-recon;
sid:333; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP .forward";
flow:to_server,established; content:".forward"; metadata:ruleset community, service
ftp; classtype:suspicious-filename-detect; sid:334; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP .rhosts";
flow:to_server,established; content:".rhosts"; metadata:policy max-detect-ips drop,
ruleset community, service ftp; classtype:suspicious-filename-detect; sid:335;
rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP CWD ~root
attempt"; flow:to_server,established; content:"CWD"; nocase; content:"~root";
distance:1; nocase; pcre:"/^CWD\s+~root/smi"; metadata:ruleset community, service
ftp; reference:cve,1999-0082; classtype:bad-unknown; sid:336; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP CEL overflow
attempt"; flow:to_server,established; content:"CEL"; nocase; isdataat:100,relative;
pcre:"/^CEL(?!\n)\s[^\n]{100}/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,679; reference:cve,1999-0789; reference:nessus,10009;
classtype:attempted-admin; sid:337; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP adm scan";
flow:to_server,established; content:"PASS ddd@|0A|"; fast_pattern:only;
metadata:ruleset community, service ftp; classtype:suspicious-login; sid:353;
rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP iss scan";
flow:to_server,established; content:"pass -iss@iss"; fast_pattern:only;
metadata:ruleset community, service ftp; classtype:suspicious-login; sid:354;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP pass wh00t";
flow:to_server,established; content:"pass wh00t"; fast_pattern:only;
metadata:ruleset community, service ftp; classtype:suspicious-login; sid:355;
rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP passwd retrieval
attempt"; flow:to_server,established; content:"RETR"; nocase; content:"passwd";
metadata:ruleset community, service ftp; classtype:suspicious-filename-detect;
sid:356; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP piss scan";
flow:to_server,established; content:"pass -cklaus"; fast_pattern:only;
metadata:ruleset community, service ftp;
reference:url,www.mines.edu/fs_home/dlarue/cc/baby-doe.html; classtype:suspicious-
login; sid:357; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP saint scan";
flow:to_server,established; content:"pass -saint"; fast_pattern:only;
metadata:ruleset community, service ftp; classtype:suspicious-login; sid:358;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP satan scan";
flow:to_server,established; content:"pass -satan"; fast_pattern:only;
metadata:ruleset community, service ftp; classtype:suspicious-login; sid:359;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP serv-u directory
traversal"; flow:to_server,established; content:".%20."; fast_pattern:only;
metadata:ruleset community, service ftp; reference:bugtraq,2052;
reference:cve,2001-0054; reference:nessus,10565; classtype:bad-unknown; sid:360;
rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP SITE EXEC
attempt"; flow:to_server,established; content:"SITE"; nocase; content:"EXEC";
distance:0; nocase; pcre:"/^SITE\s+EXEC/smi"; metadata:ruleset community, service
ftp; reference:bugtraq,2241; reference:cve,1999-0080; reference:cve,1999-0955;
classtype:bad-unknown; sid:361; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP tar parameters";
flow:to_server,established; content:" --use-compress-program "; fast_pattern:only;
metadata:ruleset community, service ftp; reference:bugtraq,2240;
reference:cve,1999-0202; reference:cve,1999-0997; classtype:bad-unknown; sid:362;
rev:20;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP IRDP router
advertisement"; itype:9; metadata:ruleset community; reference:bugtraq,578;
reference:cve,1999-0875; classtype:misc-activity; sid:363; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP IRDP router
selection"; itype:10; metadata:ruleset community; reference:bugtraq,578;
reference:cve,1999-0875; classtype:misc-activity; sid:364; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING undefined
code"; icode:>0; itype:8; metadata:ruleset community; classtype:misc-activity;
sid:365; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Unix";
itype:8; content:"|10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F|"; depth:32;
metadata:ruleset community; classtype:misc-activity; sid:366; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING BSDtype";
itype:8; content:"|08 09 0A 0B 0C 0D 0E 0F 10 11 12 13 14 15 16 17|"; depth:32;
metadata:ruleset community; classtype:misc-activity; sid:368; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING BayRS
Router"; itype:8; content:"|01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F|";
depth:32; metadata:ruleset community; classtype:misc-activity; sid:369; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING BeOS4.x";
itype:8; content:"|00 00 00 00 00 00 00 00 00 00 00 00 08 09 0A 0B|"; depth:32;
metadata:ruleset community; classtype:misc-activity; sid:370; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Cisco
Type.x"; itype:8; content:"|AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD|";
depth:32; metadata:ruleset community; classtype:misc-activity; sid:371; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Delphi-
Piette Windows"; itype:8; content:"Pinging from Del"; depth:32; metadata:ruleset
community; classtype:misc-activity; sid:372; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING
Flowpoint2200 or Network Management Software"; itype:8; content:"|01 02 03 04 05 06
07 08 09 0A 0B 0C 0D 0E 0F 10|"; depth:32; metadata:ruleset community;
classtype:misc-activity; sid:373; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING IP
NetMonitor Macintosh"; itype:8; content:"|A9| Sustainable So"; depth:32;
metadata:ruleset community; classtype:misc-activity; sid:374; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING
LINUX/*BSD"; dsize:8; id:13170; itype:8; metadata:ruleset community;
classtype:misc-activity; sid:375; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Microsoft
Windows"; itype:8; content:"0123456789abcdefghijklmnop"; depth:32; metadata:ruleset
community; classtype:misc-activity; sid:376; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Network
Toolbox 3 Windows"; itype:8; content:"================"; depth:32; metadata:ruleset
community; classtype:misc-activity; sid:377; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Ping-O-
MeterWindows"; itype:8; content:"OMeterObeseArmad"; depth:32; metadata:ruleset
community; classtype:misc-activity; sid:378; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Pinger
Windows"; itype:8; content:"Data|00 00 00 00 00 00 00 00 00 00 00 00|"; depth:32;
metadata:ruleset community; classtype:misc-activity; sid:379; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Seer
Windows"; itype:8; content:"|88 04| "; depth:32; metadata:ruleset
community; classtype:misc-activity; sid:380; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Oracle
Solaris"; dsize:8; itype:8; metadata:ruleset community; classtype:misc-activity;
sid:381; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Windows";
itype:8; content:"abcdefghijklmnop"; depth:16; metadata:ruleset community;
classtype:misc-activity; sid:382; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING"; icode:0;
itype:8; metadata:ruleset community; classtype:misc-activity; sid:384; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP traceroute";
itype:8; ttl:1; metadata:ruleset community; classtype:attempted-recon; sid:385;
rev:8;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Address Mask
Reply"; icode:0; itype:18; metadata:ruleset community; classtype:misc-activity;
sid:386; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Address Mask
Reply undefined code"; icode:>0; itype:18; metadata:ruleset community;
classtype:misc-activity; sid:387; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Address Mask
Request"; icode:0; itype:17; metadata:ruleset community; classtype:misc-activity;
sid:388; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Address Mask
Request undefined code"; icode:>0; itype:17; metadata:ruleset community;
classtype:misc-activity; sid:389; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Alternate Host
Address"; icode:0; itype:6; metadata:ruleset community; classtype:misc-activity;
sid:390; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Alternate Host
Address undefined code"; icode:>0; itype:6; metadata:ruleset community;
classtype:misc-activity; sid:391; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Datagram
Conversion Error"; icode:0; itype:31; metadata:ruleset community; classtype:misc-
activity; sid:392; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Datagram
Conversion Error undefined code"; icode:>0; itype:31; metadata:ruleset community;
classtype:misc-activity; sid:393; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Destination Host Unknown"; icode:7; itype:3; metadata:ruleset
community; classtype:misc-activity; sid:394; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Destination Network Unknown"; icode:6; itype:3; metadata:ruleset
community; classtype:misc-activity; sid:395; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Fragmentation Needed and DF bit was set"; icode:4; itype:3;
metadata:policy max-detect-ips drop, ruleset community; reference:cve,2004-0790;
reference:cve,2005-0068; reference:cve,2015-7759; classtype:misc-activity; sid:396;
rev:12;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Host Precedence Violation"; icode:14; itype:3; metadata:ruleset
community; classtype:misc-activity; sid:397; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Host Unreachable for Type of Service"; icode:12; itype:3;
metadata:ruleset community; classtype:misc-activity; sid:398; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Host Unreachable"; icode:1; itype:3; metadata:ruleset community;
classtype:misc-activity; sid:399; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Network Unreachable for Type of Service"; icode:11; itype:3;
metadata:ruleset community; classtype:misc-activity; sid:400; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Network Unreachable"; icode:0; itype:3; metadata:ruleset community;
classtype:misc-activity; sid:401; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP destination
unreachable port unreachable packet detected"; icode:3; itype:3; metadata:policy
max-detect-ips drop, ruleset community; reference:cve,2004-0790;
reference:cve,2005-0068; classtype:misc-activity; sid:402; rev:16;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Precedence Cutoff in effect"; icode:15; itype:3; metadata:ruleset
community; classtype:misc-activity; sid:403; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Protocol Unreachable"; icode:2; itype:3; metadata:policy max-detect-ips
drop, ruleset community; reference:cve,2004-0790; reference:cve,2005-0068;
classtype:misc-activity; sid:404; rev:14;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Source Host Isolated"; icode:8; itype:3; metadata:ruleset community;
classtype:misc-activity; sid:405; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable Source Route Failed"; icode:5; itype:3; metadata:ruleset community;
classtype:misc-activity; sid:406; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Destination
Unreachable cndefined code"; icode:>15; itype:3; metadata:ruleset community;
classtype:misc-activity; sid:407; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Echo Reply";
icode:0; itype:0; metadata:ruleset community; classtype:misc-activity; sid:408;
rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Echo Reply
undefined code"; icode:>0; itype:0; metadata:ruleset community; classtype:misc-
activity; sid:409; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Fragment
Reassembly Time Exceeded"; icode:1; itype:11; metadata:ruleset community;
classtype:misc-activity; sid:410; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP IPV6 I-Am-
Here"; icode:0; itype:34; metadata:ruleset community; classtype:misc-activity;
sid:411; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP IPV6 I-Am-Here
undefined code"; icode:>0; itype:34; metadata:ruleset community; classtype:misc-
activity; sid:412; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP IPV6 Where-Are-
You"; icode:0; itype:33; metadata:ruleset community; classtype:misc-activity;
sid:413; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP IPV6 Where-Are-
You undefined code"; icode:>0; itype:33; metadata:ruleset community;
classtype:misc-activity; sid:414; rev:10;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Information
Reply"; icode:0; itype:16; metadata:ruleset community; classtype:misc-activity;
sid:415; rev:8;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Information
Reply undefined code"; icode:>0; itype:16; metadata:ruleset community;
classtype:misc-activity; sid:416; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Information
Request"; icode:0; itype:15; metadata:ruleset community; classtype:misc-activity;
sid:417; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Information
Request undefined code"; icode:>0; itype:15; metadata:ruleset community;
classtype:misc-activity; sid:418; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Mobile Host
Redirect"; icode:0; itype:32; metadata:ruleset community; classtype:misc-activity;
sid:419; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Mobile Host
Redirect undefined code"; icode:>0; itype:32; metadata:ruleset community;
classtype:misc-activity; sid:420; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Mobile
Registration Reply"; icode:0; itype:36; metadata:ruleset community; classtype:misc-
activity; sid:421; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Mobile
Registration Reply undefined code"; icode:>0; itype:36; metadata:ruleset community;
classtype:misc-activity; sid:422; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Mobile
Registration Request"; icode:0; itype:35; metadata:ruleset community;
classtype:misc-activity; sid:423; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Mobile
Registration Request undefined code"; icode:>0; itype:35; metadata:ruleset
community; classtype:misc-activity; sid:424; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Parameter
Problem Bad Length"; icode:2; itype:12; metadata:ruleset community; classtype:misc-
activity; sid:425; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Parameter
Problem Missing a Required Option"; icode:1; itype:12; metadata:ruleset community;
classtype:misc-activity; sid:426; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Parameter
Problem Unspecified Error"; icode:0; itype:12; metadata:ruleset community;
classtype:misc-activity; sid:427; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Parameter
Problem undefined Code"; icode:>2; itype:12; metadata:ruleset community;
classtype:misc-activity; sid:428; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Photuris
Reserved"; icode:0; itype:40; metadata:ruleset community; classtype:misc-activity;
sid:429; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Photuris
Unknown Security Parameters Index"; icode:1; itype:40; metadata:ruleset community;
classtype:misc-activity; sid:430; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Photuris Valid
Security Parameters, But Authentication Failed"; icode:2; itype:40;
metadata:ruleset community; classtype:misc-activity; sid:431; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Photuris Valid
Security Parameters, But Decryption Failed"; icode:3; itype:40; metadata:ruleset
community; classtype:misc-activity; sid:432; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Photuris
undefined code!"; icode:>3; itype:40; metadata:ruleset community; classtype:misc-
activity; sid:433; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Redirect for
TOS and Host"; icode:3; itype:5; metadata:ruleset community; reference:cve,1999-
0265; classtype:misc-activity; sid:436; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Redirect for
TOS and Network"; icode:2; itype:5; metadata:ruleset community; reference:cve,1999-
0265; classtype:misc-activity; sid:437; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Redirect
undefined code"; icode:>3; itype:5; metadata:ruleset community; reference:cve,1999-
0265; classtype:misc-activity; sid:438; rev:13;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Reserved for
Security Type 19"; icode:0; itype:19; metadata:ruleset community; classtype:misc-
activity; sid:439; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Reserved for
Security Type 19 undefined code"; icode:>0; itype:19; metadata:ruleset community;
classtype:misc-activity; sid:440; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Router
Advertisement"; icode:0; itype:9; metadata:ruleset community; classtype:misc-
activity; sid:441; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Router
Selection"; icode:0; itype:10; metadata:ruleset community; classtype:misc-activity;
sid:443; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP SKIP"; icode:0;
itype:39; metadata:ruleset community; classtype:misc-activity; sid:445; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP SKIP undefined
code"; icode:>0; itype:39; metadata:ruleset community; classtype:misc-activity;
sid:446; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Source Quench
undefined code"; icode:>0; itype:4; metadata:ruleset community; classtype:misc-
activity; sid:448; rev:10;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Time-To-Live
Exceeded in Transit"; icode:0; itype:11; metadata:ruleset community;
classtype:misc-activity; sid:449; rev:9;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Time-To-Live
Exceeded in Transit undefined code"; icode:>1; itype:11; metadata:ruleset
community; classtype:misc-activity; sid:450; rev:11;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Timestamp
Reply"; icode:0; itype:14; metadata:ruleset community; classtype:misc-activity;
sid:451; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Timestamp Reply
undefined code"; icode:>0; itype:14; metadata:ruleset community; classtype:misc-
activity; sid:452; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Timestamp
Request"; icode:0; itype:13; metadata:ruleset community; classtype:misc-activity;
sid:453; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Timestamp
Request undefined code"; icode:>0; itype:13; metadata:ruleset community;
classtype:misc-activity; sid:454; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Traceroute";
icode:0; itype:30; metadata:ruleset community; classtype:misc-activity; sid:456;
rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Traceroute
undefined code"; icode:>0; itype:30; metadata:ruleset community; classtype:misc-
activity; sid:457; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP unassigned type
1"; icode:0; itype:1; metadata:ruleset community; classtype:misc-activity; sid:458;
rev:12;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP unassigned type
1 undefined code"; itype:1; metadata:ruleset community; classtype:misc-activity;
sid:459; rev:12;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP unassigned type
2"; icode:0; itype:2; metadata:ruleset community; classtype:misc-activity; sid:460;
rev:12;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP unassigned type
2 undefined code"; itype:2; metadata:ruleset community; classtype:misc-activity;
sid:461; rev:12;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP unassigned type
7"; icode:0; itype:7; metadata:ruleset community; classtype:misc-activity; sid:462;
rev:12;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP unassigned type
7 undefined code"; itype:7; metadata:ruleset community; reference:cve,1999-0454;
classtype:misc-activity; sid:463; rev:14;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP ISS Pinger";
itype:8; content:"ISSPNGRQ"; depth:32; metadata:ruleset community;
classtype:attempted-recon; sid:465; rev:8;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP L3retriever
Ping"; icode:0; itype:8; content:"ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI"; depth:32;
metadata:ruleset community; classtype:attempted-recon; sid:466; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP Nemesis v1.1
Echo"; dsize:20; icmp_id:0; icmp_seq:0; itype:8; content:"|00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:ruleset
community; classtype:attempted-recon; sid:467; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP superscan
echo"; dsize:8; itype:8; content:"|00 00 00 00 00 00 00 00|"; fast_pattern:only;
metadata:ruleset community; classtype:attempted-recon; sid:474; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP webtrends
scanner"; icode:0; itype:8; content:"|00 00 00 00|EEEEEEEEEEEE"; fast_pattern:only;
metadata:ruleset community; classtype:attempted-recon; sid:476; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING speedera";
itype:8; content:"89|3A 3B|<=>?"; depth:100; metadata:ruleset community;
classtype:misc-activity; sid:480; rev:9;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP
TJPingPro1.1Build 2 Windows"; itype:8; content:"TJPingPro by Jim"; depth:32;
metadata:ruleset community; classtype:misc-activity; sid:481; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING
WhatsupGold Windows"; itype:8; content:"WhatsUp - A Netw"; depth:32;
metadata:ruleset community; classtype:misc-activity; sid:482; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING CyberKit
2.2 Windows"; itype:8; content:"|AA AA AA AA AA AA AA AA AA AA AA AA AA AA AA AA|";
depth:32; metadata:ruleset community; classtype:misc-activity; sid:483; rev:10;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP PING Sniffer
Pro/NetXRay network scan"; itype:8; content:"Cinco Network, Inc."; depth:32;
metadata:ruleset community; classtype:misc-activity; sid:484; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP no password";
flow:to_server,established; content:"PASS"; fast_pattern:only;
pcre:"/^PASS\s*\n/smi"; metadata:policy max-detect-ips drop, ruleset community,
service ftp; classtype:unknown; sid:489; rev:19;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL battle-mail
traffic"; flow:to_server,established; content:"BattleMail"; metadata:ruleset
community, service smtp; classtype:policy-violation; sid:490; rev:12;)
# alert tcp $HOME_NET 21 -> $EXTERNAL_NET any (msg:"PROTOCOL-FTP Bad login";
flow:to_client,established; content:"530 "; fast_pattern:only; pcre:"/^530\s+
(Login|User)/smi"; metadata:ruleset community, service ftp; classtype:bad-unknown;
sid:491; rev:15;)
# alert tcp $TELNET_SERVERS 23 -> $EXTERNAL_NET any (msg:"PROTOCOL-TELNET login
failed"; flow:to_client,established; content:"Login failed"; nocase;
metadata:ruleset community, service telnet; classtype:bad-unknown; sid:492;
rev:15;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"APP-DETECT psyBNC access";
flow:to_client,established; content:"[email protected]"; fast_pattern:only;
metadata:ruleset community; classtype:bad-unknown; sid:493; rev:11;)
# alert tcp $HTTP_SERVERS $HTTP_PORTS -> $EXTERNAL_NET any (msg:"INDICATOR-
COMPROMISE command completed"; flow:established; content:"Command completed";
fast_pattern:only; pcre:"/^Command\s+?completed\b/sm"; metadata:ruleset community,
service http; reference:bugtraq,1806; reference:cve,2000-0884;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms00-078;
classtype:bad-unknown; sid:494; rev:20;)
# alert tcp $HTTP_SERVERS $HTTP_PORTS -> $EXTERNAL_NET any (msg:"INDICATOR-
COMPROMISE command error"; flow:established; content:"Bad command or filename";
nocase; metadata:ruleset community, service http; classtype:bad-unknown; sid:495;
rev:14;)
# alert tcp $HTTP_SERVERS $HTTP_PORTS -> $EXTERNAL_NET any (msg:"INDICATOR-
COMPROMISE file copied ok"; flow:to_client,established; file_data; content:"1 file|
28|s|29| copied"; fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,1806; reference:cve,2000-0884; classtype:bad-unknown; sid:497;
rev:20;)
# alert ip any any -> any any (msg:"INDICATOR-COMPROMISE id check returned root";
content:"uid=0|28|root|29|"; metadata:ruleset community; classtype:bad-unknown;
sid:498; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1417 (msg:"SERVER-OTHER Insecure
TIMBUKTU Password"; flow:to_server,established; content:"|05 00|>"; depth:16;
metadata:ruleset community; classtype:bad-unknown; sid:505; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 5631 (msg:"PUA-OTHER PCAnywhere
Attempted Administrator Login"; flow:to_server,established;
content:"ADMINISTRATOR"; metadata:ruleset community; classtype:attempted-admin;
sid:507; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 70 (msg:"SERVER-OTHER gopher proxy";
flow:to_server,established; content:"ftp|3A|"; fast_pattern:only; content:"@/";
metadata:ruleset community; classtype:bad-unknown; sid:508; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP PCCS
mysql database admin tool access"; flow:to_server,established;
content:"pccsmysqladm/incs/dbconnect.inc"; depth:36; nocase; metadata:ruleset
community, service http; reference:bugtraq,1557; reference:cve,2000-0707;
reference:nessus,10783; classtype:web-application-attack; sid:509; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 9000:9002 (msg:"POLICY-OTHER HP
JetDirect LCD modification attempt"; flow:to_server,established; content:"@PJL
RDYMSG DISPLAY ="; metadata:ruleset community; reference:bugtraq,2245;
classtype:misc-activity; sid:510; rev:12;)
# alert tcp $HOME_NET 5631:5632 -> $EXTERNAL_NET any (msg:"PUA-OTHER PCAnywhere
Failed Login"; flow:to_client,established; content:"Invalid login"; depth:16;
metadata:ruleset community; classtype:unsuccessful-user; sid:512; rev:9;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 27374 (msg:"SERVER-OTHER ramen worm";
flow:to_server,established; content:"GET "; depth:8; nocase; metadata:ruleset
community; classtype:bad-unknown; sid:514; rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"PROTOCOL-SNMP NT UserList";
flow:to_server; content:"+|06 10|@|14 D1 02 19|"; fast_pattern:only;
metadata:ruleset community, service snmp; reference:nessus,10546;
classtype:attempted-recon; sid:516; rev:12;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 177 (msg:"X11 xdmcp query";
flow:to_server; content:"|00 01 00 03 00 01 00|"; fast_pattern:only;
metadata:ruleset community; classtype:attempted-recon; sid:517; rev:7;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 69 (msg:"PROTOCOL-TFTP Put";
flow:to_server; content:"|00 02|"; depth:2; metadata:ruleset community;
reference:cve,1999-0183; reference:url,github.com/rapid7/metasploit-
framework/blob/unstable/unstable-modules/auxiliary/d20tftpbd.rb; classtype:bad-
unknown; sid:518; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 69 (msg:"PROTOCOL-TFTP parent
directory"; flow:to_server; content:".."; offset:2; metadata:ruleset community;
reference:cve,1999-0183; reference:cve,2002-1209; reference:cve,2011-4722;
classtype:bad-unknown; sid:519; rev:14;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 69 (msg:"PROTOCOL-TFTP root directory";
flow:to_server; content:"|00 01|/"; depth:3; metadata:ruleset community;
reference:cve,1999-0183; classtype:bad-unknown; sid:520; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [135,139,445,593,1024:] (msg:"NETBIOS
DCERPC NCACN-IP-TCP srvsvc NetrShareEnum null policy handle attempt";
flow:established,to_server; dce_iface:4b324fc8-1670-01d3-1278-5a47bf6ee188;
dce_opnum:15; dce_stub_data; pcre:"/^.{4}(\x00\x00\x00\x00|.{12})/s"; byte_jump:4,-
4,relative,align,dce; content:"|00 00 00 00|"; within:4; distance:8;
metadata:ruleset community; classtype:protocol-command-decode; sid:529; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"OS-WINDOWS NT NULL session";
flow:to_server,established; content:"|00 00 00 00|W|00|i|00|n|00|d|00|o|00|w|00|s|
00| |00|N|00|T|00| |00|1|00|3|00|8|00|1"; metadata:ruleset community;
reference:bugtraq,1163; reference:cve,2000-0347; classtype:attempted-recon;
sid:530; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB CD..";
flow:to_server,established; content:"|5C|../|00 00 00|"; metadata:ruleset
community; classtype:attempted-recon; sid:534; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB CD...";
flow:to_server,established; content:"|5C|...|00 00 00|"; metadata:ruleset
community; classtype:attempted-recon; sid:535; rev:9;)
# alert tcp $HOME_NET any <> $EXTERNAL_NET 1863 (msg:"POLICY-SOCIAL Microsoft MSN
message"; flow:established; content:"MSG "; depth:4; content:"Content-Type|3A|";
nocase; content:"text/plain"; distance:1; metadata:ruleset community;
classtype:policy-violation; sid:540; rev:17;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"POLICY-SOCIAL ICQ access";
flow:to_server,established; content:"User-Agent|3A|ICQ"; fast_pattern:only;
metadata:ruleset community; classtype:policy-violation; sid:541; rev:15;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 6666:7000 (msg:"POLICY-SOCIAL IRC nick
change"; flow:to_server,established; dsize:<140; content:"NICK ";
fast_pattern:only; metadata:ruleset community; classtype:policy-violation; sid:542;
rev:20;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"INDICATOR-COMPROMISE FTP 'STOR
1MB' possible warez site"; flow:to_server,established; content:"STOR"; nocase;
content:"1MB"; distance:1; nocase; metadata:ruleset community, service ftp;
classtype:misc-activity; sid:543; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"INDICATOR-COMPROMISE FTP 'RETR
1MB' possible warez site"; flow:to_server,established; content:"RETR"; nocase;
content:"1MB"; distance:1; nocase; metadata:ruleset community, service ftp;
classtype:misc-activity; sid:544; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"INDICATOR-COMPROMISE FTP 'CWD /
' possible warez site"; flow:to_server,established; content:"CWD"; nocase;
content:"/ "; distance:1; metadata:ruleset community, service ftp; classtype:misc-
activity; sid:545; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"INDICATOR-COMPROMISE FTP 'CWD
' possible warez site"; flow:to_server,established; content:"CWD "; depth:5;
nocase; metadata:ruleset community, service ftp; classtype:misc-activity; sid:546;
rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"INDICATOR-COMPROMISE FTP 'MKD
' possible warez site"; flow:to_server,established; content:"MKD "; depth:5;
nocase; metadata:ruleset community, service ftp; classtype:misc-activity; sid:547;
rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"INDICATOR-COMPROMISE FTP
'MKD .' possible warez site"; flow:to_server,established; content:"MKD ."; depth:5;
nocase; metadata:ruleset community, service ftp; classtype:misc-activity; sid:548;
rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"POLICY-OTHER FTP anonymous
login attempt"; flow:to_server,established; content:"USER"; fast_pattern:only;
pcre:"/^USER\s+(anonymous|ftp)[^\w]*[\r\n]/smi"; metadata:ruleset community,
service ftp; classtype:misc-activity; sid:553; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"INDICATOR-COMPROMISE FTP 'MKD /
' possible warez site"; flow:to_server,established; content:"MKD"; nocase;
content:"/ "; distance:1; metadata:ruleset community, service ftp; classtype:misc-
activity; sid:554; rev:10;)
# alert tcp $HOME_NET 23 -> $EXTERNAL_NET any (msg:"POLICY-OTHER WinGate telnet
server response"; flow:to_client,established; content:"WinGate>"; metadata:ruleset
community; reference:cve,1999-0657; classtype:misc-activity; sid:555; rev:13;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"PUA-P2P Outbound GNUTella
client request"; flow:to_server,established; content:"GNUTELLA CONNECT"; depth:40;
metadata:ruleset community; classtype:policy-violation; sid:556; rev:10;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"PUA-P2P GNUTella client
request"; flow:to_server,established; content:"GNUTELLA OK"; depth:40;
metadata:ruleset community; classtype:policy-violation; sid:557; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"APP-DETECT VNC server
response"; flow:established; content:"RFB 0"; depth:5; content:".0"; depth:2;
offset:7; metadata:ruleset community; classtype:misc-activity; sid:560; rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 5632 (msg:"APP-DETECT PCAnywhere server
response"; content:"ST"; depth:2; metadata:ruleset community; classtype:misc-
activity; sid:566; rev:10;)
# alert tcp $SMTP_SERVERS 25 -> $EXTERNAL_NET any (msg:"SERVER-MAIL SMTP relaying
denied"; flow:established,to_client; content:"550 5.7.1"; depth:70;
metadata:ruleset community, service smtp; reference:url,mail-abuse.org/tsi/ar-
fix.html; classtype:misc-activity; sid:567; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 9100 (msg:"POLICY-OTHER HP JetDirect LCD
modification attempt"; flow:to_server,established; content:"@PJL RDYMSG DISPLAY =";
metadata:ruleset community; reference:bugtraq,2245; classtype:misc-activity;
sid:568; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC snmpXdmi overflow
attempt TCP"; flow:to_server,established; content:"|00 01 87 99|"; depth:4;
offset:16; content:"|00 00 01 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,1024,20,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:policy max-detect-ips drop, ruleset community, service sunrpc;
reference:bugtraq,2417; reference:cve,2001-0236; reference:nessus,10659;
reference:url,www.cert.org/advisories/CA-2001-05.html; classtype:attempted-admin;
sid:569; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 32771:34000 (msg:"PROTOCOL-RPC DOS
ttdbserv Solaris"; flow:to_server,established; content:"|00 00 00 00|"; depth:4;
offset:8; content:"|00 01 86 F3 00 00 00 01 00 00 00 0F 00 00 00 01|"; depth:32;
offset:16; metadata:ruleset community; reference:bugtraq,122; reference:cve,1999-
0003; classtype:attempted-dos; sid:572; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd TCP export
request"; flow:to_server,established; content:"|00 01 86 A5|"; depth:4; offset:16;
content:"|00 00 00 05|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:8; metadata:ruleset community; classtype:attempted-recon; sid:574; rev:14;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap admind
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 F7|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc; classtype:rpc-
portmap-decode; sid:575; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap amountd
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 87 03|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc;
reference:bugtraq,205; reference:bugtraq,235; reference:bugtraq,450;
reference:bugtraq,614; reference:cve,1999-0088; reference:cve,1999-0210;
reference:cve,1999-0493; reference:cve,1999-0704; classtype:rpc-portmap-decode;
sid:576; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap bootparam
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 BA|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc; classtype:rpc-
portmap-decode; sid:577; rev:22;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap cmsd
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 E4|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc; classtype:rpc-
portmap-decode; sid:578; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap mountd
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 A5|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc; classtype:rpc-
portmap-decode; sid:579; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap nisd
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 87 CC|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc;
reference:cve,1999-0008; classtype:rpc-portmap-decode; sid:580; rev:20;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap pcnfsd
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 02|I|F1|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc;
reference:bugtraq,205; reference:bugtraq,4816; reference:cve,1999-0078;
reference:cve,1999-0353; reference:cve,2002-0910; classtype:rpc-portmap-decode;
sid:581; rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap rexd
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 B1|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc; classtype:rpc-
portmap-decode; sid:582; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap rstatd
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 A1|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc; classtype:rpc-
portmap-decode; sid:583; rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap rusers
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 A2|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc;
reference:cve,1999-0626; classtype:rpc-portmap-decode; sid:584; rev:19;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap sadmind
request UDP attempt"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 87 88|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc; classtype:rpc-
portmap-decode; sid:585; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap
selection_svc request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4;
offset:12; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
AF|"; within:4; content:"|00 00 00 00|"; depth:4; offset:4; metadata:ruleset
community, service sunrpc; reference:bugtraq,8; reference:cve,1999-0209;
classtype:rpc-portmap-decode; sid:586; rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap status
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 B8|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc; classtype:rpc-
portmap-decode; sid:587; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap ttdbserv
request UDP"; content:"|00 01 86 A0|"; depth:4; offset:12; content:"|00 00 00 03|";
within:4; distance:4; byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
content:"|00 01 86 F3|"; within:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community, service sunrpc; reference:bugtraq,122;
reference:bugtraq,3382; reference:cve,1999-0003; reference:cve,1999-0687;
reference:cve,1999-1075; reference:cve,2001-0717;
reference:url,www.cert.org/advisories/CA-2001-05.html; classtype:rpc-portmap-
decode; sid:588; rev:26;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap yppasswd
request UDP"; content:"|00 01 86 A0|"; depth:4; offset:12; content:"|00 00 00 03|";
within:4; distance:4; byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
content:"|00 01 86 A9|"; within:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community, service sunrpc; classtype:rpc-portmap-decode; sid:589;
rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap ypserv
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 A4|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc;
reference:bugtraq,5914; reference:bugtraq,6016; reference:cve,2000-1042;
reference:cve,2000-1043; reference:cve,2002-1232; classtype:rpc-portmap-decode;
sid:590; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap ypupdated
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
BC|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:policy max-
detect-ips drop, ruleset community, service sunrpc; reference:bugtraq,1749;
reference:cve,1999-0208; classtype:rpc-portmap-decode; sid:591; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap snmpXdmi
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 87
99|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:policy max-
detect-ips drop, ruleset community, service sunrpc; reference:bugtraq,2417;
reference:cve,2001-0236; reference:nessus,10659;
reference:url,www.cert.org/advisories/CA-2001-05.html; classtype:rpc-portmap-
decode; sid:593; rev:31;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap espd
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 05 F7|u";
within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset community,
service sunrpc; reference:bugtraq,2714; reference:cve,2001-0331; classtype:rpc-
portmap-decode; sid:595; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap listing
TCP 111"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4; offset:16;
content:"|00 00 00 04|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:8; metadata:policy max-detect-ips drop, ruleset community, service sunrpc;
classtype:rpc-portmap-decode; sid:598; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 32771 (msg:"PROTOCOL-RPC portmap listing
TCP 32771"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 04|"; within:4; distance:4; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community; classtype:rpc-portmap-decode;
sid:599; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 513 (msg:"PROTOCOL-SERVICES rlogin
LinuxNIS"; flow:to_server,established; content:"|3A 3A 3A 3A 3A 3A 3A 3A 00 3A 3A
3A 3A 3A 3A 3A 3A|"; fast_pattern:only; metadata:ruleset community; classtype:bad-
unknown; sid:601; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 513 (msg:"PROTOCOL-SERVICES rlogin bin";
flow:to_server,established; content:"bin|00|bin|00|"; fast_pattern:only;
metadata:ruleset community; classtype:attempted-user; sid:602; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 513 (msg:"PROTOCOL-SERVICES rlogin echo+
+"; flow:to_server,established; content:"echo |22| + + |22|"; fast_pattern:only;
metadata:ruleset community; classtype:bad-unknown; sid:603; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 513 (msg:"PROTOCOL-SERVICES Unix rlogin
froot parameter root access attempt"; flow:to_server,established; content:"-froot|
00|"; fast_pattern:only; metadata:ruleset community; reference:bugtraq,458;
reference:cve,1999-0113; classtype:attempted-admin; sid:604; rev:13;)
# alert tcp $HOME_NET 513 -> $EXTERNAL_NET any (msg:"PROTOCOL-SERVICES rlogin login
failure"; flow:to_client,established; content:"login incorrect"; fast_pattern:only;
metadata:ruleset community; classtype:unsuccessful-user; sid:605; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 513 (msg:"PROTOCOL-SERVICES rlogin
root"; flow:to_server,established; content:"root|00|root|00|"; fast_pattern:only;
metadata:ruleset community; classtype:attempted-admin; sid:606; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 514 (msg:"PROTOCOL-SERVICES rsh bin";
flow:to_server,established; content:"bin|00|bin|00|"; fast_pattern:only;
metadata:ruleset community; classtype:attempted-user; sid:607; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 514 (msg:"PROTOCOL-SERVICES rsh echo +
+"; flow:to_server,established; content:"echo |22|+ +|22|"; fast_pattern:only;
metadata:ruleset community; classtype:attempted-user; sid:608; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 514 (msg:"PROTOCOL-SERVICES rsh froot";
flow:to_server,established; content:"-froot|00|"; fast_pattern:only;
metadata:ruleset community; classtype:attempted-admin; sid:609; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 514 (msg:"PROTOCOL-SERVICES rsh root";
flow:to_server,established; content:"|00|root|00|"; fast_pattern:only;
pcre:"/^(\d{1,5})?\x00?[^\x00]+?\x00root\x00/i"; metadata:policy max-detect-ips
drop, ruleset community; classtype:attempted-admin; sid:610; rev:15;)
# alert tcp $HOME_NET 513 -> $EXTERNAL_NET any (msg:"PROTOCOL-SERVICES rlogin login
failure"; flow:to_client,established; content:"|01|rlogind|3A| Permission denied.";
fast_pattern:only; metadata:ruleset community; classtype:unsuccessful-user;
sid:611; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC rusers query
UDP"; content:"|00 01 86 A2|"; depth:4; offset:12; content:"|00 00 00 02|";
within:4; distance:4; content:"|00 00 00 00|"; depth:4; offset:4; metadata:ruleset
community; reference:cve,1999-0626; classtype:attempted-recon; sid:612; rev:11;)
# alert tcp $EXTERNAL_NET 10101 -> $HOME_NET any (msg:"INDICATOR-SCAN myscan";
flow:stateless; ack:0; flags:S; ttl:>220; metadata:ruleset community;
classtype:attempted-recon; sid:613; rev:10;)
# alert tcp $EXTERNAL_NET 31790 -> $HOME_NET 31789 (msg:"MALWARE-BACKDOOR hack-a-
tack attempt"; flow:stateless; flags:A+; content:"A"; depth:1; metadata:ruleset
community; classtype:attempted-recon; sid:614; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 113 (msg:"INDICATOR-SCAN ident version
request"; flow:to_server,established; content:"VERSION|0A|"; depth:16;
metadata:ruleset community; classtype:attempted-recon; sid:616; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 80 (msg:"INDICATOR-SCAN cybercop os
probe"; flow:stateless; dsize:0; flags:SF12; metadata:ruleset community;
classtype:attempted-recon; sid:619; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SCAN ipEye SYN
scan"; flow:stateless; flags:S; seq:1958810375; metadata:ruleset community;
classtype:attempted-recon; sid:622; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SCAN cybercop os
PA12 attempt"; flow:stateless; flags:PA12; content:"AAAAAAAAAAAAAAAA"; depth:16;
metadata:ruleset community; classtype:attempted-recon; sid:626; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SCAN cybercop os
SFU12 probe"; flow:stateless; ack:0; flags:SFU12; content:"AAAAAAAAAAAAAAAA";
depth:16; metadata:ruleset community; classtype:attempted-recon; sid:627; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SCAN synscan
portscan"; flow:stateless; flags:SF; id:39426; metadata:ruleset community;
classtype:attempted-recon; sid:630; rev:10;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL ehlo cybercop
attempt"; flow:to_server,established; content:"ehlo cybercop|0A|quit|0A|";
fast_pattern:only; metadata:ruleset community, service smtp; classtype:protocol-
command-decode; sid:631; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL expn cybercop
attempt"; flow:to_server,established; content:"expn cybercop"; fast_pattern:only;
metadata:ruleset community, service smtp; classtype:protocol-command-decode;
sid:632; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 10080:10081 (msg:"INDICATOR-SCAN Amanda
client-version request"; flow:to_server; content:"Amanda"; fast_pattern:only;
metadata:ruleset community; classtype:attempted-recon; sid:634; rev:8;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 49 (msg:"INDICATOR-SCAN XTACACS logout";
flow:to_server; content:"|80 07 00 00 07 00 00 04 00 00 00 00 00|";
fast_pattern:only; metadata:ruleset community; classtype:bad-unknown; sid:635;
rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 7 (msg:"INDICATOR-SCAN cybercop udp
bomb"; flow:to_server; content:"cybercop"; fast_pattern:only; metadata:ruleset
community; classtype:bad-unknown; sid:636; rev:7;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SCAN Webtrends
Scanner UDP Probe"; flow:to_server; content:"|0A|help|0A|quite|0A|";
fast_pattern:only; metadata:ruleset community;
reference:url,www.netiq.com/products/vsm/default.asp; classtype:attempted-recon;
sid:637; rev:11;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE SGI NOOP";
content:"|03 E0 F8|%|03 E0 F8|%|03 E0 F8|%|03 E0 F8|%"; fast_pattern:only;
metadata:ruleset community; classtype:shellcode-detect; sid:638; rev:11;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE SGI NOOP";
content:"|24 0F 12|4|24 0F 12|4|24 0F 12|4|24 0F 12|4"; fast_pattern:only;
metadata:ruleset community; classtype:shellcode-detect; sid:639; rev:11;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE AIX NOOP";
content:"O|FF FB 82|O|FF FB 82|O|FF FB 82|O|FF FB 82|"; fast_pattern:only;
metadata:ruleset community; classtype:shellcode-detect; sid:640; rev:11;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE Digital
UNIX NOOP"; content:"G|FF 04 1F|G|FF 04 1F|G|FF 04 1F|G|FF 04 1F|";
fast_pattern:only; metadata:ruleset community; classtype:shellcode-detect; sid:641;
rev:12;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE HP-UX
NOOP"; content:"|08|!|02 80 08|!|02 80 08|!|02 80 08|!|02 80|"; fast_pattern:only;
metadata:ruleset community; classtype:shellcode-detect; sid:642; rev:12;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE HP-UX
NOOP"; content:"|0B|9|02 80 0B|9|02 80 0B|9|02 80 0B|9|02 80|"; fast_pattern:only;
metadata:ruleset community; classtype:shellcode-detect; sid:643; rev:13;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE sparc
NOOP"; content:"|13 C0 1C A6 13 C0 1C A6 13 C0 1C A6 13 C0 1C A6|";
fast_pattern:only; metadata:ruleset community; classtype:shellcode-detect; sid:644;
rev:11;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE sparc
NOOP"; content:"|80 1C|@|11 80 1C|@|11 80 1C|@|11 80 1C|@|11|"; fast_pattern:only;
metadata:ruleset community; classtype:shellcode-detect; sid:645; rev:11;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE sparc
NOOP"; content:"|A6 1C C0 13 A6 1C C0 13 A6 1C C0 13 A6 1C C0 13|";
fast_pattern:only; metadata:ruleset community; classtype:shellcode-detect; sid:646;
rev:11;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE Oracle
sparc setuid 0"; content:"|82 10| |17 91 D0| |08|"; fast_pattern:only;
metadata:policy max-detect-ips drop, ruleset community; classtype:system-call-
detect; sid:647; rev:15;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE x86 NOOP";
content:"|90 90 90 90 90 90 90 90 90 90 90 90 90 90|"; fast_pattern:only;
metadata:policy max-detect-ips drop, ruleset community; classtype:shellcode-detect;
sid:648; rev:18;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE x86 setgid
0"; content:"|B0 B5 CD 80|"; fast_pattern:only; metadata:ruleset community;
classtype:system-call-detect; sid:649; rev:14;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE x86 setuid
0"; content:"|B0 17 CD 80|"; fast_pattern:only; metadata:ruleset community;
classtype:system-call-detect; sid:650; rev:14;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE Linux
shellcode"; content:"|90 90 90 E8 C0 FF FF FF|/bin/sh"; fast_pattern:only;
metadata:ruleset community; classtype:shellcode-detect; sid:652; rev:15;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL RCPT TO
overflow"; flow:to_server,established; content:"rcpt to|3A|"; nocase;
isdataat:256,relative; pcre:"/^RCPT TO\x3a\s*\x3c?[^\n\x3e]{256}/im";
metadata:policy max-detect-ips drop, ruleset community, service smtp;
reference:bugtraq,2283; reference:bugtraq,43182; reference:bugtraq,9696;
reference:cve,2001-0260; reference:cve,2003-0694; reference:cve,2008-0394;
reference:cve,2009-0410; reference:cve,2010-2580; classtype:attempted-admin;
sid:654; rev:28;)
# alert tcp $EXTERNAL_NET 113 -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail 8.6.9
exploit"; flow:to_server,established; content:"|0A|D/"; metadata:ruleset community,
service smtp; reference:bugtraq,2311; reference:cve,1999-0204; classtype:attempted-
admin; sid:655; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Netmanager
chameleon SMTPd buffer overflow attempt"; flow:to_server,established;
content:"HELP"; nocase; isdataat:500,relative; pcre:"/^HELP\s[^\n]{500}/ism";
metadata:ruleset community, service smtp; reference:bugtraq,2387;
reference:cve,1999-0261; classtype:attempted-admin; sid:657; rev:20;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Microsoft
Windows Exchange Server 5.5 mime DOS"; flow:to_server,established; content:"charset
= |22 22|"; nocase; metadata:ruleset community, service smtp;
reference:bugtraq,1869; reference:cve,2000-1006; reference:nessus,10558;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS00-082;
classtype:attempted-dos; sid:658; rev:19;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail expn
decode"; flow:to_server,established; content:"expn"; nocase; content:"decode";
fast_pattern:only; pcre:"/^expn\s+decode/smi"; metadata:ruleset community, service
smtp; reference:cve,1999-0096; reference:nessus,10248; classtype:attempted-recon;
sid:659; rev:18;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL expn root";
flow:to_server,established; content:"expn"; nocase; content:"root";
fast_pattern:only; pcre:"/^expn\s+root/smi"; metadata:ruleset community, service
smtp; reference:nessus,10249; classtype:attempted-recon; sid:660; rev:19;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Majordomo ifs";
flow:to_server,established; content:"eply-to|3A| a~.`/bin/"; fast_pattern:only;
metadata:ruleset community, service smtp; reference:bugtraq,2310;
reference:cve,1999-0207; classtype:attempted-admin; sid:661; rev:18;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail 5.5.5
exploit"; flow:to_server,established; content:"mail from|3A| |22 7C|";
fast_pattern:only; metadata:ruleset community, service smtp; reference:cve,1999-
0203; reference:nessus,10258; classtype:attempted-admin; sid:662; rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail rcpt
to command attempt"; flow:to_server,established; content:"rcpt to|3A|";
fast_pattern:only; pcre:"/^rcpt\s+to\:\s*[\x7c\x3b]/smi"; metadata:ruleset
community, service smtp; reference:bugtraq,1; reference:cve,1999-0095;
classtype:attempted-admin; sid:663; rev:24;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail RCPT
TO decode attempt"; flow:to_server,established; content:"rcpt to|3A|"; nocase;
content:"decode"; distance:0; nocase; pcre:"/^rcpt to\:\s*decode/smi";
metadata:ruleset community, service smtp; reference:bugtraq,2308;
reference:cve,1999-0203; classtype:attempted-admin; sid:664; rev:23;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail 5.6.5
exploit"; flow:to_server,established; content:"MAIL FROM|3A| |7C|/usr/ucb/tail";
fast_pattern:only; metadata:ruleset community, service smtp;
reference:bugtraq,2308; reference:cve,1999-0203; classtype:attempted-user; sid:665;
rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail 8.6.10
exploit"; flow:to_server,established; content:"Croot|0D 0A|Mprog, P=/bin/";
fast_pattern:only; metadata:ruleset community, service smtp;
reference:bugtraq,2311; reference:cve,1999-0204; classtype:attempted-user; sid:667;
rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail 8.6.10
exploit"; flow:to_server,established; content:"Croot|09 09 09 09 09 09 09|
Mprog,P=/bin"; fast_pattern:only; metadata:ruleset community, service smtp;
reference:bugtraq,2311; reference:cve,1999-0204; classtype:attempted-user; sid:668;
rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail 8.6.9
exploit"; flow:to_server,established; content:"|0A|Croot|0A|Mprog";
fast_pattern:only; metadata:ruleset community, service smtp;
reference:bugtraq,2311; reference:cve,1999-0204; classtype:attempted-user; sid:669;
rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail 8.6.9
exploit"; flow:to_server,established; content:"|0A|C|3A|daemon|0A|R";
fast_pattern:only; metadata:ruleset community, service smtp;
reference:bugtraq,2311; reference:cve,1999-0204; classtype:attempted-user; sid:670;
rev:16;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail 8.6.9c
exploit"; flow:to_server,established; content:"|0A|Croot|0D 0A|Mprog";
fast_pattern:only; metadata:ruleset community, service smtp;
reference:bugtraq,2311; reference:cve,1999-0204; classtype:attempted-user; sid:671;
rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL vrfy decode";
flow:to_server,established; content:"vrfy"; nocase; content:"decode"; distance:1;
nocase; pcre:"/^vrfy\s+decode/smi"; metadata:ruleset community, service smtp;
reference:cve,1999-0096; classtype:attempted-recon; sid:672; rev:17;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"SQL sp_start_job - program
execution"; flow:to_server,established; content:"s|00|p|00|_|00|s|00|t|00|a|00|r|
00|t|00|_|00|j|00|o|00|b|00|"; fast_pattern:only; metadata:ruleset community;
classtype:attempted-user; sid:673; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 139 (msg:"SQL sp_start_job - program
execution"; flow:to_server,established; content:"s|00|p|00|_|00|s|00|t|00|a|00|r|
00|t|00|_|00|j|00|o|00|b|00|"; depth:32; offset:32; nocase; metadata:ruleset
community; classtype:attempted-user; sid:676; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 139 (msg:"SQL sp_password password
change"; flow:to_server,established; content:"s|00|p|00|_|00|p|00|a|00|s|00|s|00|w|
00|o|00|r|00|d|00|"; fast_pattern:only; metadata:ruleset community;
classtype:attempted-user; sid:677; rev:10;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 139 (msg:"SQL sp_delete_alert log
file deletion"; flow:to_server,established; content:"s|00|p|00|_|00|d|00|e|00|l|00|
e|00|t|00|e|00|_|00|a|00|l|00|e|00|"; fast_pattern:only; metadata:ruleset
community; classtype:attempted-user; sid:678; rev:10;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 139 (msg:"SQL sp_adduser database
user creation"; flow:to_server,established; content:"s|00|p|00|_|00|a|00|d|00|d|00|
u|00|s|00|e|00|r|00|"; depth:32; offset:32; nocase; metadata:ruleset community;
classtype:attempted-user; sid:679; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 139 (msg:"SQL xp_cmdshell program
execution"; flow:to_server,established; content:"x|00|p|00|_|00|c|00|m|00|d|00|s|
00|h|00|e|00|l|00|l|00|"; offset:32; nocase; metadata:ruleset community;
reference:bugtraq,5309; classtype:attempted-user; sid:681; rev:10;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"SQL sp_password - password
change"; flow:to_server,established; content:"s|00|p|00|_|00|p|00|a|00|s|00|s|00|w|
00|o|00|r|00|d|00|"; fast_pattern:only; metadata:ruleset community;
classtype:attempted-user; sid:683; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"SQL sp_delete_alert log
file deletion"; flow:to_server,established; content:"s|00|p|00|_|00|d|00|e|00|l|00|
e|00|t|00|e|00|_|00|a|00|l|00|e|00|r|00|t|00|"; fast_pattern:only; metadata:ruleset
community; classtype:attempted-user; sid:684; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"SQL sp_adduser - database
user creation"; flow:to_server,established; content:"s|00|p|00|_|00|a|00|d|00|d|00|
u|00|s|00|e|00|r|00|"; fast_pattern:only; metadata:ruleset community;
classtype:attempted-user; sid:685; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"SERVER-MSSQL xp_reg* -
registry access"; flow:to_server,established; content:"x|00|p|00|_|00|r|00|e|00|g|
00|"; fast_pattern:only; metadata:ruleset community; reference:bugtraq,5205;
reference:cve,2002-0642; reference:nessus,10642;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS02-034;
classtype:attempted-user; sid:686; rev:17;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"SQL xp_cmdshell - program
execution"; flow:to_server,established; content:"x|00|p|00|_|00|c|00|m|00|d|00|s|
00|h|00|e|00|l|00|l|00|"; fast_pattern:only; metadata:ruleset community;
reference:bugtraq,5309; classtype:attempted-user; sid:687; rev:10;)
alert tcp $SQL_SERVERS 1433 -> $EXTERNAL_NET any (msg:"SQL sa login failed";
flow:to_client,established; content:"Login failed for user 'sa'";
fast_pattern:only; metadata:policy balanced-ips drop, policy connectivity-ips drop,
policy security-ips drop, ruleset community; reference:bugtraq,4797;
reference:cve,2000-1209; reference:nessus,10673; classtype:unsuccessful-user;
sid:688; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 139 (msg:"SERVER-MSSQL xp_reg*
registry access"; flow:to_server,established; content:"x|00|p|00|_|00|r|00|e|00|g|
00|"; depth:32; offset:32; nocase; metadata:ruleset community;
reference:bugtraq,5205; reference:cve,2002-0642; reference:nessus,10642;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS02-034;
classtype:attempted-user; sid:689; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"INDICATOR-SHELLCODE
shellcode attempt"; flow:to_server,established; content:"9 |D0 00 92 01 C2 00|R|00|
U|00|9 |EC 00|"; metadata:ruleset community; classtype:shellcode-detect; sid:691;
rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 139 (msg:"INDICATOR-SHELLCODE
shellcode attempt"; flow:to_server,established; content:"9 |D0 00 92 01 C2 00|R|00|
U|00|9 |EC 00|"; metadata:ruleset community; classtype:shellcode-detect; sid:692;
rev:10;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"INDICATOR-SHELLCODE
shellcode attempt"; flow:to_server,established; content:"H|00|%|00|x|00|w|00 90 00
90 00 90 00 90 00 90 00|3|00 C0 00|P|00|h|00|.|00|"; metadata:ruleset community;
classtype:shellcode-detect; sid:693; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 139 (msg:"INDICATOR-SHELLCODE
shellcode attempt"; flow:to_server,established; content:"H|00|%|00|x|00|w|00 90 00
90 00 90 00 90 00 90 00|3|00 C0 00|P|00|h|00|.|00|"; metadata:ruleset community;
classtype:attempted-user; sid:694; rev:10;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 139 (msg:"SERVER-MSSQL xp_sprintf
possible buffer overflow"; flow:to_server,established; content:"x|00|p|00|_|00|s|
00|p|00|r|00|i|00|n|00|t|00|f|00|"; offset:32; nocase; metadata:ruleset community;
reference:bugtraq,1204; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS01-060; classtype:attempted-user; sid:695; rev:14;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"SERVER-MSSQL xp_sprintf
possible buffer overflow"; flow:to_server,established; content:"x|00|p|00|_|00|s|
00|p|00|r|00|i|00|n|00|t|00|f|00|"; fast_pattern:only; metadata:ruleset community;
reference:bugtraq,1204; reference:bugtraq,3733; reference:cve,2001-0542;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS01-060;
classtype:attempted-user; sid:704; rev:16;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"PROTOCOL-TELNET 4Dgifts
SGI account attempt"; flow:to_server,established; content:"4Dgifts";
metadata:ruleset community, service telnet; reference:cve,1999-0501;
reference:nessus,11243; classtype:suspicious-login; sid:709; rev:17;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"PROTOCOL-TELNET EZsetup
account attempt"; flow:to_server,established; content:"OutOfBox"; metadata:ruleset
community, service telnet; reference:cve,1999-0501; reference:nessus,11244;
classtype:suspicious-login; sid:710; rev:17;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"PROTOCOL-TELNET SGI
telnetd format bug"; flow:to_server,established; content:"_RLD"; fast_pattern:only;
content:"bin/sh"; metadata:ruleset community, service telnet;
reference:bugtraq,1572; reference:cve,2000-0733; classtype:attempted-admin;
sid:711; rev:18;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"PROTOCOL-TELNET
ld_library_path"; flow:to_server,established; content:"ld_library_path";
fast_pattern:only; metadata:ruleset community, service telnet;
reference:bugtraq,459; reference:cve,1999-0073; classtype:attempted-admin; sid:712;
rev:16;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"PROTOCOL-TELNET
livingston DOS"; flow:to_server,established; content:"|FF F3 FF F3 FF F3 FF F3 FF
F3|"; fast_pattern:only; rawbytes; metadata:ruleset community, service telnet;
reference:bugtraq,2225; reference:cve,1999-0218; classtype:attempted-dos; sid:713;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"PROTOCOL-TELNET
resolv_host_conf"; flow:to_server,established; content:"resolv_host_conf";
fast_pattern:only; metadata:ruleset community, service telnet;
reference:bugtraq,2181; reference:cve,2001-0170; classtype:attempted-admin;
sid:714; rev:15;)
# alert tcp $TELNET_SERVERS 23 -> $EXTERNAL_NET any (msg:"PROTOCOL-TELNET Attempted
SU from wrong group"; flow:to_client,established; content:"to su root";
fast_pattern:only; metadata:ruleset community, service telnet; classtype:attempted-
admin; sid:715; rev:14;)
# alert tcp $TELNET_SERVERS 23 -> $EXTERNAL_NET any (msg:"PROTOCOL-TELNET not on
console"; flow:to_client,established; content:"not on system console";
fast_pattern:only; metadata:ruleset community, service telnet; classtype:bad-
unknown; sid:717; rev:15;)
# alert tcp $TELNET_SERVERS 23 -> $EXTERNAL_NET any (msg:"PROTOCOL-TELNET login
incorrect"; flow:to_client,established; content:"Login incorrect"; metadata:ruleset
community, service telnet; classtype:bad-unknown; sid:718; rev:16;)
# alert tcp $TELNET_SERVERS 23 -> $EXTERNAL_NET any (msg:"PROTOCOL-TELNET root
login"; flow:to_client,established; content:"login|3A| root"; fast_pattern:only;
metadata:ruleset community, service telnet; classtype:suspicious-login; sid:719;
rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
HyperSeek hsx.cgi directory traversal attempt"; flow:to_server,established;
content:"/hsx.cgi"; http_uri; content:"../../"; http_raw_uri; content:"%00";
distance:1; http_raw_uri; metadata:ruleset community, service http;
reference:bugtraq,2314; reference:cve,2001-0253; reference:nessus,10602;
classtype:web-application-attack; sid:803; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
SWSoft ASPSeek Overflow attempt"; flow:to_server,established; content:"/s.cgi";
fast_pattern; nocase; http_uri; content:"tmpl="; http_uri; metadata:ruleset
community, service http; reference:bugtraq,2492; reference:cve,2001-0476;
classtype:web-application-attack; sid:804; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Progress webspeed access"; flow:to_server,established;
content:"/wsisa.dll/WService="; fast_pattern; nocase; http_uri; content:"WSMadmin";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,969;
reference:cve,2000-0127; reference:nessus,10304; classtype:attempted-user; sid:805;
rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP yabb
directory traversal attempt"; flow:to_server,established; content:"/YaBB";
fast_pattern; nocase; http_uri; content:"../"; http_raw_uri; metadata:ruleset
community, service http; reference:bugtraq,1668; reference:cve,2000-0853;
reference:nessus,10512; classtype:attempted-recon; sid:806; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/wwwboard/passwd.txt access"; flow:to_server,established;
content:"/wwwboard/passwd.txt"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,649; reference:cve,1999-0953;
reference:cve,1999-0954; reference:nessus,10321; classtype:attempted-recon;
sid:807; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webdriver access"; flow:to_server,established; content:"/webdriver";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2166; reference:nessus,10592; classtype:attempted-recon; sid:808;
rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
whois_raw.cgi arbitrary command execution attempt"; flow:to_server,established;
content:"/whois_raw.cgi?"; http_uri; content:"|0A|"; metadata:ruleset community,
service http; reference:bugtraq,304; reference:cve,1999-1063;
reference:nessus,10306; classtype:web-application-attack; sid:809; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
whois_raw.cgi access"; flow:to_server,established; content:"/whois_raw.cgi";
http_uri; metadata:ruleset community, service http; reference:bugtraq,304;
reference:cve,1999-1063; reference:nessus,10306; classtype:attempted-recon;
sid:810; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
websitepro path access"; flow:to_server,established; content:" /HTTP/1.";
fast_pattern:only; metadata:ruleset community, service http; reference:bugtraq,932;
reference:cve,2000-0066; reference:nessus,10303; classtype:attempted-recon;
sid:811; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webplus version access"; flow:to_server,established; content:"/webplus?about";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1102; reference:cve,2000-0282; classtype:attempted-recon;
sid:812; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webplus directory traversal"; flow:to_server,established; content:"/webplus?
script"; fast_pattern; nocase; http_uri; content:"../"; http_raw_uri;
metadata:ruleset community, service http; reference:bugtraq,1102;
reference:cve,2000-0282; reference:nessus,10367; classtype:web-application-attack;
sid:813; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
websendmail access"; flow:to_server,established; content:"/websendmail";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2077; reference:cve,1999-0196; reference:nessus,10301;
classtype:attempted-recon; sid:815; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
dcboard.cgi invalid user addition attempt"; flow:to_server,established;
content:"/dcboard.cgi"; http_uri; content:"command=register"; content:"%7cadmin";
metadata:ruleset community, service http; reference:bugtraq,2728;
reference:cve,2001-0527; reference:nessus,10583; classtype:web-application-attack;
sid:817; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
dcforum.cgi access"; flow:to_server,established; content:"/dcforum.cgi"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,2728;
reference:cve,2001-0527; reference:nessus,10583; classtype:attempted-recon;
sid:818; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
mmstdod.cgi access"; flow:to_server,established; content:"/mmstdod.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2063; reference:cve,2001-0021; reference:nessus,10566;
classtype:attempted-recon; sid:819; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
anaconda directory traversal attempt"; flow:to_server,established;
content:"/apexec.pl"; http_uri; content:"template=../"; fast_pattern:only;
metadata:ruleset community, service http; reference:bugtraq,2338;
reference:bugtraq,2388; reference:cve,2000-0975; reference:cve,2001-0308;
reference:nessus,10536; classtype:web-application-attack; sid:820; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
imagemap.exe overflow attempt"; flow:to_server,established;
content:"/imagemap.exe?"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,739; reference:cve,1999-0951;
reference:nessus,10122; classtype:web-application-attack; sid:821; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cvsweb.cgi access"; flow:to_server,established; content:"/cvsweb.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1469; reference:cve,2000-0670; reference:nessus,10465;
classtype:attempted-recon; sid:823; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
php.cgi access"; flow:to_server,established; content:"/php.cgi"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2250;
reference:bugtraq,712; reference:cve,1999-0058; reference:cve,1999-0238;
reference:nessus,10178; classtype:attempted-recon; sid:824; rev:27;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
glimpse access"; flow:to_server,established; content:"/glimpse"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2026;
reference:cve,1999-0147; reference:nessus,10095; classtype:attempted-recon;
sid:825; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
htmlscript access"; flow:to_server,established; content:"/htmlscript";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2001; reference:cve,1999-0264; reference:nessus,10106;
classtype:attempted-recon; sid:826; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
info2www access"; flow:to_server,established; content:"/info2www";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1995; reference:cve,1999-0266; reference:nessus,10127;
classtype:attempted-recon; sid:827; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
maillist.pl access"; flow:to_server,established; content:"/maillist.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:828; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP nph-
test-cgi access"; flow:to_server,established; content:"/nph-test-cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,686; reference:cve,1999-0045; reference:nessus,10165;
classtype:attempted-recon; sid:829; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
perl.exe access"; flow:to_server,established; content:"/perl.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-0509; reference:nessus,10173;
reference:url,www.cert.org/advisories/CA-1996-11.html; classtype:attempted-recon;
sid:832; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
rguest.exe access"; flow:to_server,established; content:"/rguest.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2024; reference:cve,1999-0287; classtype:attempted-recon;
sid:833; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
rwwwshell.pl access"; flow:to_server,established; content:"/rwwwshell.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:url,www.itsecurity.com/papers/p37.htm; classtype:attempted-recon;
sid:834; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
test-cgi access"; flow:to_server,established; content:"/test-cgi";
fast_pattern:only; http_uri; metadata:policy max-detect-ips drop, ruleset
community, service http; reference:bugtraq,2003; reference:cve,1999-0070;
reference:nessus,10282; classtype:attempted-recon; sid:835; rev:26;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
textcounter.pl access"; flow:to_server,established; content:"/textcounter.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2265; reference:cve,1999-1479; reference:nessus,11451;
classtype:attempted-recon; sid:836; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
uploader.exe access"; flow:to_server,established; content:"/uploader.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1611; reference:cve,1999-0177; reference:cve,2000-0769;
reference:nessus,10291; classtype:attempted-recon; sid:837; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webgais access"; flow:to_server,established; content:"/webgais"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2058;
reference:cve,1999-0176; reference:nessus,10300; classtype:attempted-recon;
sid:838; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
finger access"; flow:to_server,established; content:"/finger"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:cve,1999-0612;
reference:nessus,10071; classtype:attempted-recon; sid:839; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
perlshop.cgi access"; flow:to_server,established; content:"/perlshop.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1374; classtype:attempted-recon; sid:840; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
aglimpse access"; flow:to_server,established; content:"/aglimpse";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2026; reference:cve,1999-0147; reference:nessus,10095;
classtype:attempted-recon; sid:842; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
anform2 access"; flow:to_server,established; content:"/AnForm2"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,719;
reference:cve,1999-0066; classtype:attempted-recon; sid:843; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
args.bat access"; flow:to_server,established; content:"/args.bat";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1180; reference:nessus,11465; classtype:attempted-recon;
sid:844; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP AT-
admin.cgi access"; flow:to_server,established; content:"/AT-admin.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1072; classtype:attempted-recon; sid:845; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
bnbform.cgi access"; flow:to_server,established; content:"/bnbform.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2147; reference:cve,1999-0937; classtype:attempted-recon;
sid:846; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
campas access"; flow:to_server,established; content:"/campas"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,1975;
reference:cve,1999-0146; reference:nessus,10035; classtype:attempted-recon;
sid:847; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
view-source directory traversal"; flow:to_server,established; content:"/view-
source"; fast_pattern; nocase; http_uri; content:"../"; http_raw_uri;
metadata:ruleset community, service http; reference:bugtraq,2251;
reference:bugtraq,8883; reference:cve,1999-0174; classtype:web-application-attack;
sid:848; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
view-source access"; flow:to_server,established; content:"/view-source";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2251; reference:bugtraq,8883; reference:cve,1999-0174;
classtype:attempted-recon; sid:849; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
wais.pl access"; flow:to_server,established; content:"/wais.pl"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:attempted-recon;
sid:850; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
files.pl access"; flow:to_server,established; content:"/files.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1081; classtype:attempted-recon; sid:851; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
wguest.exe access"; flow:to_server,established; content:"/wguest.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2024; reference:cve,1999-0287; reference:cve,1999-0467;
classtype:attempted-recon; sid:852; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP wrap
access"; flow:to_server,established; content:"/wrap"; http_uri; metadata:ruleset
community, service http; reference:bugtraq,373; reference:cve,1999-0149;
reference:nessus,10317; classtype:attempted-recon; sid:853; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
classifieds.cgi access"; flow:to_server,established; content:"/classifieds.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2020; reference:cve,1999-0934; classtype:attempted-recon;
sid:854; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
environ.cgi access"; flow:to_server,established; content:"/environ.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:856; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
faxsurvey access"; flow:to_server,established; content:"/faxsurvey";
fast_pattern:only; http_uri; metadata:policy max-detect-ips drop, ruleset
community, service http; reference:bugtraq,2056; reference:cve,1999-0262;
reference:nessus,10067; classtype:web-application-activity; sid:857; rev:26;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
filemail access"; flow:to_server,established; content:"/filemail.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1154; classtype:attempted-recon; sid:858; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
man.sh access"; flow:to_server,established; content:"/man.sh"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2276;
reference:cve,1999-1179; classtype:attempted-recon; sid:859; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
snork.bat access"; flow:to_server,established; content:"/snork.bat";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2023; reference:cve,1999-0233; classtype:attempted-recon;
sid:860; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP w3-
msql access"; flow:to_server,established; content:"/w3-msql/"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,591;
reference:bugtraq,898; reference:cve,1999-0276; reference:cve,1999-0753;
reference:cve,2000-0012; reference:nessus,10296; classtype:attempted-recon;
sid:861; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP csh
access"; flow:to_server,established; content:"/csh"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0509;
reference:url,www.cert.org/advisories/CA-1996-11.html; classtype:attempted-recon;
sid:862; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
day5datacopier.cgi access"; flow:to_server,established;
content:"/day5datacopier.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:cve,1999-1232; classtype:attempted-recon;
sid:863; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
day5datanotifier.cgi access"; flow:to_server,established;
content:"/day5datanotifier.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:cve,1999-1232; classtype:attempted-recon;
sid:864; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP ksh
access"; flow:to_server,established; content:"/ksh"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0509;
reference:url,www.cert.org/advisories/CA-1996-11.html; classtype:attempted-recon;
sid:865; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
post-query access"; flow:to_server,established; content:"/post-query";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,6752; reference:cve,2001-0291; classtype:attempted-recon;
sid:866; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
visadmin.exe access"; flow:to_server,established; content:"/visadmin.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1808; reference:cve,1999-0970; reference:nessus,10295;
classtype:attempted-recon; sid:867; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP rsh
access"; flow:to_server,established; content:"/rsh"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0509;
reference:url,www.cert.org/advisories/CA-1996-11.html; classtype:attempted-recon;
sid:868; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
dumpenv.pl access"; flow:to_server,established; content:"/dumpenv.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1178; reference:nessus,10060; classtype:attempted-recon;
sid:869; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
snorkerz.cmd access"; flow:to_server,established; content:"/snorkerz.cmd";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:870; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
survey.cgi access"; flow:to_server,established; content:"/survey.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1817; reference:cve,1999-0936; classtype:attempted-recon;
sid:871; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP tcsh
access"; flow:to_server,established; content:"/tcsh"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0509;
reference:url,www.cert.org/advisories/CA-1996-11.html; classtype:attempted-recon;
sid:872; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP win-
c-sample.exe access"; flow:to_server,established; content:"/win-c-sample.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2078; reference:cve,1999-0178; reference:nessus,10008;
classtype:attempted-recon; sid:875; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP rksh
access"; flow:to_server,established; content:"/rksh"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0509;
reference:url,www.cert.org/advisories/CA-1996-11.html; classtype:attempted-recon;
sid:877; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
w3tvars.pm access"; flow:to_server,established; content:"/w3tvars.pm";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:878; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
admin.pl access"; flow:to_server,established; content:"/admin.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3839; reference:cve,2002-1748;
reference:url,online.securityfocus.com/archive/1/249355; classtype:attempted-recon;
sid:879; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
LWGate access"; flow:to_server,established; content:"/LWGate"; fast_pattern:only;
http_uri; metadata:ruleset community, service http;
reference:url,www.netspace.org/~dwb/lwgate/lwgate-history.html;
reference:url,www.wiretrip.net/rfp/p/doc.asp/i2/d6.htm; classtype:attempted-recon;
sid:880; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
archie access"; flow:to_server,established; content:"/archie"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:attempted-recon;
sid:881; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
calendar access"; flow:to_server,established; content:"/calendar";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:882; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
flexform access"; flow:to_server,established; content:"/flexform";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:url,www.wiretrip.net/rfp/p/doc.asp/i2/d6.htm; classtype:attempted-recon;
sid:883; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP bash
access"; flow:to_server,established; content:"/bash"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0509;
reference:url,www.cert.org/advisories/CA-1996-11.html; classtype:web-application-
activity; sid:885; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP phf
access"; flow:to_server,established; content:"/phf"; fast_pattern:only; http_uri;
metadata:policy max-detect-ips drop, ruleset community, service http;
reference:bugtraq,629; reference:cve,1999-0067; classtype:web-application-activity;
sid:886; rev:28;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP www-
sql access"; flow:to_server,established; content:"/www-sql"; fast_pattern:only;
http_uri; metadata:ruleset community, service http;
reference:url,marc.theaimsgroup.com/?l=bugtraq&m=88704258804054&w=2;
classtype:attempted-recon; sid:887; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
wwwadmin.pl access"; flow:to_server,established; content:"/wwwadmin.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:888; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ppdscgi.exe access"; flow:to_server,established; content:"/ppdscgi.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,491; reference:nessus,10187;
reference:url,online.securityfocus.com/archive/1/16878; classtype:attempted-recon;
sid:889; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
sendform.cgi access"; flow:to_server,established; content:"/sendform.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,5286; reference:cve,2002-0710;
reference:url,www.scn.org/help/sendform.txt; classtype:attempted-recon; sid:890;
rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
upload.pl access"; flow:to_server,established; content:"/upload.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:891; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
AnyForm2 access"; flow:to_server,established; content:"/AnyForm2";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,719; reference:cve,1999-0066; reference:nessus,10277;
classtype:attempted-recon; sid:892; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP bb-
hist.sh access"; flow:to_server,established; content:"/bb-hist.sh";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,142; reference:cve,1999-1462; reference:nessus,10025;
classtype:attempted-recon; sid:894; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
redirect access"; flow:to_server,established; content:"/redirect";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1179; reference:cve,2000-0382; classtype:attempted-recon;
sid:895; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP way-
board access"; flow:to_server,established; content:"/way-board"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2370;
reference:cve,2001-0214; reference:nessus,10610; classtype:web-application-
activity; sid:896; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
pals-cgi access"; flow:to_server,established; content:"/pals-cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2372; reference:cve,2001-0216; reference:cve,2001-0217;
reference:nessus,10611; classtype:attempted-recon; sid:897; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
commerce.cgi access"; flow:to_server,established; content:"/commerce.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2361; reference:cve,2001-0210; reference:nessus,10612;
classtype:attempted-recon; sid:898; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Amaya templates sendtemp.pl directory traversal attempt";
flow:to_server,established; content:"/sendtemp.pl"; fast_pattern:only; http_uri;
content:"templ="; nocase; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2504; reference:cve,2001-0272; reference:nessus,10614;
classtype:web-application-attack; sid:899; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webspirs.cgi directory traversal attempt"; flow:to_server,established;
content:"/webspirs.cgi"; fast_pattern; nocase; http_uri; content:"../../";
http_raw_uri; metadata:ruleset community, service http; reference:bugtraq,2362;
reference:cve,2001-0211; reference:nessus,10616; classtype:web-application-attack;
sid:900; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webspirs.cgi access"; flow:to_server,established; content:"/webspirs.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2362; reference:cve,2001-0211; reference:nessus,10616;
classtype:attempted-recon; sid:901; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
tstisapi.dll access"; flow:to_server,established; content:"tstisapi.dll";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2381; reference:cve,2001-0302; classtype:attempted-recon;
sid:902; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion cfcache.map access"; flow:to_server,established; content:"/cfcache.map";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,917;
reference:cve,2000-0057; classtype:attempted-recon; sid:903; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion exampleapp application.cfm"; flow:to_server,established;
content:"/cfdocs/exampleapp/email/application.cfm"; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1021;
reference:cve,2000-0189; reference:cve,2001-0535; classtype:attempted-recon;
sid:904; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion application.cfm access"; flow:to_server,established;
content:"/cfdocs/exampleapp/publish/admin/application.cfm"; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1021;
reference:cve,2000-0189; reference:cve,2001-0535; classtype:attempted-recon;
sid:905; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion getfile.cfm access"; flow:to_server,established;
content:"/cfdocs/exampleapp/email/getfile.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,229; reference:cve,1999-0800;
reference:cve,2001-0535; classtype:attempted-recon; sid:906; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion addcontent.cfm access"; flow:to_server,established;
content:"/cfdocs/exampleapp/publish/admin/addcontent.cfm"; fast_pattern; nocase;
http_uri; metadata:ruleset community, service http; reference:cve,2001-0535;
classtype:attempted-recon; sid:907; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion administrator access"; flow:to_server,established;
content:"/cfide/administrator/index.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1314; reference:cve,2000-0538;
reference:nessus,10581; classtype:attempted-recon; sid:908; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion datasource username attempt"; flow:to_server,established;
content:"CF_SETDATASOURCEUSERNAME|28 29|"; fast_pattern:only; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:web-application-attack; sid:909; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion fileexists.cfm access"; flow:to_server,established;
content:"/cfdocs/snippets/fileexists.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:attempted-recon; sid:910; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion exprcalc access"; flow:to_server,established;
content:"/cfdocs/expeval/exprcalc.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,115; reference:bugtraq,550;
reference:cve,1999-0455; reference:cve,1999-0760; classtype:attempted-recon;
sid:911; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion parks access"; flow:to_server,established;
content:"/cfdocs/examples/parks/detail.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:attempted-recon; sid:912; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion cfappman access"; flow:to_server,established;
content:"/cfappman/index.cfm"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,550; reference:cve,1999-0760; classtype:attempted-
recon; sid:913; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion beaninfo access"; flow:to_server,established;
content:"/cfdocs/examples/cvbeans/beaninfo.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:attempted-recon; sid:914; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion evaluate.cfm access"; flow:to_server,established;
content:"/cfdocs/snippets/evaluate.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:attempted-recon; sid:915; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion getodbcdsn access"; flow:to_server,established;
content:"CFUSION_GETODBCDSN|28 29|"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,550; reference:cve,1999-0760; classtype:web-
application-attack; sid:916; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion db connections flush attempt"; flow:to_server,established;
content:"CFUSION_DBCONNECTIONS_FLUSH|28 29|"; fast_pattern:only; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:web-application-attack; sid:917; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion expeval access"; flow:to_server,established; content:"/cfdocs/expeval/";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,550;
reference:cve,1999-0477; reference:cve,1999-0760; classtype:attempted-user;
sid:918; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion datasource passwordattempt"; flow:to_server,established;
content:"CF_SETDATASOURCEPASSWORD|28 29|"; fast_pattern:only; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:web-application-attack; sid:919; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion datasource attempt"; flow:to_server,established;
content:"CF_ISCOLDFUSIONDATASOURCE|28 29|"; fast_pattern:only; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:web-application-attack; sid:920; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion admin encrypt attempt"; flow:to_server,established;
content:"CFUSION_ENCRYPT|28 29|"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,550; reference:cve,1999-0760; classtype:web-
application-attack; sid:921; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion displayfile access"; flow:to_server,established;
content:"/cfdocs/expeval/displayopenedfile.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:web-application-attack; sid:922; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion getodbcin attempt"; flow:to_server,established;
content:"CFUSION_GETODBCINI|28 29|"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,550; reference:cve,1999-0760; classtype:web-
application-attack; sid:923; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion admin decrypt attempt"; flow:to_server,established;
content:"CFUSION_DECRYPT|28 29|"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,550; reference:cve,1999-0760; classtype:web-
application-attack; sid:924; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion mainframeset access"; flow:to_server,established;
content:"/cfdocs/examples/mainframeset.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:attempted-recon; sid:925; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion set odbc ini attempt"; flow:to_server,established;
content:"CFUSION_SETODBCINI|28 29|"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,550; reference:cve,1999-0760; classtype:web-
application-attack; sid:926; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion settings refresh attempt"; flow:to_server,established;
content:"CFUSION_SETTINGS_REFRESH|28 29|"; fast_pattern:only; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:web-application-attack; sid:927; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion exampleapp access"; flow:to_server,established;
content:"/cfdocs/exampleapp/"; nocase; http_uri; metadata:ruleset community,
service http; reference:cve,2001-0535; classtype:attempted-recon; sid:928; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion CFUSION_VERIFYMAIL access"; flow:to_server,established;
content:"CFUSION_VERIFYMAIL|28 29|"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,550; reference:cve,1999-0760; classtype:attempted-
user; sid:929; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion snippets attempt"; flow:to_server,established;
content:"/cfdocs/snippets/"; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,550; reference:cve,1999-0760; classtype:attempted-recon;
sid:930; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion cfmlsyntaxcheck.cfm access"; flow:to_server,established;
content:"/cfdocs/cfmlsyntaxcheck.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:attempted-recon; sid:931; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion application.cfm access"; flow:to_server,established;
content:"/application.cfm"; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,550; reference:cve,1999-0760; reference:cve,2000-0189;
classtype:attempted-recon; sid:932; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion onrequestend.cfm access"; flow:to_server,established;
content:"/onrequestend.cfm"; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,550; reference:cve,1999-0760; reference:cve,2000-0189;
classtype:attempted-recon; sid:933; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion startstop DOS access"; flow:to_server,established;
content:"/cfide/administrator/startstop.html"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,247; reference:cve,1999-0756;
classtype:web-application-attack; sid:935; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion gettempdirectory.cfm access "; flow:to_server,established;
content:"/cfdocs/snippets/gettempdirectory.cfm"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,550; reference:cve,1999-0760;
classtype:attempted-recon; sid:936; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage _vti_rpc access"; flow:to_server,established;
content:"/_vti_rpc"; nocase; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2144; reference:cve,2001-0096; reference:nessus,10585;
classtype:web-application-activity; sid:937; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage posting"; flow:to_server,established; content:"POST";
content:"/author.dll"; fast_pattern; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,2144; reference:cve,2001-0096;
reference:nessus,10585; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS00-100; classtype:web-application-activity; sid:939;
rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage shtml.dll access"; flow:to_server,established;
content:"/_vti_bin/shtml.dll"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,1174; reference:bugtraq,1594;
reference:bugtraq,1595; reference:cve,2000-0413; reference:cve,2000-0746;
reference:nessus,11395; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms00-060; classtype:web-application-activity; sid:940;
rev:28;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage contents.htm access"; flow:to_server,established;
content:"/admcgi/contents.htm"; fast_pattern; nocase; http_uri; metadata:ruleset
community, service http; classtype:web-application-activity; sid:941; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage orders.htm access"; flow:to_server,established;
content:"/_private/orders.htm"; nocase; http_uri; metadata:ruleset community,
service http; classtype:web-application-activity; sid:942; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage fpsrvadm.exe access"; flow:to_server,established;
content:"/fpsrvadm.exe"; nocase; http_uri; metadata:ruleset community, service
http; classtype:web-application-activity; sid:943; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage fpremadm.exe access"; flow:to_server,established;
content:"/fpremadm.exe"; nocase; http_uri; metadata:ruleset community, service
http; classtype:web-application-activity; sid:944; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage fpadmin.htm access"; flow:to_server,established;
content:"/admisapi/fpadmin.htm"; nocase; http_uri; metadata:ruleset community,
service http; classtype:web-application-activity; sid:945; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage fpadmcgi.exe access"; flow:to_server,established;
content:"/scripts/Fpadmcgi.exe"; nocase; http_uri; metadata:ruleset community,
service http; classtype:web-application-activity; sid:946; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage orders.txt access"; flow:to_server,established;
content:"/_private/orders.txt"; nocase; http_uri; metadata:ruleset community,
service http; classtype:web-application-activity; sid:947; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage form_results access"; flow:to_server,established;
content:"/_private/form_results.txt"; nocase; http_uri; metadata:ruleset community,
service http; reference:cve,1999-1052; classtype:web-application-activity; sid:948;
rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage registrations.htm access"; flow:to_server,established;
content:"/_private/registrations.htm"; nocase; http_uri; metadata:ruleset
community, service http; classtype:web-application-activity; sid:949; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage cfgwiz.exe access"; flow:to_server,established;
content:"/cfgwiz.exe"; nocase; http_uri; metadata:ruleset community, service http;
classtype:web-application-activity; sid:950; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage authors.pwd access"; flow:to_server,established;
content:"/authors.pwd"; nocase; http_uri; metadata:ruleset community, service http;
reference:bugtraq,989; reference:cve,1999-0386; reference:nessus,10078;
classtype:web-application-activity; sid:951; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage author.exe access"; flow:to_server,established;
content:"/_vti_bin/_vti_aut/author.exe"; nocase; http_uri; metadata:ruleset
community, service http; classtype:web-application-activity; sid:952; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage administrators.pwd access"; flow:to_server,established;
content:"/administrators.pwd"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,1205; classtype:web-application-activity; sid:953;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage form_results.htm access"; flow:to_server,established;
content:"/_private/form_results.htm"; nocase; http_uri; metadata:ruleset community,
service http; reference:cve,1999-1052; classtype:web-application-activity; sid:954;
rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage access.cnf access"; flow:to_server,established;
content:"/_vti_pvt/access.cnf"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4078; reference:cve,2002-1717;
reference:nessus,10575; classtype:web-application-activity; sid:955; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage register.txt access"; flow:to_server,established;
content:"/_private/register.txt"; nocase; http_uri; metadata:ruleset community,
service http; classtype:web-application-activity; sid:956; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage registrations.txt access"; flow:to_server,established;
content:"/_private/registrations.txt"; nocase; http_uri; metadata:ruleset
community, service http; classtype:web-application-activity; sid:957; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage service.cnf access"; flow:to_server,established;
content:"/_vti_pvt/service.cnf"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4078; reference:cve,2002-1717;
reference:nessus,10575; classtype:web-application-activity; sid:958; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage service.pwd"; flow:to_server,established;
content:"/service.pwd"; nocase; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1205; classtype:web-application-activity; sid:959; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage service.stp access"; flow:to_server,established;
content:"/_vti_pvt/service.stp"; nocase; http_uri; metadata:ruleset community,
service http; classtype:web-application-activity; sid:960; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage services.cnf access"; flow:to_server,established;
content:"/_vti_pvt/services.cnf"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4078; reference:cve,2002-1717;
reference:nessus,10575; classtype:web-application-activity; sid:961; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage shtml.exe access"; flow:to_server,established;
content:"/_vti_bin/shtml.exe"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,1174; reference:bugtraq,1608;
reference:bugtraq,5804; reference:cve,2000-0413; reference:cve,2000-0709;
reference:cve,2002-0692; reference:nessus,10405; reference:nessus,11311;
classtype:web-application-activity; sid:962; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage svcacl.cnf access"; flow:to_server,established;
content:"/_vti_pvt/svcacl.cnf"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4078; reference:cve,2002-1717;
reference:nessus,10575; classtype:web-application-activity; sid:963; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage users.pwd access"; flow:to_server,established;
content:"/users.pwd"; nocase; http_uri; metadata:ruleset community, service http;
classtype:web-application-activity; sid:964; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage writeto.cnf access"; flow:to_server,established;
content:"/_vti_pvt/writeto.cnf"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4078; reference:cve,2002-1717;
reference:nessus,10575; classtype:web-application-activity; sid:965; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage .... request"; flow:to_server,established; content:"..../";
http_uri; metadata:ruleset community, service http; reference:bugtraq,989;
reference:cve,1999-0386; reference:cve,2000-0153; reference:nessus,10142;
classtype:web-application-attack; sid:966; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage dvwssr.dll access"; flow:to_server,established;
content:"/dvwssr.dll"; nocase; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1108; reference:bugtraq,1109; reference:cve,2000-0260;
reference:nessus,10369; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms00-025; classtype:web-application-activity; sid:967;
rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage register.htm access"; flow:to_server,established;
content:"/_private/register.htm"; nocase; http_uri; metadata:ruleset community,
service http; classtype:web-application-activity; sid:968; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS WebDAV
file lock attempt"; flow:to_server,established; content:"LOCK "; depth:5;
metadata:ruleset community, service http; reference:bugtraq,2736;
reference:nessus,10732; classtype:web-application-activity; sid:969; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
ISAPI .printer access"; flow:to_server,established; content:".printer"; nocase;
http_uri; metadata:policy max-detect-ips drop, ruleset community, service http;
reference:bugtraq,2674; reference:cve,2001-0241; reference:nessus,10661;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS01-023;
classtype:web-application-activity; sid:971; rev:28;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS *.idc
attempt"; flow:to_server,established; content:"/*.idc"; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1448;
reference:cve,1999-0874; reference:cve,2000-0661; classtype:web-application-attack;
sid:973; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
Microsoft Windows IIS directory traversal attempt"; flow:to_server,established;
content:"..|5C|.."; fast_pattern:only; metadata:policy max-detect-ips drop, ruleset
community, service http; reference:bugtraq,2218; reference:cve,1999-0229;
classtype:web-application-attack; sid:974; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
Alternate Data streams ASP file access attempt"; flow:to_server,established;
content:".asp|3A 3A 24|DATA"; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,149; reference:cve,1999-0278; reference:nessus,10362;
reference:url,support.microsoft.com/default.aspx?scid=kb\;EN-US\;q188806;
classtype:web-application-attack; sid:975; rev:26;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.bat? access"; flow:to_server,established; content:".bat?"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2023;
reference:bugtraq,4335; reference:cve,1999-0233; reference:cve,2002-0061;
reference:url,support.microsoft.com/support/kb/articles/Q148/1/88.asp;
reference:url,support.microsoft.com/support/kb/articles/Q155/0/56.asp;
classtype:web-application-activity; sid:976; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS .cnf
access"; flow:to_server,established; content:".cnf"; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,4078;
reference:cve,2002-1717; reference:nessus,10575; classtype:web-application-
activity; sid:977; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS ASP
contents view"; flow:to_server,established; content:"%20";
content:"&CiRestriction=none"; nocase; content:"&CiHiliteType=Full";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,1084; reference:cve,2000-0302; reference:nessus,10356;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS00-006;
classtype:web-application-attack; sid:978; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS ASP
contents view"; flow:to_server,established; content:".htw?CiWebHitsFile";
fast_pattern; nocase; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1861; reference:cve,2000-0942;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS00-006;
classtype:web-application-attack; sid:979; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
CGImail.exe access"; flow:to_server,established; content:"/scripts/CGImail.exe";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,1623;
reference:cve,2000-0726; reference:nessus,11721; classtype:web-application-
activity; sid:980; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS JET VBA
access"; flow:to_server,established; content:"/scripts/samples/ctguestb.idc";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,307;
reference:cve,1999-0874; reference:nessus,10116; classtype:web-application-
activity; sid:984; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS JET VBA
access"; flow:to_server,established; content:"/scripts/samples/details.idc";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,286;
reference:cve,1999-0874; classtype:web-application-activity; sid:985; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS MSProxy
access"; flow:to_server,established; content:"/scripts/proxy/w3proxy.dll"; nocase;
http_uri; metadata:ruleset community, service http;
reference:url,support.microsoft.com/?kbid=331066; classtype:web-application-
activity; sid:986; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"FILE-IDENTIFY .htr
access file download request"; flow:to_server,established; content:".htr";
fast_pattern:only; http_uri; pcre:"/\x2ehtr([\?\x5c\x2f]|$)/smiU"; metadata:ruleset
community, service http; reference:bugtraq,1488; reference:cve,2000-0630;
reference:cve,2001-0004; reference:nessus,10680;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms01-004;
classtype:misc-activity; sid:987; rev:31;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"MALWARE-CNC
sensepost.exe command shell"; flow:to_server,established; content:"/sensepost.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,11003; classtype:web-application-activity; sid:989; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage _vti_inf.html access"; flow:to_server,established;
content:"/_vti_inf.html"; nocase; http_uri; metadata:ruleset community, service
http; reference:nessus,11455; classtype:web-application-activity; sid:990; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
achg.htr access"; flow:to_server,established; content:"/iisadmpwd/achg.htr";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,2110;
reference:cve,1999-0407; classtype:web-application-activity; sid:991; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
adctest.asp access"; flow:to_server,established;
content:"/msadc/samples/adctest.asp"; nocase; http_uri; metadata:ruleset community,
service http; classtype:web-application-activity; sid:992; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
iisadmin access"; flow:to_server,established; content:"/iisadmin"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,189;
reference:cve,1999-1538; reference:nessus,11032; classtype:web-application-attack;
sid:993; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
/scripts/iisadmin/default.htm access"; flow:to_server,established;
content:"/scripts/iisadmin/default.htm"; nocase; http_uri; metadata:ruleset
community, service http; classtype:web-application-attack; sid:994; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS ism.dll
access"; flow:to_server,established; content:"/scripts/iisadmin/ism.dll?http/dir";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,189;
reference:cve,1999-1538; reference:cve,2000-0630; classtype:web-application-attack;
sid:995; rev:26;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
anot.htr access"; flow:to_server,established; content:"/iisadmpwd/anot"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2110;
reference:cve,1999-0407; classtype:web-application-activity; sid:996; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS asp-dot
attempt"; flow:to_server,established; content:".asp."; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1814;
reference:nessus,10363; classtype:web-application-attack; sid:997; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS asp-
srch attempt"; flow:to_server,established; content:"|23|filename=*.asp"; nocase;
http_uri; metadata:ruleset community, service http; classtype:web-application-
attack; sid:998; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS bdir
access"; flow:to_server,established; content:"/scripts/iisadmin/bdir.htr"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2280;
classtype:web-application-activity; sid:999; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
bdir.htr access"; flow:to_server,established; content:"/bdir.htr"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2280;
reference:nessus,10577; classtype:web-application-activity; sid:1000; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
carbo.dll access"; flow:to_server,established; content:"/carbo.dll"; http_uri;
content:"icatcommand="; nocase; metadata:ruleset community, service http;
reference:bugtraq,2126; reference:cve,1999-1069; classtype:attempted-recon;
sid:1001; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS cmd.exe
access"; flow:to_server,established; content:"cmd.exe"; nocase; http_uri;
metadata:ruleset community, service http; classtype:web-application-attack;
sid:1002; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS cmd?
access"; flow:to_server,established; content:".cmd?&"; fast_pattern:only;
metadata:ruleset community, service http; classtype:web-application-attack;
sid:1003; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
codebrowser Exair access"; flow:to_server,established;
content:"/iissamples/exair/howitworks/codebrws.asp"; nocase; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0499;
reference:cve,1999-0815; classtype:web-application-activity; sid:1004; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
codebrowser SDK access"; flow:to_server,established;
content:"/iissamples/sdk/asp/docs/codebrws.asp"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,167; reference:cve,1999-0736;
classtype:web-application-activity; sid:1005; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
Form_JScript.asp access"; flow:to_server,established; content:"/Form_JScript.asp";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,1594;
reference:bugtraq,1595; reference:cve,2000-0746; reference:cve,2000-1104;
reference:nessus,10572; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS00-028; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS00-060; classtype:web-application-attack; sid:1007; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS del
attempt"; flow:to_server,established; content:"&del+/s+c|3A 5C|*.*";
fast_pattern:only; metadata:ruleset community, service http; classtype:web-
application-attack; sid:1008; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
directory listing"; flow:to_server,established;
content:"/ServerVariables_Jscript.asp"; nocase; http_uri; metadata:ruleset
community, service http; reference:nessus,10573; classtype:web-application-attack;
sid:1009; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
encoding access"; flow:to_server,established; content:"%1u"; fast_pattern:only;
metadata:ruleset community, service http; reference:bugtraq,886;
reference:cve,2000-0024; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS99-061; classtype:web-application-activity; sid:1010;
rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS exec-
src access"; flow:to_server,established; content:"|23|filename=*.exe";
fast_pattern:only; metadata:ruleset community, service http; classtype:web-
application-activity; sid:1011; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS fpcount
attempt"; flow:to_server,established; content:"/fpcount.exe"; fast_pattern; nocase;
http_uri; content:"Digits="; nocase; metadata:ruleset community, service http;
reference:bugtraq,2252; reference:cve,1999-1376; classtype:web-application-attack;
sid:1012; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS fpcount
access"; flow:to_server,established; content:"/fpcount.exe"; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,2252;
reference:cve,1999-1376; classtype:web-application-activity; sid:1013; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
getdrvs.exe access"; flow:to_server,established;
content:"/scripts/tools/getdrvs.exe"; nocase; http_uri; metadata:ruleset community,
service http; classtype:web-application-activity; sid:1015; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
global.asa access"; flow:to_server,established; content:"/global.asa"; nocase;
http_uri; metadata:ruleset community, service http; reference:cve,2000-0778;
reference:cve,2001-0004; reference:nessus,10491; reference:nessus,10991;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms01-004;
classtype:web-application-activity; sid:1016; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS idc-
srch attempt"; flow:to_server,established; content:"|23|filename=*.idc";
fast_pattern:only; metadata:ruleset community, service http; reference:cve,1999-
0874; classtype:web-application-attack; sid:1017; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
iisadmpwd attempt"; flow:to_server,established; content:"/iisadmpwd/aexp"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2110;
reference:cve,1999-0407; reference:nessus,10371; classtype:web-application-attack;
sid:1018; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
Malformed Hit-Highlighting Argument File Access Attempt";
flow:to_server,established; content:"CiWebHitsFile="; nocase; http_uri;
pcre:"/CiWebHitsFile=\/?([^\r\n\x3b\&]*\.\.\/)?/i"; content:"CiRestriction=none";
fast_pattern; nocase; http_uri; content:"ciHiliteType=Full"; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,950;
reference:cve,2000-0097; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms00-006; reference:url,www.securityfocus.com/archive/1/43762;
classtype:web-application-attack; sid:1019; rev:30;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
isc$data attempt"; flow:to_server,established; content:".idc|3A 3A 24|data";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,307;
reference:cve,1999-0874; reference:nessus,10116; classtype:web-application-attack;
sid:1020; rev:26;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS ism.dll
attempt"; flow:to_server,established; content:" .htr"; nocase; http_uri;
pcre:"/\s{230,}\.htr/U"; metadata:ruleset community, service http;
reference:bugtraq,1193; reference:cve,2000-0457; reference:nessus,10680;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS00-031;
classtype:web-application-attack; sid:1021; rev:29;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS jet vba
access"; flow:to_server,established;
content:"/advworks/equipment/catalog_type.asp"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,286; reference:cve,1999-0874;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms99-030;
classtype:web-application-activity; sid:1022; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
msadcs.dll access"; flow:to_server,established; content:"/msadcs.dll"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,529;
reference:cve,1999-1011; reference:nessus,10357;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms99-025;
classtype:web-application-activity; sid:1023; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
newdsn.exe access"; flow:to_server,established;
content:"/scripts/tools/newdsn.exe"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,1818; reference:cve,1999-0191;
reference:nessus,10360; classtype:web-application-activity; sid:1024; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS perl
access"; flow:to_server,established; content:"/scripts/perl"; nocase; http_uri;
metadata:ruleset community, service http; classtype:web-application-activity;
sid:1025; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS perl-
browse newline attempt"; flow:to_server,established; content:"|0A|.pl"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,6833;
reference:cve,2003-1365; classtype:web-application-attack; sid:1026; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS perl-
browse space attempt"; flow:to_server,established; content:" .pl"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,6833;
reference:cve,2003-1365; classtype:web-application-attack; sid:1027; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
query.asp access"; flow:to_server,established; content:"/issamples/query.asp";
nocase; http_uri; metadata:policy max-detect-ips drop, ruleset community, service
http; reference:bugtraq,193; reference:cve,1999-0449; classtype:web-application-
activity; sid:1028; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
scripts-browse access"; flow:to_server,established; content:"/scripts/ ";
fast_pattern:only; metadata:ruleset community, service http;
reference:nessus,11032; classtype:web-application-attack; sid:1029; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
search97.vts access"; flow:to_server,established; content:"/search97.vts";
http_uri; metadata:ruleset community, service http; reference:bugtraq,162;
classtype:web-application-activity; sid:1030; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
/SiteServer/Publishing/viewcode.asp access"; flow:to_server,established;
content:"/SiteServer/Publishing/viewcode.asp"; nocase; http_uri; metadata:ruleset
community, service http; reference:nessus,10576; classtype:web-application-
activity; sid:1031; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
showcode access"; flow:to_server,established;
content:"/Sites/Knowledge/Membership/Inspired/ViewCode.asp"; nocase; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0737;
reference:nessus,10576; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms99-013; classtype:web-application-activity; sid:1032;
rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
viewcode access"; flow:to_server,established;
content:"/Sites/Knowledge/Membership/Inspiredtutorial/ViewCode.asp"; nocase;
http_uri; metadata:ruleset community, service http; reference:cve,1999-0737;
reference:nessus,10576; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms99-013; classtype:web-application-activity; sid:1033;
rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
viewcode access"; flow:to_server,established;
content:"/Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp";
nocase; http_uri; metadata:ruleset community, service http; reference:cve,1999-
0737; reference:nessus,10576; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms99-013; classtype:web-application-activity; sid:1034;
rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
viewcode access"; flow:to_server,established;
content:"/Sites/Samples/Knowledge/Push/ViewCode.asp"; nocase; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0737;
reference:nessus,10576; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms99-013; classtype:web-application-activity; sid:1035;
rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
viewcode access"; flow:to_server,established;
content:"/Sites/Samples/Knowledge/Search/ViewCode.asp"; nocase; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0737;
reference:nessus,10576; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms99-013; classtype:web-application-activity; sid:1036;
rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
showcode.asp access"; flow:to_server,established; content:"/showcode.asp"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,167;
reference:cve,1999-0736; reference:nessus,10007;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS99-013;
classtype:web-application-activity; sid:1037; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS site
server config access"; flow:to_server,established;
content:"/adsamples/config/site.csc"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,256; reference:cve,1999-1520; classtype:web-
application-activity; sid:1038; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
srch.htm access"; flow:to_server,established; content:"/samples/isapi/srch.htm";
nocase; http_uri; metadata:ruleset community, service http; classtype:web-
application-activity; sid:1039; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS srchadm
access"; flow:to_server,established; content:"/srchadm"; nocase; http_uri;
metadata:ruleset community, service http; reference:nessus,11032; classtype:web-
application-activity; sid:1040; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
uploadn.asp access"; flow:to_server,established; content:"/scripts/uploadn.asp";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,1811;
reference:cve,1999-0360; classtype:web-application-activity; sid:1041; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS view
source via translate header"; flow:to_server,established; content:"Translate|3A|
F"; fast_pattern:only; metadata:policy max-detect-ips drop, ruleset community,
service http; reference:bugtraq,14764; reference:bugtraq,1578; reference:cve,2000-
0778; reference:nessus,10491; classtype:web-application-activity; sid:1042;
rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
viewcode.asp access"; flow:to_server,established; content:"/viewcode.asp"; nocase;
http_uri; metadata:ruleset community, service http; reference:cve,1999-0737;
reference:nessus,10576; classtype:web-application-activity; sid:1043; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS webhits
access"; flow:to_server,established; content:".htw"; http_uri; metadata:ruleset
community, service http; reference:bugtraq,950; reference:cve,2000-0097;
classtype:web-application-activity; sid:1044; rev:17;)
# alert tcp $HTTP_SERVERS $HTTP_PORTS -> $EXTERNAL_NET any (msg:"SERVER-IIS
Unauthorized IP Access Attempt"; flow:to_client,established; content:"403";
content:"Forbidden|3A|"; metadata:ruleset community, service http; classtype:web-
application-attack; sid:1045; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
site/iisamples access"; flow:to_server,established; content:"/site/iisamples";
nocase; http_uri; metadata:ruleset community, service http; reference:nessus,10370;
classtype:web-application-activity; sid:1046; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise DOS"; flow:to_server,established; content:"REVLOG / "; depth:9;
metadata:ruleset community, service http; reference:bugtraq,2294;
reference:cve,2001-0251; classtype:web-application-attack; sid:1047; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise directory listing attempt"; flow:to_server,established;
content:"INDEX "; depth:6; metadata:ruleset community, service http;
reference:bugtraq,2285; reference:cve,2001-0250; reference:nessus,10691;
classtype:web-application-attack; sid:1048; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
iPlanet GETPROPERTIES attempt"; flow:to_server,established;
content:"GETPROPERTIES"; depth:13; metadata:ruleset community, service http;
reference:bugtraq,2732; reference:cve,2001-0746; classtype:web-application-attack;
sid:1050; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"FILE-OTHER
technote main.cgi file directory traversal attempt"; flow:to_server,established;
content:"/technote/main.cgi"; fast_pattern; nocase; http_uri; content:"filename=";
nocase; content:"../../"; metadata:ruleset community, service http;
reference:bugtraq,2156; reference:cve,2001-0075; reference:nessus,10584;
classtype:web-application-attack; sid:1051; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
technote print.cgi directory traversal attempt"; flow:to_server,established;
content:"/technote/print.cgi"; fast_pattern; nocase; http_uri; content:"board=";
nocase; content:"../../"; http_raw_uri; content:"%00"; http_raw_uri;
metadata:ruleset community, service http; reference:bugtraq,2156;
reference:cve,2001-0075; reference:nessus,10584; classtype:web-application-attack;
sid:1052; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ads.cgi command execution attempt"; flow:to_server,established; content:"/ads.cgi";
fast_pattern; nocase; http_uri; content:"file="; nocase; content:"../../";
http_raw_uri; content:"|7C|"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2103; reference:cve,2001-0025; reference:nessus,11464;
classtype:web-application-attack; sid:1053; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
weblogic/tomcat .jsp view source attempt"; flow:to_server,established;
content:".jsp"; nocase; http_uri; pcre:!"/^\w+\s+[^\n\s\?]*\.jsp/smi";
metadata:ruleset community, service http; reference:bugtraq,2527; classtype:web-
application-attack; sid:1054; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-APACHE
Apache Tomcat view source attempt"; flow:to_server,established; content:"%252ejsp";
http_uri; metadata:ruleset community, service http; reference:bugtraq,2527;
reference:cve,2001-0590; classtype:web-application-attack; sid:1056; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SQL ftp attempt";
flow:to_server,established; content:"ftp.exe"; fast_pattern:only; metadata:ruleset
community, service http; classtype:web-application-activity; sid:1057; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SQL xp_enumdsn
attempt"; flow:to_server,established; content:"xp_enumdsn"; fast_pattern:only;
metadata:ruleset community, service http; classtype:web-application-attack;
sid:1058; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SQL xp_filelist
attempt"; flow:to_server,established; content:"xp_filelist"; fast_pattern:only;
metadata:ruleset community, service http; classtype:web-application-attack;
sid:1059; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SQL
xp_availablemedia attempt"; flow:to_server,established;
content:"xp_availablemedia"; fast_pattern:only; metadata:ruleset community, service
http; classtype:web-application-attack; sid:1060; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SQL xp_cmdshell
attempt"; flow:to_server,established; content:"xp_cmdshell"; fast_pattern:only;
metadata:ruleset community, service http; reference:bugtraq,5309; classtype:web-
application-attack; sid:1061; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
nc.exe attempt"; flow:to_server,established; content:"nc.exe"; fast_pattern:only;
metadata:ruleset community, service http; classtype:web-application-activity;
sid:1062; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP wsh
attempt"; flow:to_server,established; content:"wsh.exe"; fast_pattern:only;
metadata:ruleset community, service http; classtype:web-application-activity;
sid:1064; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP rcmd
attempt"; flow:to_server,established; content:"rcmd.exe"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:web-application-
activity; sid:1065; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
telnet attempt"; flow:to_server,established; content:"telnet.exe";
fast_pattern:only; metadata:ruleset community, service http; classtype:web-
application-activity; sid:1066; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP net
attempt"; flow:to_server,established; content:"net.exe"; fast_pattern:only;
metadata:ruleset community, service http; classtype:web-application-activity;
sid:1067; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP tftp
attempt"; flow:to_server,established; content:"tftp.exe"; fast_pattern:only;
metadata:ruleset community, service http; classtype:web-application-activity;
sid:1068; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SQL xp_regread
attempt"; flow:to_server,established; content:"xp_regread"; fast_pattern:only;
metadata:ruleset community, service http; classtype:web-application-activity;
sid:1069; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
WebDAV search access"; flow:to_server,established; content:"SEARCH "; depth:8;
nocase; metadata:ruleset community, service http; reference:bugtraq,1756;
reference:cve,2000-0951; classtype:web-application-activity; sid:1070; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.htpasswd access"; flow:to_server,established; content:".htpasswd";
fast_pattern:only; metadata:ruleset community, service http; classtype:web-
application-attack; sid:1071; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Lotus Domino directory traversal"; flow:to_server,established; content:".nsf/";
http_uri; content:"../"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,2173; reference:cve,2001-0009;
reference:nessus,12248; classtype:web-application-attack; sid:1072; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webhits.exe access"; flow:to_server,established;
content:"/scripts/samples/search/webhits.exe"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,950;
reference:cve,2000-0097; classtype:web-application-activity; sid:1073; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
postinfo.asp access"; flow:to_server,established; content:"/scripts/postinfo.asp";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,1811;
reference:cve,1999-0360; classtype:web-application-activity; sid:1075; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
repost.asp access"; flow:to_server,established; content:"/scripts/repost.asp";
nocase; http_uri; metadata:ruleset community, service http; reference:nessus,10372;
classtype:web-application-activity; sid:1076; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SQL queryhit.htm
access"; flow:to_server,established; content:"/samples/search/queryhit.htm";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10370; classtype:web-application-activity; sid:1077; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SQL counter.exe
access"; flow:to_server,established; content:"/counter.exe"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,267;
reference:cve,1999-1030; classtype:web-application-activity; sid:1078; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"OS-WINDOWS
Microsoft Windows WebDAV propfind access"; flow:to_server,established;
content:"propfind"; nocase; pcre:"/<a\x3a\s*propfind.*?xmlns\x3a\s*a=[\x21\x22]?
DAV[\x21\x22]?/iR"; metadata:ruleset community, service http;
reference:bugtraq,1656; reference:cve,2000-0869; reference:cve,2003-0718;
reference:nessus,10505; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS04-030; classtype:web-application-activity; sid:1079;
rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
unify eWave ServletExec upload"; flow:to_server,established;
content:"/servlet/com.unify.servletexec.UploadServlet"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,1868;
reference:bugtraq,1876; reference:cve,2000-1024; reference:cve,2000-1025;
reference:nessus,10570; classtype:web-application-attack; sid:1080; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Servers suite DOS"; flow:to_server,established; content:"/dsgw/bin/search?
context="; fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1868; reference:cve,2000-1025; classtype:web-application-attack;
sid:1081; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
amazon 1-click cookie theft"; flow:to_server,established; content:"ref%3Cscript
%20language%3D%22Javascript"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,1194; reference:cve,2000-0439; classtype:web-
application-attack; sid:1082; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
unify eWave ServletExec DOS"; flow:to_server,established;
content:"/servlet/ServletExec"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1868; reference:cve,2000-1025;
classtype:web-application-activity; sid:1083; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Allaire JRUN DOS attempt"; flow:to_server,established; content:"servlet/.......";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2337; reference:cve,2000-1049; classtype:web-application-attack;
sid:1084; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
strings overflow"; flow:to_server,established; content:"|BA|I|FE FF FF F7 D2 B9 BF
FF FF FF F7 D1|"; metadata:ruleset community, service http; reference:bugtraq,802;
classtype:web-application-attack; sid:1085; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
strings overflow"; flow:to_server,established; content:"?STRENGUR";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1786; reference:cve,2000-0967; classtype:web-application-attack;
sid:1086; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
eXtropia webstore directory traversal"; flow:to_server,established;
content:"/web_store.cgi"; http_uri; content:"page=../"; metadata:ruleset community,
service http; reference:bugtraq,1774; reference:cve,2000-1005;
reference:nessus,10532; classtype:web-application-attack; sid:1088; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
shopping cart directory traversal"; flow:to_server,established;
content:"/shop.cgi"; http_uri; content:"page=../"; metadata:ruleset community,
service http; reference:bugtraq,1777; reference:cve,2000-0921; classtype:web-
application-attack; sid:1089; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Allaire Pro Web Shell attempt"; flow:to_server,established;
content:"/authenticate.cgi?PASSWORD"; fast_pattern; nocase; http_uri;
content:"config.ini"; metadata:ruleset community, service http; classtype:web-
application-attack; sid:1090; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP ICQ
Webfront HTTP DOS"; flow:to_server,established; content:"??????????";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1463; reference:cve,2000-1078; classtype:web-application-attack;
sid:1091; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Armada Style Master Index directory traversal"; flow:to_server,established;
content:"/search.cgi?"; nocase; http_uri; content:"keys"; distance:0; nocase;
http_uri; content:"catigory=../"; nocase; metadata:ruleset community, service http;
reference:bugtraq,1772; reference:cve,2000-0924; reference:nessus,10562;
reference:url,www.synnergy.net/downloads/advisories/SLA-2000-16.masterindex.txt;
classtype:web-application-attack; sid:1092; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cached_feed.cgi moreover shopping cart directory traversal";
flow:to_server,established; content:"/cached_feed.cgi"; http_uri; content:"../";
http_raw_uri; metadata:ruleset community, service http; reference:bugtraq,1762;
reference:cve,2000-0906; classtype:web-application-attack; sid:1093; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Talentsoft Web+ Source Code view access"; flow:to_server,established;
content:"/webplus.exe?"; nocase; http_uri; content:"script=test.wml"; distance:0;
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,1722;
reference:url,archives.neohapsis.com/archives/ntbugtraq/2000-q3/0168.html;
classtype:web-application-attack; sid:1095; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Talentsoft Web+ internal IP Address access"; flow:to_server,established;
content:"/webplus.exe?"; nocase; http_uri; content:"about"; distance:0; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,1720;
reference:url,archives.neohapsis.com/archives/ntbugtraq/2000-q3/0168.html;
classtype:web-application-activity; sid:1096; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Talentsoft Web+ exploit attempt"; flow:to_server,established;
content:"/webplus.cgi?"; nocase; http_uri;
content:"Script=/webplus/webping/webping.wml"; distance:0; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1725; classtype:web-
application-attack; sid:1097; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
SmartWin CyberOffice Shopping Cart access"; flow:to_server,established;
content:"_private/shopping_cart.mdb"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1734; reference:cve,2000-0925;
classtype:web-application-attack; sid:1098; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cybercop scan"; flow:to_server,established; content:"/cybercop"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:web-application-
activity; sid:1099; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"INDICATOR-SCAN
L3retriever HTTP Probe"; flow:to_server,established; content:"User-Agent|3A|
Java1.2.1|0D 0A|"; http_header; metadata:ruleset community, service http;
classtype:web-application-activity; sid:1100; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"INDICATOR-SCAN
Webtrends HTTP probe"; flow:to_server,established; content:"User-Agent|3A|
Webtrends Security Analyzer|0D 0A|"; http_header; metadata:ruleset community,
service http; classtype:web-application-activity; sid:1101; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
nessus 1.X 404 probe"; flow:to_server,established;
content:"/nessus_is_probing_you_"; depth:32; http_uri; metadata:ruleset community,
service http; classtype:web-application-attack; sid:1102; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape admin passwd"; flow:to_server,established; content:"/admin-
serv/config/admpw"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,1579; reference:nessus,10468; classtype:web-
application-attack; sid:1103; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
BigBrother access"; flow:to_server,established; content:"/bb-hostsvc.sh?"; nocase;
http_uri; content:"HOSTSVC"; distance:0; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1455; reference:cve,2000-0638;
reference:nessus,10460; classtype:attempted-recon; sid:1105; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Poll-it access"; flow:to_server,established;
content:"/pollit/Poll_It_SSI_v2.0.cgi"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1431;
reference:cve,2000-0590; reference:nessus,10459; classtype:web-application-
activity; sid:1106; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ftp.pl access"; flow:to_server,established; content:"/ftp.pl"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,1471;
reference:cve,2000-0674; reference:nessus,10467; classtype:web-application-
activity; sid:1107; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-APACHE
Apache Tomcat server snoop access"; flow:to_server,established;
content:"/jsp/snp/"; http_uri; content:".snp"; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1532; reference:cve,2000-0760;
reference:nessus,10478; classtype:attempted-recon; sid:1108; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ROXEN directory list attempt"; flow:to_server,established; content:"/%00";
http_uri; metadata:ruleset community, service http; reference:bugtraq,1510;
reference:cve,2000-0671; reference:nessus,10479; classtype:attempted-recon;
sid:1109; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
apache source.asp file access"; flow:to_server,established;
content:"/site/eg/source.asp"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1457; reference:cve,2000-0628;
reference:nessus,10480; classtype:attempted-recon; sid:1110; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-APACHE
Apache Tomcat server exploit access"; flow:to_server,established;
content:"/contextAdmin/contextAdmin.html"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1548; reference:cve,2000-0672;
reference:nessus,10477; classtype:attempted-recon; sid:1111; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP ICQ
webserver DOS"; flow:to_server,established; content:".html/......";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-0474; reference:url,www.securiteam.com/exploits/2ZUQ1QAQOG.html;
classtype:attempted-dos; sid:1115; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Lotus DelDoc attempt"; flow:to_server,established; content:"?DeleteDocument";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:1116; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Lotus EditDoc attempt"; flow:to_server,established; content:"?EditDocument";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:url,www.securiteam.com/exploits/5NP080A1RE.html; classtype:attempted-
recon; sid:1117; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP ls
20-l"; flow:to_server,established; content:"ls%20-l"; nocase; metadata:ruleset
community, service http; classtype:attempted-recon; sid:1118; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
mlog.phtml access"; flow:to_server,established; content:"/mlog.phtml";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,713; reference:cve,1999-0068; reference:cve,1999-0346;
classtype:attempted-recon; sid:1119; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
mylog.phtml access"; flow:to_server,established; content:"/mylog.phtml";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,713; reference:cve,1999-0068; reference:cve,1999-0346;
classtype:attempted-recon; sid:1120; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/etc/passwd file access attempt"; flow:to_server,established;
content:"/etc/passwd"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:1122; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP ?
PageServices access"; flow:to_server,established; content:"?PageServices";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1063; reference:bugtraq,7621; reference:cve,1999-0269;
classtype:attempted-recon; sid:1123; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Ecommerce check.txt access"; flow:to_server,established;
content:"/config/check.txt"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; classtype:attempted-recon; sid:1124; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webcart access"; flow:to_server,established; content:"/webcart/";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-0610; reference:nessus,10298; classtype:attempted-recon;
sid:1125; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
AuthChangeUrl access"; flow:to_server,established; content:"_AuthChangeUrl?";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2110; reference:cve,1999-0407; classtype:attempted-recon;
sid:1126; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
convert.bas access"; flow:to_server,established; content:"/scripts/convert.bas";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2025; reference:cve,1999-0175; classtype:attempted-recon;
sid:1127; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cpshost.dll access"; flow:to_server,established; content:"/scripts/cpshost.dll";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1811; reference:bugtraq,4002; reference:cve,1999-0360;
classtype:attempted-recon; sid:1128; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.htaccess access"; flow:to_server,established; content:".htaccess";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:1129; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.wwwacl access"; flow:to_server,established; content:".wwwacl"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:attempted-recon;
sid:1130; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.wwwacl access"; flow:to_server,established; content:".www_acl"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:attempted-recon;
sid:1131; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 457 (msg:"SERVER-WEBAPP Netscape
Unixware overflow"; flow:to_server,established; content:"|EB|_|9A FF FF FF FF 07 FF
C3|^1|C0 89|F|9D|"; metadata:ruleset community; reference:bugtraq,908;
reference:cve,1999-0744; classtype:attempted-recon; sid:1132; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"INDICATOR-SCAN
cybercop os probe"; flow:stateless; ack:0; flags:SFP; content:"AAAAAAAAAAAAAAAA";
depth:16; metadata:ruleset community, service http; classtype:attempted-recon;
sid:1133; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Phorum admin access"; flow:to_server,established; content:"/admin.php3";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2271; reference:cve,2000-1228; classtype:attempted-recon;
sid:1134; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cd.."; flow:to_server,established; content:"cd.."; nocase; metadata:ruleset
community, service http; classtype:attempted-recon; sid:1136; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Phorum authentication access"; flow:to_server,established;
content:"PHP_AUTH_USER=boogieman"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,2274; reference:cve,2000-1230; classtype:attempted-
recon; sid:1137; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
whisker HEAD/./"; flow:to_server,established; content:"HEAD/./"; metadata:ruleset
community, service http;
reference:url,www.wiretrip.net/rfp/pages/whitepapers/whiskerids.html;
classtype:attempted-recon; sid:1139; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
guestbook.pl access"; flow:to_server,established; content:"/guestbook.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,776; reference:cve,1999-0237; reference:cve,1999-1053;
reference:nessus,10099; classtype:attempted-recon; sid:1140; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
handler access"; flow:to_server,established; content:"/handler"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,380;
reference:cve,1999-0148; reference:nessus,10100; classtype:web-application-
activity; sid:1141; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-
WEBAPP /.... access"; flow:to_server,established; content:"/...."; metadata:ruleset
community, service http; classtype:attempted-recon; sid:1142; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP root
access"; flow:to_server,established; content:"/~root"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; classtype:attempted-recon; sid:1145;
rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Ecommerce import.txt access"; flow:to_server,established;
content:"/config/import.txt"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; classtype:attempted-recon; sid:1146; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP cat_
access"; flow:to_server,established; content:"cat "; fast_pattern:only; http_uri;
metadata:policy max-detect-ips drop, ruleset community, service http;
reference:bugtraq,374; reference:cve,1999-0039; classtype:attempted-recon;
sid:1147; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Ecommerce import.txt access"; flow:to_server,established;
content:"/orders/import.txt"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; classtype:attempted-recon; sid:1148; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
count.cgi access"; flow:to_server,established; content:"/count.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,128; reference:cve,1999-0021; reference:nessus,10049;
classtype:web-application-activity; sid:1149; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino catalog.nsf access"; flow:to_server,established; content:"/catalog.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1150; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino domcfg.nsf access"; flow:to_server,established; content:"/domcfg.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1151; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino domlog.nsf access"; flow:to_server,established; content:"/domlog.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1152; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino log.nsf access"; flow:to_server,established; content:"/log.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1153; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino names.nsf access"; flow:to_server,established; content:"/names.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1154; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Ecommerce checks.txt access"; flow:to_server,established;
content:"/orders/checks.txt"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,2281; classtype:attempted-recon;
sid:1155; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP apache
directory disclosure attempt"; flow:to_server,established; content:"////////";
fast_pattern:only; content:"////////"; http_raw_uri; metadata:ruleset community,
service http; reference:bugtraq,2503; reference:cve,2001-0925; classtype:attempted-
dos; sid:1156; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape PublishingXpert access"; flow:to_server,established;
content:"/PSUser/PSCOErrPage.htm"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:cve,2000-1196; reference:nessus,10364;
classtype:web-application-activity; sid:1157; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
windmail.exe access"; flow:to_server,established; content:"/windmail.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1073; reference:cve,2000-0242; reference:nessus,10365;
classtype:attempted-recon; sid:1158; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webplus access"; flow:to_server,established; content:"/webplus?script";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1174; reference:bugtraq,1720; reference:bugtraq,1722;
reference:bugtraq,1725; reference:cve,2000-1005; classtype:attempted-recon;
sid:1159; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape dir index wp"; flow:to_server,established; content:"?wp-";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1063; reference:cve,2000-0236; reference:nessus,10352;
classtype:attempted-recon; sid:1160; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
piranha passwd.php3 access"; flow:to_server,established; content:"/passwd.php3";
http_uri; metadata:ruleset community, service http; reference:bugtraq,1149;
reference:cve,2000-0322; classtype:attempted-recon; sid:1161; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP cart
32 AdminPwd access"; flow:to_server,established;
content:"/c32web.exe/ChangeAdminPassword"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1153;
reference:cve,2000-0429; classtype:attempted-recon; sid:1162; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webdist.cgi access"; flow:to_server,established; content:"/webdist.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,374; reference:cve,1999-0039; reference:nessus,10299;
classtype:web-application-activity; sid:1163; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
shopping cart access"; flow:to_server,established; content:"/quikstore.cfg";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1983; reference:bugtraq,2049; reference:cve,1999-0607;
reference:cve,2000-1188; classtype:attempted-recon; sid:1164; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Novell Groupwise gwweb.exe access"; flow:to_server,established;
content:"/GWWEB.EXE"; nocase; metadata:ruleset community, service http;
reference:bugtraq,879; reference:cve,1999-1005; reference:cve,1999-1006;
reference:nessus,10877; classtype:attempted-recon; sid:1165; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ws_ftp.ini access"; flow:to_server,established; content:"/ws_ftp.ini";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,547; reference:cve,1999-1078; classtype:attempted-recon;
sid:1166; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
rpm_query access"; flow:to_server,established; content:"/rpm_query";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1036; reference:cve,2000-0192; reference:nessus,10340;
classtype:attempted-recon; sid:1167; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP mall
log order access"; flow:to_server,established; content:"/mall_log_files/order.log";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2266; reference:cve,1999-0606; classtype:attempted-recon;
sid:1168; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
bigconf.cgi access"; flow:to_server,established; content:"/bigconf.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,778; reference:cve,1999-1550; reference:nessus,10027;
classtype:web-application-activity; sid:1172; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
architext_query.pl access"; flow:to_server,established;
content:"/ews/architext_query.pl"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,2248; reference:cve,1999-0279;
reference:nessus,10064;
reference:url,www2.fedcirc.gov/alerts/advisories/1998/txt/fedcirc.98.03.txt;
classtype:attempted-recon; sid:1173; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/cgi-bin/jj access"; flow:to_server,established; content:"/cgi-bin/jj";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2002; reference:cve,1999-0260; reference:nessus,10131;
classtype:web-application-activity; sid:1174; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
wwwboard.pl access"; flow:to_server,established; content:"/wwwboard.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1795; reference:bugtraq,649; reference:cve,1999-0930;
reference:cve,1999-0954; classtype:attempted-recon; sid:1175; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise Server directory view"; flow:to_server,established; content:"?
wp-verify-link"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:bugtraq,1063; reference:cve,2000-0236; classtype:attempted-recon;
sid:1177; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Phorum read access"; flow:to_server,established; content:"/read.php3";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:1178; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Phorum violation access"; flow:to_server,established; content:"/violation.php3";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2272; reference:cve,2000-1234; classtype:attempted-recon;
sid:1179; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
get32.exe access"; flow:to_server,established; content:"/get32.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1485; reference:bugtraq,770; reference:cve,1999-0885;
reference:nessus,10011; classtype:attempted-recon; sid:1180; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Annex Terminal DOS attempt"; flow:to_server,established; content:"/ping?query=";
http_uri; metadata:ruleset community, service http; reference:cve,1999-1070;
reference:nessus,10017; classtype:attempted-dos; sid:1181; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise Server directory view"; flow:to_server,established; content:"?
wp-cs-dump"; fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1063; reference:cve,2000-0236; reference:nessus,10352;
classtype:attempted-recon; sid:1183; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise Server directory view"; flow:to_server,established; content:"?
wp-ver-info"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:bugtraq,1063; reference:cve,2000-0236; classtype:attempted-recon;
sid:1184; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
bizdbsearch attempt"; flow:to_server,established; content:"/bizdb1-search.cgi";
fast_pattern; nocase; http_uri; content:"mail"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1104; reference:cve,2000-0287;
reference:nessus,10383; classtype:web-application-attack; sid:1185; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise Server directory view"; flow:to_server,established; content:"?
wp-ver-diff"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:bugtraq,1063; reference:cve,2000-0236; classtype:attempted-recon;
sid:1186; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
SalesLogix Eviewer web command attempt"; flow:to_server,established;
content:"/slxweb.dll/admin?command="; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1078; reference:bugtraq,1089;
reference:cve,2000-0278; reference:cve,2000-0289; reference:nessus,10361;
classtype:web-application-attack; sid:1187; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise Server directory view"; flow:to_server,established; content:"?
wp-start-ver"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:bugtraq,1063; reference:cve,2000-0236; classtype:attempted-recon;
sid:1188; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise Server directory view"; flow:to_server,established; content:"?
wp-stop-ver"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:bugtraq,1063; reference:cve,2000-0236; classtype:attempted-recon;
sid:1189; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise Server directory view"; flow:to_server,established; content:"?
wp-uncheckout"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:bugtraq,1063; reference:cve,2000-0236; classtype:attempted-recon;
sid:1190; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise Server directory view"; flow:to_server,established; content:"?
wp-html-rend"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:bugtraq,1063; reference:cve,2000-0236; classtype:attempted-recon;
sid:1191; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Trend Micro OfficeScan access"; flow:to_server,established;
content:"/officescan/cgi/jdkRqNotify.exe"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1057;
classtype:attempted-recon; sid:1192; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
oracle web arbitrary command execution attempt"; flow:to_server,established;
content:"/ows-bin/"; nocase; http_uri; content:"?&"; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1053; reference:cve,2000-0169;
reference:nessus,10348; classtype:web-application-attack; sid:1193; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
sojourn.cgi File attempt"; flow:to_server,established; content:"/sojourn.cgi?";
nocase; http_uri; content:"cat="; distance:0; nocase; http_uri; content:"%00";
nocase; metadata:ruleset community, service http; reference:bugtraq,1052;
reference:cve,2000-0180; reference:nessus,10349; classtype:web-application-attack;
sid:1194; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
sojourn.cgi access"; flow:to_server,established; content:"/sojourn.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1052; reference:cve,2000-0180; reference:nessus,10349;
classtype:web-application-activity; sid:1195; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP SGI
InfoSearch fname attempt"; flow:to_server,established; content:"/infosrch.cgi?";
fast_pattern; nocase; http_uri; content:"fname="; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1031;
reference:cve,2000-0207; reference:nessus,10128; classtype:web-application-attack;
sid:1196; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Phorum code access"; flow:to_server,established; content:"/code.php3";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:1197; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Netscape Enterprise Server directory view"; flow:to_server,established; content:"?
wp-usr-prop"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:bugtraq,1063; reference:cve,2000-0236; classtype:web-application-
attack; sid:1198; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 2301 (msg:"SERVER-WEBAPP Compaq Insight
directory traversal"; flow:to_server,established; content:"../"; metadata:ruleset
community; reference:bugtraq,282; reference:cve,1999-0771; classtype:web-
application-attack; sid:1199; rev:17;)
# alert tcp $HTTP_SERVERS $HTTP_PORTS -> $EXTERNAL_NET any (msg:"INDICATOR-
COMPROMISE Invalid URL"; flow:to_client,established; file_data; content:"Invalid
URL"; nocase; metadata:ruleset community, service http;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS00-063;
classtype:attempted-recon; sid:1200; rev:17;)
# alert tcp $HTTP_SERVERS $HTTP_PORTS -> $EXTERNAL_NET any (msg:"INDICATOR-
COMPROMISE 403 Forbidden"; flow:to_client,established; content:"403";
http_stat_code; metadata:ruleset community, service http; classtype:attempted-
recon; sid:1201; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
search.vts access"; flow:to_server,established; content:"/search.vts"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,162;
classtype:attempted-recon; sid:1202; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP ax-
admin.cgi access"; flow:to_server,established; content:"/ax-admin.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:web-application-activity; sid:1204; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
axs.cgi access"; flow:to_server,established; content:"/axs.cgi"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:web-application-
activity; sid:1205; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cachemgr.cgi access"; flow:to_server,established; content:"/cachemgr.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2059; reference:cve,1999-0710; reference:nessus,10034;
classtype:web-application-activity; sid:1206; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
htgrep access"; flow:to_server,established; content:"/htgrep"; http_uri;
metadata:ruleset community, service http; reference:cve,2000-0832;
reference:nessus,10495; classtype:web-application-activity; sid:1207; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
responder.cgi access"; flow:to_server,established; content:"/responder.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3155; classtype:web-application-activity; sid:1208; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.nsconfig access"; flow:to_server,established; content:"/.nsconfig"; http_uri;
metadata:ruleset community, service http; classtype:attempted-recon; sid:1209;
rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP web-
map.cgi access"; flow:to_server,established; content:"/web-map.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:web-application-activity; sid:1211; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Admin_files access"; flow:to_server,established; content:"/admin_files";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:1212; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
backup access"; flow:to_server,established; content:"/backup"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:attempted-recon;
sid:1213; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
intranet access"; flow:to_server,established; content:"/intranet/";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,11626; classtype:attempted-recon; sid:1214; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ministats admin access"; flow:to_server,established;
content:"/ministats/admin.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; classtype:web-application-activity; sid:1215; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
filemail access"; flow:to_server,established; content:"/filemail";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1154; reference:cve,1999-1155;
reference:url,www.securityfocus.com/archive/1/11175; classtype:attempted-recon;
sid:1216; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
plusmail access"; flow:to_server,established; content:"/plusmail";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2653; reference:cve,2000-0074; reference:nessus,10181;
classtype:attempted-recon; sid:1217; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
adminlogin access"; flow:to_server,established; content:"/adminlogin";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1164; reference:bugtraq,1175; reference:cve,2000-0332;
reference:cve,2000-0426; reference:nessus,11748; classtype:attempted-recon;
sid:1218; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
dfire.cgi access"; flow:to_server,established; content:"/dfire.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,564; reference:cve,1999-0913; classtype:web-application-activity;
sid:1219; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ultraboard access"; flow:to_server,established; content:"/ultraboard";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1164; reference:bugtraq,1175; reference:cve,2000-0332;
reference:cve,2000-0426; reference:nessus,11748; classtype:attempted-recon;
sid:1220; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Muscat Empower cgi access"; flow:to_server,established; content:"/empower?DB";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2374; reference:cve,2001-0224; reference:nessus,10609;
classtype:web-application-activity; sid:1221; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
pals-cgi arbitrary file access attempt"; flow:to_server,established;
content:"/pals-cgi"; fast_pattern; nocase; http_uri; content:"documentName=";
http_uri; metadata:ruleset community, service http; reference:bugtraq,2372;
reference:cve,2001-0217; reference:nessus,10611; classtype:web-application-attack;
sid:1222; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ROADS search.pl attempt"; flow:to_server,established; content:"/ROADS/cgi-
bin/search.pl"; http_uri; content:"form="; nocase; metadata:ruleset community,
service http; reference:bugtraq,2371; reference:cve,2001-0215;
reference:nessus,10627; classtype:attempted-recon; sid:1224; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 6000 (msg:"X11 MIT Magic Cookie
detected"; flow:established; content:"MIT-MAGIC-COOKIE-1"; fast_pattern:only;
metadata:ruleset community; classtype:attempted-user; sid:1225; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 6000 (msg:"X11 xopen"; flow:established;
content:"l|00 0B 00 00 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:policy
max-detect-ips drop, ruleset community; classtype:unknown; sid:1226; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP CWD ...";
flow:to_server,established; content:"CWD"; nocase; content:"..."; distance:0;
pcre:"/^CWD\s[^\n]*?\.\.\./smi"; metadata:ruleset community, service ftp;
reference:bugtraq,9237; classtype:bad-unknown; sid:1229; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
VirusWall FtpSave access"; flow:to_server,established; content:"/FtpSave.dll";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2808; reference:cve,2001-0432; reference:nessus,10733;
classtype:attempted-recon; sid:1230; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
VirusWall catinfo access"; flow:to_server,established; content:"/catinfo";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2579; reference:bugtraq,2808; reference:cve,2001-0432;
reference:nessus,10650; classtype:attempted-recon; sid:1231; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1812 (msg:"SERVER-WEBAPP VirusWall
catinfo access"; flow:to_server,established; content:"/catinfo"; nocase;
metadata:ruleset community; reference:bugtraq,2579; reference:bugtraq,2808;
reference:cve,2001-0432; reference:nessus,10650; classtype:attempted-recon;
sid:1232; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
VirusWall FtpSaveCSP access"; flow:to_server,established;
content:"/FtpSaveCSP.dll"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,2808; reference:cve,2001-0432;
reference:nessus,10733; classtype:attempted-recon; sid:1234; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
VirusWall FtpSaveCVP access"; flow:to_server,established;
content:"/FtpSaveCVP.dll"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,2808; reference:cve,2001-0432;
reference:nessus,10733; classtype:attempted-recon; sid:1235; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"OS-WINDOWS RFParalyze
Attempt"; flow:to_server,established; content:"BEAVIS"; content:"yep yep";
metadata:ruleset community; reference:bugtraq,1163; reference:cve,2000-0347;
reference:nessus,10392; classtype:attempted-recon; sid:1239; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 2224 (msg:"SERVER-OTHER MDBMS overflow";
flow:to_server,established; content:"|01|1|DB CD 80 E8|[|FF FF FF|";
fast_pattern:only; metadata:ruleset community; reference:bugtraq,1252;
reference:cve,2000-0446; reference:nessus,10422; classtype:attempted-admin;
sid:1240; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
SWEditServlet directory traversal attempt"; flow:to_server,established;
content:"/SWEditServlet"; http_uri; content:"template=../../../"; metadata:ruleset
community, service http; reference:bugtraq,2868; reference:cve,2001-0555;
classtype:attempted-user; sid:1241; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
ISAPI .ida access"; flow:to_server,established; content:".ida"; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1065;
reference:cve,2000-0071; classtype:web-application-activity; sid:1242; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
ISAPI .ida attempt"; flow:to_server,established; content:".ida?"; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1065;
reference:cve,2000-0071; reference:cve,2001-0500; classtype:web-application-attack;
sid:1243; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
ISAPI .idq attempt"; flow:to_server,established; content:".idq?"; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1065;
reference:bugtraq,968; reference:cve,2000-0071; reference:cve,2000-0126;
reference:cve,2001-0500; reference:nessus,10115; classtype:web-application-attack;
sid:1244; rev:28;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
ISAPI .idq access"; flow:to_server,established; content:".idq"; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1065;
reference:cve,2000-0071; classtype:web-application-activity; sid:1245; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage rad fp30reg.dll access"; flow:to_server,established;
content:"/fp30reg.dll"; nocase; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2906; reference:cve,2001-0341; reference:cve,2003-0822;
reference:nessus,10699; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS01-035; classtype:web-application-activity; sid:1248;
rev:30;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage rad fp4areg.dll access"; flow:to_server,established;
content:"/fp4areg.dll"; nocase; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2906; reference:cve,2001-0341; reference:nessus,10699;
classtype:web-application-activity; sid:1249; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"OS-OTHER Cisco IOS
HTTP configuration attempt"; flow:to_server,established; content:"/level/";
http_uri; pcre:"/\x2flevel\x2f\d+\x2f(exec|configure)/iU"; metadata:ruleset
community, service http; reference:bugtraq,2936; reference:cve,2001-0537;
reference:nessus,10700; classtype:web-application-attack; sid:1250; rev:21;)
# alert tcp $TELNET_SERVERS 23 -> $EXTERNAL_NET any (msg:"PROTOCOL-TELNET bsd
telnet exploit response"; flow:to_client,established; content:"|0D 0A|[Yes]|0D 0A
FF FE 08 FF FD|&"; fast_pattern:only; rawbytes; metadata:ruleset community, service
telnet; reference:bugtraq,3064; reference:cve,2001-0554; reference:nessus,10709;
classtype:attempted-admin; sid:1252; rev:25;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"PROTOCOL-TELNET bsd
exploit client finishing"; flow:to_server,established; dsize:>200; content:"|FF F6
FF F6 FF FB 08 FF F6|"; depth:50; offset:200; rawbytes; metadata:ruleset community,
service telnet; reference:bugtraq,3064; reference:cve,2001-0554;
reference:nessus,10709; classtype:successful-admin; sid:1253; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
PHPLIB remote command attempt"; flow:to_server,established;
content:"_PHPLIB[libdir]"; fast_pattern:only; metadata:ruleset community, service
http; reference:bugtraq,3079; reference:cve,2001-1370; reference:nessus,14910;
classtype:attempted-user; sid:1254; rev:16;)
# alert tcp $HTTP_SERVERS any -> $EXTERNAL_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
PHPLIB remote command attempt"; flow:to_server,established;
content:"/db_mysql.inc"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3079; reference:cve,2001-1370; classtype:attempted-user;
sid:1255; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS CodeRed
v2 root.exe access"; flow:to_server,established; content:"/root.exe"; nocase;
http_uri; metadata:ruleset community, service http;
reference:url,www.cert.org/advisories/CA-2001-19.html; classtype:web-application-
attack; sid:1256; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 135:139 (msg:"SERVER-OTHER Winnuke
attack"; flow:stateless; flags:U+; metadata:ruleset community;
reference:bugtraq,2010; reference:cve,1999-0153; classtype:attempted-dos; sid:1257;
rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
SWEditServlet access"; flow:to_server,established; content:"/SWEditServlet";
http_uri; metadata:ruleset community, service http; reference:bugtraq,2868;
classtype:attempted-recon; sid:1259; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 4242 (msg:"SERVER-OTHER AIX pdnsd
overflow"; flow:to_server,established; isdataat:1000; content:"|7F FF FB|x|7F FF
FB|x|7F FF FB|x|7F FF FB|x"; content:"@|8A FF C8|@|82 FF D8 3B|6|FE 03 3B|v|FE
02|"; metadata:ruleset community; reference:bugtraq,3237; reference:bugtraq,590;
reference:cve,1999-0745; classtype:attempted-user; sid:1261; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap admind
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
F7|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:1262; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap amountd
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 87
03|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; reference:bugtraq,205; reference:bugtraq,235;
reference:bugtraq,450; reference:bugtraq,614; reference:cve,1999-0088;
reference:cve,1999-0210; reference:cve,1999-0493; reference:cve,1999-0704;
classtype:rpc-portmap-decode; sid:1263; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap bootparam
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
BA|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:1264; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap cmsd
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
E4|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:1265; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap nisd
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 87
CC|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:1267; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap pcnfsd
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 02|I|F1|";
within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset community,
service sunrpc; reference:bugtraq,205; reference:bugtraq,4816; reference:cve,1999-
0078; reference:cve,1999-0353; reference:cve,2002-0910; classtype:rpc-portmap-
decode; sid:1268; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap rexd
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
B1|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:1269; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap rstatd
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
A1|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:1270; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap rusers
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
A2|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; reference:cve,1999-0626; classtype:rpc-portmap-decode;
sid:1271; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap sadmind
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 87
88|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:1272; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap
selection_svc request TCP"; flow:to_server,established; content:"|00 01 86 A0|";
depth:4; offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
AF|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; reference:bugtraq,205; reference:cve,1999-0209;
classtype:rpc-portmap-decode; sid:1273; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap ttdbserv
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
F3|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; reference:bugtraq,122; reference:bugtraq,3382;
reference:cve,1999-0003; reference:cve,1999-0687; reference:cve,1999-1075;
reference:cve,2001-0717; reference:url,www.cert.org/advisories/CA-2001-05.html;
classtype:rpc-portmap-decode; sid:1274; rev:26;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap yppasswd
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
A9|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:1275; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap ypserv
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
A4|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; reference:bugtraq,5914; reference:bugtraq,6016;
reference:cve,2000-1042; reference:cve,2000-1043; reference:cve,2002-1232;
classtype:rpc-portmap-decode; sid:1276; rev:21;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap ypupdated
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 BC|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:policy max-detect-ips drop, ruleset community,
service sunrpc; reference:bugtraq,1749; reference:bugtraq,28383;
reference:cve,1999-0208; classtype:rpc-portmap-decode; sid:1277; rev:22;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap snmpXdmi
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 87 99|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:policy max-detect-ips drop, ruleset community,
service sunrpc; reference:bugtraq,2417; reference:cve,2001-0236;
reference:nessus,10659; reference:url,www.cert.org/advisories/CA-2001-05.html;
classtype:rpc-portmap-decode; sid:1279; rev:28;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap listing
UDP 111"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12; content:"|00
00 00 04|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community, service sunrpc; classtype:rpc-portmap-decode; sid:1280;
rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 32771 (msg:"PROTOCOL-RPC portmap listing
UDP 32771"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12; content:"|
00 00 00 04|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; classtype:rpc-portmap-decode; sid:1281; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
Microsoft Office Outlook web dos"; flow:to_server,established;
content:"/exchange/LogonFrm.asp?"; fast_pattern; nocase; http_uri;
content:"mailbox="; nocase; content:"%%%"; metadata:ruleset community, service
http; reference:bugtraq,3223; classtype:web-application-attack; sid:1283; rev:21;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"SERVER-OTHER
readme.eml download attempt"; flow:to_server,established; content:"/readme.eml";
nocase; http_uri; metadata:ruleset community, service http;
reference:url,www.cert.org/advisories/CA-2001-26.html; classtype:attempted-user;
sid:1284; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS msdac
access"; flow:to_server,established; content:"/msdac/"; nocase; http_uri;
metadata:ruleset community, service http; reference:nessus,11032; classtype:web-
application-activity; sid:1285; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
_mem_bin access"; flow:to_server,established; content:"/_mem_bin/"; nocase;
http_uri; metadata:ruleset community, service http; reference:nessus,11032;
classtype:web-application-activity; sid:1286; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER
Microsoft Frontpage /_vti_bin/ access"; flow:to_server,established;
content:"/_vti_bin/"; fast_pattern:only; metadata:ruleset community, service http;
reference:nessus,11032; classtype:web-application-activity; sid:1288; rev:16;)
# alert udp any any -> any 69 (msg:"PROTOCOL-TFTP GET Admin.dll"; flow:to_server;
content:"|00 01|"; depth:2; content:"admin.dll"; offset:2; nocase; metadata:ruleset
community; reference:url,www.cert.org/advisories/CA-2001-26.html;
classtype:successful-admin; sid:1289; rev:10;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OTHER readme.eml
autoload attempt"; flow:to_client,established; file_data; content:"window.open|28
22|readme.eml|22|"; nocase; metadata:ruleset community, service http;
reference:url,www.cert.org/advisories/CA-2001-26.html; classtype:attempted-user;
sid:1290; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
sml3com access"; flow:to_server,established; content:"/graphics/sml3com"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,2721;
reference:cve,2001-0740; classtype:web-application-activity; sid:1291; rev:15;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE directory
listing"; flow:established; content:"Volume Serial Number"; metadata:ruleset
community; classtype:bad-unknown; sid:1292; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"INDICATOR-COMPROMISE nimda
RICHED20.DLL"; flow:to_server,established; content:"R|00|I|00|C|00|H|00|E|00|D|00|
2|00|0|00|.|00|D|00|L|00|L"; nocase; metadata:ruleset community;
reference:url,www.f-secure.com/v-descs/nimda.shtml; classtype:bad-unknown;
sid:1295; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
admin.php file upload attempt"; flow:to_server,established; content:"/admin.php";
fast_pattern; nocase; http_uri; content:"file_name="; http_uri; metadata:ruleset
community, service http; reference:bugtraq,3361; reference:cve,2001-1032;
classtype:attempted-admin; sid:1300; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
admin.php access"; flow:to_server,established; content:"/admin.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3361; reference:bugtraq,7532; reference:bugtraq,9270;
reference:cve,2001-1032; classtype:attempted-recon; sid:1301; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
console.exe access"; flow:to_server,established; content:"/cgi-bin/console.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3375; reference:cve,2001-1252; classtype:attempted-recon;
sid:1302; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cs.exe access"; flow:to_server,established; content:"/cgi-bin/cs.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3375; reference:cve,2001-1252; classtype:attempted-recon;
sid:1303; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
txt2html.cgi access"; flow:to_server,established; content:"/txt2html.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:web-application-activity; sid:1304; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
txt2html.cgi directory traversal attempt"; flow:to_server,established;
content:"/txt2html.cgi"; fast_pattern:only; http_uri; content:"/../../../../";
http_raw_uri; metadata:ruleset community, service http; classtype:web-application-
attack; sid:1305; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
store.cgi access"; flow:to_server,established; content:"/store.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2385; reference:cve,2001-0305; reference:nessus,10639;
classtype:web-application-activity; sid:1307; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
sendmessage.cgi access"; flow:to_server,established; content:"/sendmessage.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3673; reference:cve,2001-1100; classtype:attempted-recon;
sid:1308; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP zsh
access"; flow:to_server,established; content:"/zsh"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:cve,1999-0509;
reference:url,www.cert.org/advisories/CA-1996-11.html; classtype:attempted-recon;
sid:1309; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 4321 (msg:"SERVER-OTHER rwhoisd format
string attempt"; flow:to_server,established; content:"-soa %p"; metadata:ruleset
community; reference:bugtraq,3474; reference:cve,2001-0838; reference:nessus,10790;
classtype:misc-attack; sid:1323; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $SSH_PORTS (msg:"INDICATOR-SHELLCODE ssh
CRC32 overflow /bin/sh"; flow:to_server,established; content:"/bin/sh";
metadata:ruleset community; reference:bugtraq,2347; reference:cve,2001-0144;
reference:cve,2001-0572; classtype:shellcode-detect; sid:1324; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $SSH_PORTS (msg:"INDICATOR-SHELLCODE ssh
CRC32 overflow filler"; flow:to_server,established; content:"|00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-
ips drop, ruleset community; reference:bugtraq,2347; reference:cve,2001-0144;
reference:cve,2001-0572; classtype:shellcode-detect; sid:1325; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $SSH_PORTS (msg:"INDICATOR-SHELLCODE ssh
CRC32 overflow NOOP"; flow:to_server,established; content:"|90 90 90 90 90 90 90 90
90 90 90 90 90 90 90 90|"; fast_pattern:only; metadata:ruleset community;
reference:bugtraq,2347; reference:cve,2001-0144; reference:cve,2001-0572;
classtype:shellcode-detect; sid:1326; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $SSH_PORTS (msg:"INDICATOR-SHELLCODE ssh
CRC32 overflow"; flow:to_server,established; content:"|00 01|W|00 00 00 18|";
depth:7; content:"|FF FF FF FF 00 00|"; depth:14; offset:8; metadata:ruleset
community; reference:bugtraq,2347; reference:cve,2001-0144; reference:cve,2001-
0572; reference:nessus,10607; classtype:shellcode-detect; sid:1327; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.htgroup access"; flow:to_server,established; content:".htgroup";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:web-application-activity; sid:1374; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
sadmind worm access"; flow:to_server,established; content:"GET x HTTP/1.0";
depth:15; metadata:ruleset community, service http;
reference:url,www.cert.org/advisories/CA-2001-11.html; classtype:attempted-recon;
sid:1375; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP jrun
directory browse attempt"; flow:to_server,established; content:"/?.jsp"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,3592;
reference:cve,2001-1510; classtype:web-application-attack; sid:1376; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP wu-ftp bad file
completion attempt"; flow:to_server,established; content:"~"; content:"[";
distance:0; metadata:ruleset community, service ftp; reference:bugtraq,3581;
reference:bugtraq,3707; reference:cve,2001-0550; reference:cve,2001-0886;
reference:nessus,10821; classtype:misc-attack; sid:1377; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP wu-ftp bad file
completion attempt"; flow:to_server,established; content:"~"; content:"{";
distance:0; metadata:ruleset community, service ftp; reference:bugtraq,3581;
reference:bugtraq,3707; reference:cve,2001-0550; reference:cve,2001-0886;
reference:nessus,10821; classtype:misc-attack; sid:1378; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP STAT overflow
attempt"; flow:to_server,established; content:"STAT"; nocase;
isdataat:190,relative; pcre:"/^STAT(?!\n)\s[^\n]{190}/mi"; metadata:ruleset
community, service ftp; reference:bugtraq,3507; reference:bugtraq,8542;
reference:cve,2001-0325; reference:cve,2001-1021; reference:cve,2003-0772;
reference:cve,2011-0762; reference:url,labs.defcom.com/adv/2001/def-2001-31.txt;
classtype:attempted-admin; sid:1379; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
Form_VBScript.asp access"; flow:to_server,established;
content:"/Form_VBScript.asp"; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,1594; reference:bugtraq,1595; reference:cve,2000-0746;
reference:cve,2000-1104; reference:nessus,10572;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS00-060;
classtype:web-application-attack; sid:1380; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Trend Micro OfficeScan attempt"; flow:to_server,established;
content:"/officescan/cgi/jdkRqNotify.exe?"; nocase; http_uri; content:"domain=";
nocase; http_uri; content:"event="; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1057; classtype:attempted-recon;
sid:1381; rev:13;)
# alert tcp any any -> any 6666:7000 (msg:"SERVER-OTHER CHAT IRC Ettercap parse
overflow attempt"; flow:to_server,established; content:"PRIVMSG";
fast_pattern:only; content:"nickserv"; nocase; content:"IDENTIFY"; nocase;
isdataat:100,relative; pcre:"/^PRIVMSG\s+nickserv\s+IDENTIFY\s[^\n]{100}/smi";
metadata:ruleset community; reference:url,www.bugtraq.org/dev/GOBBLES-12.txt;
classtype:misc-attack; sid:1382; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1900 (msg:"OS-WINDOWS Microsoft Windows
UPnP malformed advertisement"; flow:to_server,no_stream; content:"NOTIFY * ";
fast_pattern:only; content:"LOCATION|3A|"; nocase; detection_filter:track by_dst,
count 10, seconds 1; metadata:policy max-detect-ips drop, ruleset community;
reference:bugtraq,3723; reference:cve,2001-0876; reference:cve,2001-0877;
reference:nessus,10829; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS01-059; classtype:misc-attack; sid:1384; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP mod-
plsql administration access"; flow:to_server,established; content:"/admin_/";
http_uri; metadata:ruleset community, service http; reference:bugtraq,3726;
reference:bugtraq,3727; reference:cve,2001-1216; reference:cve,2001-1217;
reference:nessus,10849; classtype:web-application-activity; sid:1385; rev:18;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 139 (msg:"SERVER-MSSQL raiserror
possible buffer overflow"; flow:to_server,established; content:"r|00|a|00|i|00|s|
00|e|00|r|00|r|00|o|00|r|00|"; offset:32; nocase; metadata:ruleset community;
reference:bugtraq,3733; reference:cve,2001-0542;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS01-060;
classtype:attempted-user; sid:1386; rev:15;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"SQL raiserror possible
buffer overflow"; flow:to_server,established; content:"r|00|a|00|i|00|s|00|e|00|r|
00|r|00|o|00|r|00|"; fast_pattern:only; metadata:ruleset community;
reference:bugtraq,3733; reference:cve,2001-0542; reference:nessus,11217;
classtype:attempted-user; sid:1387; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"OS-WINDOWS Microsoft Windows
UPnP Location overflow attempt"; content:"Location"; fast_pattern:only;
pcre:"/^Location\s*\x3a\s*\w+\x3a\/\/([^\n]*\x3a)?[^\n]{128}/smi"; metadata:ruleset
community; reference:bugtraq,3723; reference:cve,2001-0876; reference:cve,2007-
2386; reference:nessus,10829; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS01-059; classtype:misc-attack; sid:1388; rev:22;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE x86 inc ebx
NOOP"; content:"CCCCCCCCCCCCCCCCCCCCCCCC"; metadata:policy max-detect-ips drop,
ruleset community; classtype:shellcode-detect; sid:1390; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
lastlines.cgi access"; flow:to_server,established; content:"/lastlines.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3754; reference:bugtraq,3755; reference:cve,2001-1205;
reference:cve,2001-1206; classtype:attempted-recon; sid:1392; rev:22;)
# alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-SHELLCODE x86 inc ecx
NOOP"; content:"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"; metadata:ruleset community;
classtype:shellcode-detect; sid:1394; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
zml.cgi attempt"; flow:to_server,established; content:"/zml.cgi"; http_uri;
content:"file=../"; metadata:ruleset community, service http;
reference:bugtraq,3759; reference:cve,2001-1209; reference:nessus,10830;
classtype:web-application-activity; sid:1395; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
zml.cgi access"; flow:to_server,established; content:"/zml.cgi"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,3759;
reference:cve,2001-1209; reference:nessus,10830; classtype:web-application-
activity; sid:1396; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
wayboard attempt"; flow:to_server,established; content:"/way-board/way-board.cgi";
http_uri; content:"db="; http_uri; content:"../.."; http_raw_uri; metadata:ruleset
community, service http; reference:bugtraq,2370; reference:cve,2001-0214;
reference:nessus,10610; classtype:web-application-attack; sid:1397; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 6112 (msg:"SERVER-OTHER CDE dtspcd
exploit attempt"; flow:to_server,established; content:"1"; depth:1; offset:10;
content:!"000"; depth:3; offset:11; metadata:ruleset community;
reference:bugtraq,3517; reference:cve,2001-0803; reference:nessus,10833;
reference:url,www.cert.org/advisories/CA-2002-01.html; classtype:misc-attack;
sid:1398; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP PHP-
Nuke remote file include attempt"; flow:to_server,established;
content:"/index.php"; fast_pattern; nocase; http_uri; content:"file="; http_uri;
pcre:"/file=(https?|ftps?|php)/Ui"; metadata:ruleset community, service http;
reference:bugtraq,3889; reference:cve,2002-0206; classtype:web-application-attack;
sid:1399; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
/scripts/samples/ access"; flow:to_server,established; content:"/scripts/samples/";
nocase; http_uri; metadata:ruleset community, service http; reference:nessus,10370;
classtype:web-application-attack; sid:1400; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
/msadc/samples/ access"; flow:to_server,established; content:"/msadc/samples/";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,167;
reference:cve,1999-0736; reference:nessus,1007; classtype:web-application-attack;
sid:1401; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
iissamples access"; flow:to_server,established; content:"/iissamples/"; nocase;
http_uri; metadata:ruleset community, service http; reference:nessus,11032;
classtype:web-application-attack; sid:1402; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP AHG
search.cgi access"; flow:to_server,established; content:"/publisher/search.cgi";
fast_pattern; nocase; http_uri; content:"template="; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,3985;
reference:cve,2002-2113; classtype:web-application-activity; sid:1405; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
agora.cgi access"; flow:to_server,established; content:"/store/agora.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3702; reference:bugtraq,3976; reference:cve,2001-1199;
reference:cve,2002-0215; reference:nessus,10836; classtype:web-application-
activity; sid:1406; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
smssend.php access"; flow:to_server,established; content:"/smssend.php"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,3982;
reference:cve,2002-0220; classtype:web-application-activity; sid:1407; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 3372 (msg:"SERVER-OTHER MSDTC attempt";
flow:to_server,established; dsize:>1023; metadata:ruleset community;
reference:bugtraq,4006; reference:cve,2002-0224; reference:nessus,10939;
classtype:attempted-dos; sid:1408; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 161:162 (msg:"PROTOCOL-SNMP community
string buffer overflow attempt"; flow:to_server; content:"|02 01 00 04 82 01 00|";
offset:4; metadata:ruleset community, service snmp; reference:bugtraq,4088;
reference:bugtraq,4089; reference:cve,2002-0012; reference:cve,2002-0013;
reference:url,www.cert.org/advisories/CA-2002-03.html; classtype:misc-attack;
sid:1409; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
dcboard.cgi access"; flow:to_server,established; content:"/dcboard.cgi"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,2728;
reference:cve,2001-0527; reference:nessus,10583; classtype:attempted-recon;
sid:1410; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"PROTOCOL-SNMP public access
udp"; flow:to_server; content:"|06|public"; metadata:ruleset community, service
snmp; reference:bugtraq,2112; reference:bugtraq,4088; reference:bugtraq,4089;
reference:cve,1999-0517; reference:cve,2002-0012; reference:cve,2002-0013;
classtype:attempted-recon; sid:1411; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"PROTOCOL-SNMP public access
tcp"; flow:to_server,established; content:"public"; metadata:ruleset community,
service snmp; reference:bugtraq,2112; reference:bugtraq,4088;
reference:bugtraq,4089; reference:bugtraq,7212; reference:cve,1999-0517;
reference:cve,2002-0012; reference:cve,2002-0013; classtype:attempted-recon;
sid:1412; rev:20;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"PROTOCOL-SNMP private access
udp"; flow:to_server; content:"private"; metadata:ruleset community, service snmp;
reference:bugtraq,4088; reference:bugtraq,4089; reference:bugtraq,4132;
reference:bugtraq,7212; reference:cve,2002-0012; reference:cve,2002-0013;
classtype:attempted-recon; sid:1413; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"PROTOCOL-SNMP private access
tcp"; flow:to_server,established; content:"private"; metadata:ruleset community,
service snmp; reference:bugtraq,4088; reference:bugtraq,4089;
reference:bugtraq,4132; reference:cve,2002-0012; reference:cve,2002-0013;
classtype:attempted-recon; sid:1414; rev:18;)
# alert udp any any -> 255.255.255.255 161 (msg:"PROTOCOL-SNMP Broadcast request";
flow:to_server; metadata:ruleset community, service snmp; reference:bugtraq,4088;
reference:bugtraq,4089; reference:bugtraq,4132; reference:cve,2002-0012;
reference:cve,2002-0013; classtype:attempted-recon; sid:1415; rev:17;)
# alert udp any any -> 255.255.255.255 162 (msg:"PROTOCOL-SNMP broadcast trap";
flow:to_server; metadata:ruleset community, service snmp; reference:bugtraq,4088;
reference:bugtraq,4089; reference:bugtraq,4132; reference:cve,2002-0012;
reference:cve,2002-0013; classtype:attempted-recon; sid:1416; rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"PROTOCOL-SNMP request udp";
flow:to_server; metadata:ruleset community, service snmp; reference:bugtraq,4088;
reference:bugtraq,4089; reference:bugtraq,4132; reference:cve,2002-0012;
reference:cve,2002-0013; classtype:attempted-recon; sid:1417; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"PROTOCOL-SNMP request tcp";
flow:stateless; metadata:ruleset community, service snmp; reference:bugtraq,4088;
reference:bugtraq,4089; reference:bugtraq,4132; reference:cve,2002-0012;
reference:cve,2002-0013; classtype:attempted-recon; sid:1418; rev:18;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 162 (msg:"PROTOCOL-SNMP trap udp";
flow:to_server; metadata:ruleset community, service snmp; reference:bugtraq,4088;
reference:bugtraq,4089; reference:bugtraq,4132; reference:cve,2002-0012;
reference:cve,2002-0013; classtype:attempted-recon; sid:1419; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 162 (msg:"PROTOCOL-SNMP trap tcp";
flow:stateless; metadata:ruleset community, service snmp; reference:bugtraq,4088;
reference:bugtraq,4089; reference:bugtraq,4132; reference:cve,2002-0012;
reference:cve,2002-0013; classtype:attempted-recon; sid:1420; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 705 (msg:"PROTOCOL-SNMP AgentX/tcp
request"; flow:stateless; metadata:ruleset community, service snmp;
reference:bugtraq,4088; reference:bugtraq,4089; reference:bugtraq,4132;
reference:cve,2002-0012; reference:cve,2002-0013; classtype:attempted-recon;
sid:1421; rev:18;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 161:162 (msg:"PROTOCOL-SNMP community
string buffer overflow attempt with evasion"; flow:to_server; content:" |04 82 01
00|"; depth:5; offset:7; metadata:ruleset community, service snmp;
reference:bugtraq,4088; reference:bugtraq,4089; reference:cve,2002-0012;
reference:cve,2002-0013; reference:url,www.cert.org/advisories/CA-2002-03.html;
classtype:misc-attack; sid:1422; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
content-disposition memchr overflow"; flow:to_server,established; content:"Content-
Disposition|3A|"; nocase; http_header; content:"name=|22 CC CC CC CC CC|";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,4183; reference:cve,2002-0081; reference:nessus,10867;
classtype:web-application-attack; sid:1423; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
content-disposition file upload attempt"; flow:to_server,established;
content:"Content-Disposition|3A|"; nocase; http_header; content:"form-data|3B|";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,4183; reference:cve,2002-0081; reference:nessus,10867;
classtype:web-application-attack; sid:1425; rev:22;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"PROTOCOL-SNMP PROTOS test-
suite-req-app attempt"; content:"0&|02 01 00 04 06|public|A0 19 02 01 00 02 01 00
02 01 00|0|0E|0|0C 06 08|+|06 01 02 01 01 05 00 05 00|"; fast_pattern:only;
metadata:ruleset community, service snmp;
reference:url,www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html;
classtype:misc-attack; sid:1426; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 162 (msg:"PROTOCOL-SNMP PROTOS test-
suite-trap-app attempt"; content:"08|02 01 00 04 06|public|A4|+|06|";
fast_pattern:only; metadata:ruleset community, service snmp;
reference:url,www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html;
classtype:misc-attack; sid:1427; rev:12;)
# alert tcp $HOME_NET any -> 64.245.58.0/23 any (msg:"POLICY-MULTIMEDIA audio
galaxy keepalive"; flow:established; content:"E_|00 03 05|"; depth:5;
metadata:ruleset community; classtype:misc-activity; sid:1428; rev:8;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"PUA-P2P GNUTella client
request"; flow:to_server,established; content:"GNUTELLA"; depth:8; metadata:ruleset
community; classtype:policy-violation; sid:1432; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.history access"; flow:to_server,established; content:"/.history"; http_uri;
metadata:ruleset community, service http; classtype:web-application-attack;
sid:1433; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.bash_history access"; flow:to_server,established; content:"/.bash_history";
http_uri; metadata:ruleset community, service http; reference:bugtraq,337;
reference:cve,1999-0408; classtype:web-application-attack; sid:1434; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS named authors
attempt"; flow:to_server,established; content:"|07|authors"; offset:12; nocase;
content:"|04|bind|00|"; offset:12; nocase; metadata:ruleset community, service dns;
reference:nessus,10728; classtype:attempted-recon; sid:1435; rev:15;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"POLICY-MULTIMEDIA
Apple Quicktime User Agent access"; flow:to_server,established; content:"User-
Agent|3A| Quicktime"; fast_pattern:only; metadata:ruleset community, service http;
classtype:policy-violation; sid:1436; rev:12;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
Microsoft Windows Media download detected"; flow:to_client,established;
content:"Content-Type|3A|"; nocase; http_header; pcre:"/^Content-Type\x3a\s*(?
=[av])(video\/x\-ms\-(w[vm]x|asf)|a(udio\/x\-ms\-w(m[av]|ax)|pplication\/x\-ms\-
wm[zd]))/smiH"; metadata:ruleset community, service ftp-data, service http, service
imap, service pop3; classtype:misc-activity; sid:1437; rev:27;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"POLICY-MULTIMEDIA
Shoutcast playlist redirection"; flow:to_client,established; content:"Content-type|
3A|"; nocase; http_header; content:"audio/x-scpls"; within:50; fast_pattern;
nocase; http_header; metadata:ruleset community, service http; classtype:policy-
violation; sid:1439; rev:17;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"POLICY-MULTIMEDIA
Icecast playlist redirection"; flow:to_client,established; content:"Content-type|
3A|"; nocase; http_header; content:"audio/x-mpegurl"; within:50; fast_pattern;
nocase; http_header; metadata:ruleset community, service http; classtype:policy-
violation; sid:1440; rev:17;)
# alert udp any any -> any 69 (msg:"PROTOCOL-TFTP GET nc.exe"; flow:to_server;
content:"|00 01|"; depth:2; content:"nc.exe"; offset:2; nocase; metadata:ruleset
community; classtype:successful-admin; sid:1441; rev:10;)
# alert udp any any -> any 69 (msg:"PROTOCOL-TFTP GET shadow"; flow:to_server;
content:"|00 01|"; depth:2; content:"shadow"; offset:2; nocase; metadata:ruleset
community; classtype:successful-admin; sid:1442; rev:10;)
# alert udp any any -> any 69 (msg:"PROTOCOL-TFTP GET passwd"; flow:to_server;
content:"|00 01|"; depth:2; content:"passwd"; offset:2; nocase; metadata:ruleset
community; classtype:successful-admin; sid:1443; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 69 (msg:"PROTOCOL-TFTP Get";
flow:to_server; content:"|00 01|"; depth:2; metadata:ruleset community;
classtype:bad-unknown; sid:1444; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"INDICATOR-COMPROMISE FTP
file_id.diz access possible warez site"; flow:to_server,established;
content:"RETR"; nocase; content:"file_id.diz"; distance:1; nocase; metadata:ruleset
community, service ftp; classtype:suspicious-filename-detect; sid:1445; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL vrfy root";
flow:to_server,established; content:"vrfy"; nocase; content:"root"; distance:1;
nocase; pcre:"/^vrfy\s+root/smi"; metadata:ruleset community, service smtp;
classtype:attempted-recon; sid:1446; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 3389 (msg:"POLICY-OTHER Microsoft
Windows Terminal server RDP attempt"; flow:to_server,established; content:"|03 00
00 0B 06 E0 00 00 00 00 00|"; depth:11; metadata:ruleset community, service rdp;
reference:bugtraq,3099; reference:cve,2001-0540; reference:cve,2001-0663;
reference:nessus,10940; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS01-040; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS01-052; classtype:protocol-command-decode; sid:1447;
rev:20;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 3389 (msg:"POLICY-OTHER Microsoft
Windows Terminal server request attempt"; flow:to_server,established; content:"|03
00 00|"; depth:3; content:"|E0 00 00 00 00 00|"; depth:6; offset:5;
metadata:ruleset community, service rdp; reference:bugtraq,3099;
reference:cve,2001-0540; reference:cve,2001-0663; reference:nessus,10940;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS01-040;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS01-052;
classtype:protocol-command-decode; sid:1448; rev:20;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Vintra
Mailserver expn *@"; flow:to_server,established; content:"expn"; fast_pattern:only;
content:"*@"; pcre:"/^expn\s+\*@/smi"; metadata:ruleset community, service smtp;
reference:cve,1999-1200; classtype:misc-attack; sid:1450; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP NPH-
maillist access"; flow:to_server,established; content:"/nph-maillist.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2563; reference:cve,2001-0400; reference:nessus,10164;
classtype:attempted-recon; sid:1451; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
args.cmd access"; flow:to_server,established; content:"/args.cmd";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1180; reference:nessus,11465; classtype:attempted-recon;
sid:1452; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP AT-
generated.cgi access"; flow:to_server,established; content:"/AT-generated.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1072; classtype:attempted-recon; sid:1453; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
wwwwais access"; flow:to_server,established; content:"/wwwwais"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:cve,2001-0223;
reference:nessus,10597; classtype:attempted-recon; sid:1454; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
calendar.pl access"; flow:to_server,established; content:"calendar"; nocase;
http_uri; pcre:"/calendar(|[-_]admin)\.pl/Ui"; metadata:ruleset community, service
http; reference:bugtraq,1215; reference:cve,2000-0432; classtype:attempted-recon;
sid:1455; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
calender_admin.pl access"; flow:to_server,established;
content:"/calender_admin.pl"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:cve,2000-0432; reference:nessus,10506;
classtype:attempted-recon; sid:1456; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
user_update_admin.pl access"; flow:to_server,established;
content:"/user_update_admin.pl"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1486; reference:cve,2000-0627;
classtype:attempted-recon; sid:1457; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
user_update_passwd.pl access"; flow:to_server,established;
content:"/user_update_passwd.pl"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1486; reference:cve,2000-0627;
classtype:attempted-recon; sid:1458; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP bb-
histlog.sh access"; flow:to_server,established; content:"/bb-histlog.sh";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,142; reference:cve,1999-1462; reference:nessus,10025;
classtype:attempted-recon; sid:1459; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP bb-
histsvc.sh access"; flow:to_server,established; content:"/bb-histsvc.sh";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,142; reference:cve,1999-1462; classtype:attempted-recon;
sid:1460; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP bb-
rep.sh access"; flow:to_server,established; content:"/bb-rep.sh";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,142; reference:cve,1999-1462; classtype:attempted-recon;
sid:1461; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP bb-
replog.sh access"; flow:to_server,established; content:"/bb-replog.sh";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,142; reference:cve,1999-1462; classtype:attempted-recon;
sid:1462; rev:17;)
# alert tcp $HOME_NET any <> $EXTERNAL_NET 6666:7000 (msg:"POLICY-SOCIAL IRC
message"; flow:established; dsize:<140; content:"PRIVMSG "; metadata:ruleset
community; classtype:policy-violation; sid:1463; rev:15;)
# alert tcp $HOME_NET 8002 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE oracle
one hour install"; flow:to_client,established; content:"Oracle Applications One-
Hour Install"; metadata:ruleset community; reference:nessus,10737; classtype:bad-
unknown; sid:1464; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
auktion.cgi access"; flow:to_server,established; content:"/auktion.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2367; reference:cve,2001-0212; reference:nessus,10638;
classtype:web-application-activity; sid:1465; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cgiforum.pl access"; flow:to_server,established; content:"/cgiforum.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1963; reference:cve,2000-1171; reference:nessus,10552;
classtype:web-application-activity; sid:1466; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
directorypro.cgi access"; flow:to_server,established; content:"/directorypro.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2793; reference:cve,2001-0780; reference:nessus,10679;
classtype:web-application-activity; sid:1467; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Web
Shopper shopper.cgi attempt"; flow:to_server,established; content:"/shopper.cgi";
fast_pattern; nocase; http_uri; content:"newpage=../"; nocase; metadata:ruleset
community, service http; reference:bugtraq,1776; reference:cve,2000-0922;
reference:nessus,10533; classtype:web-application-attack; sid:1468; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Web
Shopper shopper.cgi access"; flow:to_server,established; content:"/shopper.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1776; reference:cve,2000-0922; classtype:attempted-recon;
sid:1469; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
listrec.pl access"; flow:to_server,established; content:"/listrec.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3328; reference:cve,2001-0997; reference:nessus,10769;
classtype:attempted-recon; sid:1470; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
mailnews.cgi access"; flow:to_server,established; content:"/mailnews.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2391; reference:cve,2001-0271; reference:nessus,10641;
classtype:attempted-recon; sid:1471; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
book.cgi access"; flow:to_server,established; content:"/book.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3178; reference:cve,2001-1114; reference:nessus,10721;
classtype:web-application-activity; sid:1472; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
newsdesk.cgi access"; flow:to_server,established; content:"/newsdesk.cgi";
fast_pattern:only; http_uri; content:"../"; http_raw_uri; metadata:ruleset
community, service http; reference:bugtraq,2172; reference:cve,2001-0232;
reference:nessus,10586; classtype:attempted-recon; sid:1473; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cal_make.pl access"; flow:to_server,established; content:"/cal_make.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2663; reference:cve,2001-0463; reference:nessus,10664;
classtype:web-application-activity; sid:1474; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
mailit.pl access"; flow:to_server,established; content:"/mailit.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10417; classtype:attempted-recon; sid:1475; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
sdbsearch.cgi access"; flow:to_server,established; content:"/sdbsearch.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1658; reference:cve,2001-1130; reference:nessus,10503;
reference:nessus,10720; classtype:attempted-recon; sid:1476; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Simple Web Counter URI Parameter Buffer Overflow attempt";
flow:to_server,established; content:"/swc"; nocase; http_uri; content:"ctr=";
distance:0; nocase; http_uri; urilen:>500; metadata:ruleset community, service
http; reference:bugtraq,6581; reference:nessus,10493; classtype:attempted-user;
sid:1478; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ttawebtop.cgi arbitrary file attempt"; flow:to_server,established;
content:"/ttawebtop.cgi"; nocase; content:"pg=../"; fast_pattern:only;
metadata:ruleset community, service http; reference:bugtraq,2890;
reference:cve,2001-0805; reference:nessus,10696; classtype:web-application-attack;
sid:1479; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ttawebtop.cgi access"; flow:to_server,established; content:"/ttawebtop.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2890; reference:cve,2001-0805; reference:nessus,10696;
classtype:attempted-recon; sid:1480; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
upload.cgi access"; flow:to_server,established; content:"/upload.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10290; classtype:attempted-recon; sid:1481; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
view_source access"; flow:to_server,established; content:"/view_source";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2251; reference:cve,1999-0174; reference:nessus,10294;
classtype:attempted-recon; sid:1482; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ustorekeeper.pl access"; flow:to_server,established; content:"/ustorekeeper.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,2001-0466; reference:nessus,10645; classtype:web-application-
activity; sid:1483; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
mkilog.exe access"; flow:to_server,established; content:"/mkilog.exe"; nocase;
http_uri; metadata:ruleset community, service http; reference:nessus,10359;
classtype:web-application-activity; sid:1485; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
ctss.idc access"; flow:to_server,established; content:"/ctss.idc"; nocase;
http_uri; metadata:ruleset community, service http; reference:nessus,10359;
classtype:web-application-activity; sid:1486; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
/iisadmpwd/aexp2.htr access"; flow:to_server,established;
content:"/iisadmpwd/aexp2.htr"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,2110; reference:bugtraq,4236; reference:cve,1999-
0407; reference:cve,2002-0421; reference:nessus,10371; classtype:web-application-
activity; sid:1487; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
store.cgi directory traversal attempt"; flow:to_server,established;
content:"/store.cgi"; fast_pattern; nocase; http_uri; content:"../"; http_raw_uri;
metadata:ruleset community, service http; reference:bugtraq,2385;
reference:cve,2001-0305; reference:nessus,10639; classtype:web-application-attack;
sid:1488; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
nobody access"; flow:to_server,established; content:"/~nobody"; http_uri;
metadata:ruleset community, service http; reference:nessus,10484; classtype:web-
application-attack; sid:1489; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Phorum /support/common.php attempt"; flow:to_server,established;
content:"/support/common.php"; http_uri; content:"ForumLang=../"; metadata:ruleset
community, service http; reference:bugtraq,1997; classtype:web-application-attack;
sid:1490; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Phorum /support/common.php access"; flow:to_server,established;
content:"/support/common.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1997; reference:bugtraq,9361;
reference:cve,2004-0034; classtype:web-application-attack; sid:1491; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP RBS
ISP /newuser directory traversal attempt"; flow:to_server,established;
content:"/newuser?Image=../.."; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1704; reference:cve,2000-1036; reference:nessus,10521;
classtype:web-application-attack; sid:1492; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP RBS
ISP /newuser access"; flow:to_server,established; content:"/newuser"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1704;
reference:cve,2000-1036; reference:nessus,10521; classtype:web-application-
activity; sid:1493; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP SIX
webboard generate.cgi attempt"; flow:to_server,established;
content:"/generate.cgi"; http_uri; content:"content=../"; metadata:ruleset
community, service http; reference:bugtraq,3175; reference:cve,2001-1115;
reference:nessus,10725; classtype:web-application-attack; sid:1494; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP SIX
webboard generate.cgi access"; flow:to_server,established; content:"/generate.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3175; reference:cve,2001-1115; reference:nessus,10725;
classtype:web-application-activity; sid:1495; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
spin_client.cgi access"; flow:to_server,established; content:"/spin_client.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10393; classtype:web-application-activity; sid:1496; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8888 (msg:"SERVER-WEBAPP SiteScope
Service access"; flow:to_server,established;
content:"/SiteScope/cgi/go.exe/SiteScope"; metadata:ruleset community;
reference:nessus,10778; classtype:web-application-activity; sid:1499; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ExAir access"; flow:to_server,established; content:"/exair/search/";
fast_pattern:only; http_uri; metadata:policy max-detect-ips drop, ruleset
community, service http; reference:bugtraq,193; reference:cve,1999-0449;
reference:nessus,10002; reference:nessus,10003; reference:nessus,10004;
classtype:web-application-activity; sid:1500; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
a1stats a1disp3.cgi directory traversal attempt"; flow:to_server,established;
content:"/a1disp3.cgi?"; fast_pattern:only; http_uri; content:"/../../";
http_raw_uri; metadata:ruleset community, service http; reference:bugtraq,2705;
reference:cve,2001-0561; reference:nessus,10669; classtype:web-application-attack;
sid:1501; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
a1stats a1disp3.cgi access"; flow:to_server,established; content:"/a1disp3.cgi";
http_uri; metadata:ruleset community, service http; reference:bugtraq,2705;
reference:cve,2001-0561; reference:nessus,10669; classtype:web-application-
activity; sid:1502; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
admentor admin.asp access"; flow:to_server,established;
content:"/admentor/admin/admin.asp"; http_uri; metadata:ruleset community, service
http; reference:bugtraq,4152; reference:cve,2002-0308; reference:nessus,10880;
reference:url,www.securiteam.com/windowsntfocus/5DP0N1F6AW.html; classtype:web-
application-activity; sid:1503; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 7001 (msg:"POLICY-OTHER AFS access";
flow:to_server; content:"|00 00 03 E7 00 00 00 00 00 00 00|e|00 00 00 00 00 00 00
00 0D 05 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:ruleset community;
reference:nessus,10441; classtype:misc-activity; sid:1504; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
alchemy http server PRN arbitrary command execution attempt";
flow:to_server,established; content:"/PRN/"; fast_pattern; http_uri;
content:"../../"; http_raw_uri; metadata:ruleset community, service http;
reference:bugtraq,3599; reference:cve,2001-0871; reference:nessus,10818;
classtype:web-application-activity; sid:1505; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
alchemy http server NUL arbitrary command execution attempt";
flow:to_server,established; content:"/NUL/"; fast_pattern; http_uri;
content:"../../"; http_raw_uri; metadata:ruleset community, service http;
reference:bugtraq,3599; reference:cve,2001-0871; reference:nessus,10818;
classtype:web-application-activity; sid:1506; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
alibaba.pl arbitrary command execution attempt"; flow:to_server,established;
content:"/alibaba.pl|7C|"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,770; reference:cve,1999-0885;
reference:nessus,10013; classtype:web-application-attack; sid:1507; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
alibaba.pl access"; flow:to_server,established; content:"/alibaba.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,770; reference:cve,1999-0885; reference:nessus,10013;
classtype:web-application-activity; sid:1508; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
AltaVista Intranet Search directory traversal attempt"; flow:to_server,established;
content:"/query?mss=.."; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,896; reference:cve,2000-0039;
reference:nessus,10015; classtype:web-application-attack; sid:1509; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
test.bat arbitrary command execution attempt"; flow:to_server,established;
content:"/test.bat|7C|"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,762; reference:cve,1999-0947; reference:nessus,10016;
classtype:web-application-attack; sid:1510; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
test.bat access"; flow:to_server,established; content:"/test.bat";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,762; reference:cve,1999-0947; reference:nessus,10016;
classtype:web-application-activity; sid:1511; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
input.bat arbitrary command execution attempt"; flow:to_server,established;
content:"/input.bat|7C|"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,762; reference:cve,1999-0947;
reference:nessus,10016; classtype:web-application-attack; sid:1512; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
input.bat access"; flow:to_server,established; content:"/input.bat";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,762; reference:cve,1999-0947; reference:nessus,10016;
classtype:web-application-activity; sid:1513; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
input2.bat arbitrary command execution attempt"; flow:to_server,established;
content:"/input2.bat|7C|"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,762; reference:cve,1999-0947;
reference:nessus,10016; classtype:web-application-attack; sid:1514; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
input2.bat access"; flow:to_server,established; content:"/input2.bat";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,762; reference:cve,1999-0947; reference:nessus,10016;
classtype:web-application-activity; sid:1515; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
envout.bat arbitrary command execution attempt"; flow:to_server,established;
content:"/envout.bat|7C|"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,762; reference:cve,1999-0947;
reference:nessus,10016; classtype:web-application-attack; sid:1516; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
envout.bat access"; flow:to_server,established; content:"/envout.bat";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,762; reference:cve,1999-0947; reference:nessus,10016;
classtype:web-application-activity; sid:1517; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"SERVER-WEBAPP nstelemetry.adp
access"; flow:to_server,established; content:"/nstelemetry.adp"; metadata:ruleset
community; reference:nessus,10753; classtype:web-application-activity; sid:1518;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
apache ?M=D directory list attempt"; flow:to_server,established; content:"/?M=D";
http_uri; metadata:ruleset community, service http; reference:bugtraq,3009;
reference:cve,2001-0731; reference:nessus,10704; classtype:web-application-
activity; sid:1519; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
server-info access"; flow:to_server,established; content:"/server-info"; http_uri;
metadata:ruleset community, service http;
reference:url,httpd.apache.org/docs/mod/mod_info.html; classtype:web-application-
activity; sid:1520; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
server-status access"; flow:to_server,established; content:"/server-status";
http_uri; metadata:ruleset community, service http;
reference:url,httpd.apache.org/docs/mod/mod_info.html; classtype:web-application-
activity; sid:1521; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ans.pl attempt"; flow:to_server,established; content:"/ans.pl?"; nocase; http_uri;
content:"p=../../"; distance:0; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4147; reference:bugtraq,4149; reference:cve,2002-
0306; reference:cve,2002-0307; reference:nessus,10875; classtype:web-application-
attack; sid:1522; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ans.pl access"; flow:to_server,established; content:"/ans.pl"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,4147;
reference:bugtraq,4149; reference:cve,2002-0306; reference:cve,2002-0307;
reference:nessus,10875; classtype:web-application-activity; sid:1523; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Axis
Storpoint CD attempt"; flow:to_server,established;
content:"/cd/../config/html/cnf_gi.htm"; metadata:ruleset community, service http;
reference:bugtraq,1025; reference:cve,2000-0191; reference:nessus,10023;
classtype:web-application-attack; sid:1524; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Axis
Storpoint CD access"; flow:to_server,established;
content:"/config/html/cnf_gi.htm"; http_uri; metadata:ruleset community, service
http; reference:bugtraq,1025; reference:cve,2000-0191; reference:nessus,10023;
classtype:web-application-activity; sid:1525; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
basilix sendmail.inc access"; flow:to_server,established;
content:"/inc/sendmail.inc"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2198; reference:cve,2001-1044; reference:nessus,10601;
classtype:web-application-activity; sid:1526; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
basilix mysql.class access"; flow:to_server,established;
content:"/class/mysql.class"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2198; reference:cve,2001-1044; reference:nessus,10601;
classtype:web-application-activity; sid:1527; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
BBoard access"; flow:to_server,established;
content:"/servlet/sunexamples.BBoardServlet"; http_uri; metadata:ruleset community,
service http; reference:bugtraq,1459; reference:cve,2000-0629;
reference:nessus,10507; classtype:web-application-activity; sid:1528; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP SITE overflow
attempt"; flow:to_server,established; content:"SITE"; nocase;
isdataat:100,relative; pcre:"/^SITE(?!\n)\s[^\n]{100}/smi"; metadata:ruleset
community, service ftp; reference:cve,1999-0838; reference:cve,2001-0755;
reference:cve,2001-0770; classtype:attempted-admin; sid:1529; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP bb-
hist.sh attempt"; flow:to_server,established; content:"/bb-hist.sh?"; nocase;
http_uri; content:"HISTFILE=../.."; distance:0; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,142; reference:cve,1999-1462;
reference:nessus,10025; classtype:web-application-attack; sid:1531; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP bb-
hostscv.sh attempt"; flow:to_server,established; content:"/bb-hostsvc.sh?";
fast_pattern:only; http_uri; content:"HOSTSVC"; nocase; http_uri; content:"../..";
distance:0; http_raw_uri; metadata:ruleset community, service http;
reference:bugtraq,1455; reference:cve,2000-0638; reference:nessus,10460;
classtype:web-application-attack; sid:1532; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP bb-
hostscv.sh access"; flow:to_server,established; content:"/bb-hostsvc.sh";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1455; reference:cve,2000-0638; reference:nessus,10460;
classtype:web-application-activity; sid:1533; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
agora.cgi attempt"; flow:to_server,established; content:"/store/agora.cgi?";
nocase; http_uri; content:"cart_id=<SCRIPT>"; distance:0; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,3702;
reference:bugtraq,3976; reference:cve,2001-1199; reference:cve,2002-0215;
reference:nessus,10836; classtype:web-application-attack; sid:1534; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
bizdbsearch access"; flow:to_server,established; content:"/bizdb1-search.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1104; reference:cve,2000-0287; reference:nessus,10383;
classtype:web-application-activity; sid:1535; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
calendar_admin.pl arbitrary command execution attempt"; flow:to_server,established;
content:"/calendar_admin.pl?"; nocase; http_uri; content:"config=|7C|"; distance:0;
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,1215;
reference:cve,2000-0432; reference:nessus,10506; classtype:web-application-attack;
sid:1536; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
calendar_admin.pl access"; flow:to_server,established;
content:"/calendar_admin.pl"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1215; reference:cve,2000-0432; reference:nessus,10506;
classtype:web-application-activity; sid:1537; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP AUTHINFO USER
overflow attempt"; flow:to_server,established; content:"AUTHINFO"; nocase;
content:"USER"; distance:0; nocase; isdataat:200,relative;
pcre:"/^AUTHINFO\s+USER\s[^\n]{200}/smi"; metadata:ruleset community;
reference:bugtraq,1156; reference:cve,2000-0341; reference:nessus,10388;
classtype:attempted-admin; sid:1538; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/cgi-bin/ls access"; flow:to_server,established; content:"/cgi-bin/ls";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,936; reference:cve,2000-0079; reference:nessus,10037;
classtype:web-application-activity; sid:1539; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion ?Mode=debug attempt"; flow:to_server,established; content:"Mode=debug";
nocase; http_uri; metadata:ruleset community, service http; reference:cve,1999-
0760; reference:nessus,10797; classtype:web-application-activity; sid:1540;
rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER version query";
flow:to_server,established; content:"version"; metadata:ruleset community;
classtype:attempted-recon; sid:1541; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cgimail access"; flow:to_server,established; content:"/cgimail"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,1623;
reference:cve,2000-0726; reference:nessus,11721; classtype:web-application-
activity; sid:1542; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cgiwrap access"; flow:to_server,established; content:"/cgiwrap"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,1238;
reference:bugtraq,3084; reference:bugtraq,777; reference:cve,1999-1530;
reference:cve,2000-0431; reference:cve,2001-0987; reference:nessus,10041;
classtype:web-application-activity; sid:1543; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Cisco Catalyst command execution attempt"; flow:to_server,established;
content:"/exec/show/config/cr"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1846; reference:cve,2000-0945;
reference:nessus,10545; classtype:web-application-activity; sid:1544; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-OTHER Cisco
denial of service attempt"; flow:to_server,established; dsize:1; content:"|13|";
metadata:ruleset community, service http; classtype:web-application-attack;
sid:1545; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Cisco HTTP double-percent DOS attempt"; flow:to_server,established; content:"/%%";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1154; reference:cve,2000-0380; reference:nessus,10387;
classtype:web-application-attack; sid:1546; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
csSearch.cgi arbitrary command execution attempt"; flow:to_server,established;
content:"/csSearch.cgi"; http_uri; content:"setup="; content:"`"; content:"`";
distance:1; metadata:ruleset community, service http; reference:bugtraq,4368;
reference:cve,2002-0495; reference:nessus,10924; classtype:web-application-attack;
sid:1547; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
csSearch.cgi access"; flow:to_server,established; content:"/csSearch.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4368; reference:cve,2002-0495; reference:nessus,10924;
classtype:web-application-activity; sid:1548; rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL HELO overflow
attempt"; flow:to_server,established; content:"HELO"; nocase;
isdataat:500,relative; pcre:"/^HELO\s[^\n]{500}/smi"; metadata:ruleset community,
service smtp; reference:bugtraq,7726; reference:bugtraq,895; reference:cve,2000-
0042; reference:nessus,10324; reference:nessus,11674; classtype:attempted-admin;
sid:1549; rev:27;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL ETRN overflow
attempt"; flow:to_server,established; content:"ETRN"; nocase;
isdataat:500,relative; pcre:"/^ETRN\s[^\n]{500}/smi"; metadata:ruleset community,
service smtp; reference:bugtraq,1297; reference:bugtraq,7515; reference:cve,2000-
0490; reference:nessus,10438; classtype:attempted-admin; sid:1550; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/CVS/Entries access"; flow:to_server,established; content:"/CVS/Entries"; http_uri;
metadata:ruleset community, service http; reference:nessus,10922;
reference:nessus,11032; classtype:web-application-activity; sid:1551; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cvsweb version access"; flow:to_server,established; content:"/cvsweb/version";
http_uri; metadata:ruleset community, service http; reference:cve,2000-0670;
reference:nessus,10465; classtype:web-application-activity; sid:1552; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
dbman db.cgi access"; flow:to_server,established; content:"/dbman/db.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1178; reference:cve,2000-0381; reference:nessus,10403;
classtype:web-application-activity; sid:1554; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
DCShop access"; flow:to_server,established; content:"/dcshop"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2889;
reference:cve,2001-0821; classtype:web-application-activity; sid:1555; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
DCShop orders.txt access"; flow:to_server,established;
content:"/orders/orders.txt"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,2889; reference:cve,2001-0821;
classtype:web-application-activity; sid:1556; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
DCShop auth_user_file.txt access"; flow:to_server,established;
content:"/auth_data/auth_user_file.txt"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,2889;
reference:cve,2001-0821; classtype:web-application-activity; sid:1557; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8080 (msg:"SERVER-WEBAPP Delegate whois
overflow attempt"; flow:to_server,established; content:"whois|3A|//"; nocase;
metadata:ruleset community; reference:cve,2000-0165; reference:nessus,10054;
classtype:web-application-activity; sid:1558; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/doc/packages access"; flow:to_server,established; content:"/doc/packages";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1707; reference:cve,2000-1016; reference:nessus,10518;
reference:nessus,11032; classtype:web-application-activity; sid:1559; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/doc/ access"; flow:to_server,established; content:"/doc/"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,318;
reference:cve,1999-0678; classtype:web-application-activity; sid:1560; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP SITE CHOWN
overflow attempt"; flow:to_server,established; content:"SITE"; nocase;
content:"CHOWN"; distance:0; nocase; isdataat:100,relative;
pcre:"/^SITE\s+CHOWN\s[^\n]{100}/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,2120; reference:cve,2001-0065; reference:nessus,10579;
classtype:attempted-admin; sid:1562; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
login.htm attempt"; flow:to_server,established; content:"/login.htm?"; nocase;
http_uri; content:"password="; distance:0; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,665; reference:cve,1999-1533;
classtype:web-application-activity; sid:1563; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
login.htm access"; flow:to_server,established; content:"/login.htm";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,665; reference:cve,1999-1533; classtype:web-application-activity;
sid:1564; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
eshop.pl arbitrary command execution attempt"; flow:to_server,established;
content:"/eshop.pl?"; nocase; http_uri; content:"seite=|3B|"; distance:0; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,3340;
reference:cve,2001-1014; classtype:web-application-attack; sid:1565; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
eshop.pl access"; flow:to_server,established; content:"/eshop.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3340; reference:cve,2001-1014; classtype:web-application-
activity; sid:1566; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
/exchange/root.asp attempt"; flow:to_server,established;
content:"/exchange/root.asp?"; nocase; http_uri; content:"acs=anon"; distance:0;
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,3301;
reference:cve,2001-0660; reference:nessus,10755; reference:nessus,10781;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS01-047;
classtype:web-application-attack; sid:1567; rev:26;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
/exchange/root.asp access"; flow:to_server,established;
content:"/exchange/root.asp"; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,3301; reference:cve,2001-0660; reference:nessus,10755;
reference:nessus,10781; classtype:web-application-activity; sid:1568; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
loadpage.cgi directory traversal attempt"; flow:to_server,established;
content:"/loadpage.cgi"; http_uri; content:"file=../"; fast_pattern:only;
metadata:ruleset community, service http; reference:bugtraq,2109;
reference:cve,2000-1092; reference:nessus,10065; classtype:web-application-attack;
sid:1569; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
loadpage.cgi access"; flow:to_server,established; content:"/loadpage.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2109; reference:cve,2000-1092; reference:nessus,10065;
classtype:web-application-activity; sid:1570; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
dcforum.cgi directory traversal attempt"; flow:to_server,established;
content:"/dcforum.cgi"; http_uri; content:"forum=../.."; metadata:ruleset
community, service http; reference:bugtraq,2611; reference:cve,2001-0436;
reference:cve,2001-0437; reference:nessus,10583; classtype:web-application-attack;
sid:1571; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
commerce.cgi arbitrary file access attempt"; flow:to_server,established;
content:"/commerce.cgi"; http_uri; content:"page="; http_uri; content:"/../";
http_raw_uri; metadata:ruleset community, service http; reference:bugtraq,2361;
reference:cve,2001-0210; reference:nessus,10612; classtype:attempted-recon;
sid:1572; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cgiforum.pl attempt"; flow:to_server,established; content:"/cgiforum.pl?"; nocase;
http_uri; content:"thesection=../.."; distance:0; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1963;
reference:cve,2000-1171; reference:nessus,10552; classtype:web-application-attack;
sid:1573; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
directorypro.cgi attempt"; flow:to_server,established; content:"/directorypro.cgi";
http_uri; content:"show="; content:"../.."; distance:1; metadata:ruleset community,
service http; reference:bugtraq,2793; reference:cve,2001-0780;
reference:nessus,10679; classtype:web-application-attack; sid:1574; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino mab.nsf access"; flow:to_server,established; content:"/mab.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4022; reference:cve,2001-1567; reference:nessus,10953;
classtype:attempted-recon; sid:1575; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino cersvr.nsf access"; flow:to_server,established; content:"/cersvr.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1576; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino setup.nsf access"; flow:to_server,established; content:"/setup.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1577; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino statrep.nsf access"; flow:to_server,established; content:"/statrep.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1578; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino webadmin.nsf access"; flow:to_server,established; content:"/webadmin.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9900; reference:bugtraq,9901; reference:cve,2004-2310;
reference:cve,2004-2311; reference:cve,2004-2369; reference:nessus,10629;
classtype:attempted-recon; sid:1579; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino events4.nsf access"; flow:to_server,established; content:"/events4.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1580; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino ntsync4.nsf access"; flow:to_server,established; content:"/ntsync4.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1581; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino collect4.nsf access"; flow:to_server,established; content:"/collect4.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1582; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino mailw46.nsf access"; flow:to_server,established; content:"/mailw46.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1583; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino bookmark.nsf access"; flow:to_server,established; content:"/bookmark.nsf";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10629; classtype:attempted-recon; sid:1584; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino agentrunner.nsf access"; flow:to_server,established;
content:"/agentrunner.nsf"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:nessus,10629; classtype:attempted-recon;
sid:1585; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Domino mail.box access"; flow:to_server,established; content:"/mail.box";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,881; reference:cve,2000-0021; reference:cve,2000-0022;
reference:cve,2000-0023; reference:nessus,10629; classtype:attempted-recon;
sid:1586; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cgitest.exe access"; flow:to_server,established; content:"/cgitest.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1313; reference:bugtraq,3885; reference:cve,2000-0521;
reference:cve,2002-0128; reference:nessus,10040; reference:nessus,10623;
reference:nessus,11131; classtype:web-application-activity; sid:1587; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
SalesLogix Eviewer access"; flow:to_server,established; content:"/slxweb.dll";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1078; reference:bugtraq,1089; reference:cve,2000-0278;
reference:cve,2000-0289; classtype:web-application-activity; sid:1588; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
musicat empower attempt"; flow:to_server,established; content:"/empower?DB=";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2374; reference:cve,2001-0224; reference:nessus,10609;
classtype:web-application-attack; sid:1589; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
faqmanager.cgi arbitrary file access attempt"; flow:to_server,established;
content:"/faqmanager.cgi?"; nocase; http_uri; content:"toc="; distance:0; nocase;
http_uri; content:"|00|"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,3810; reference:cve,2002-2033;
reference:nessus,10837; classtype:web-application-attack; sid:1590; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
faqmanager.cgi access"; flow:to_server,established; content:"/faqmanager.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3810; reference:cve,2002-2033; reference:nessus,10837;
classtype:web-application-activity; sid:1591; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/fcgi-bin/echo.exe access"; flow:to_server,established; content:"/fcgi-
bin/echo.exe"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:nessus,10838; classtype:web-application-activity; sid:1592;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
FormHandler.cgi external site redirection attempt"; flow:to_server,established;
content:"/FormHandler.cgi"; fast_pattern:only; http_uri; content:"redirect=http";
metadata:ruleset community, service http; reference:bugtraq,798;
reference:bugtraq,799; reference:cve,1999-1050; reference:nessus,10075;
classtype:web-application-attack; sid:1593; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
FormHandler.cgi access"; flow:to_server,established; content:"/FormHandler.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,798; reference:bugtraq,799; reference:cve,1999-1050;
reference:nessus,10075; classtype:web-application-activity; sid:1594; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
htimage.exe access"; flow:to_server,established; content:"/htimage.exe"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,1117;
reference:bugtraq,964; reference:cve,2000-0122; reference:cve,2000-0256;
reference:nessus,10376; classtype:web-application-activity; sid:1595; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
guestbook.cgi access"; flow:to_server,established; content:"/guestbook.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-0237; reference:nessus,10098; classtype:web-application-
activity; sid:1597; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Home
Free search.cgi directory traversal attempt"; flow:to_server,established;
content:"/search.cgi"; http_uri; content:"letter=../"; fast_pattern:only;
metadata:ruleset community, service http; reference:bugtraq,921;
reference:cve,2000-0054; reference:nessus,10101; classtype:web-application-attack;
sid:1598; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
search.cgi access"; flow:to_server,established; content:"/search.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,921; reference:cve,2000-0054; classtype:web-application-activity;
sid:1599; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
htsearch arbitrary configuration file attempt"; flow:to_server,established;
content:"/htsearch?-c"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,3410; reference:cve,2001-0834; classtype:web-
application-attack; sid:1600; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
htsearch arbitrary file read attempt"; flow:to_server,established;
content:"/htsearch?exclude=`"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1026; reference:cve,2000-0208;
reference:nessus,10105; classtype:web-application-attack; sid:1601; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
htsearch access"; flow:to_server,established; content:"/htsearch";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1026; reference:cve,2000-0208; reference:nessus,10105;
classtype:web-application-activity; sid:1602; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
DELETE attempt"; flow:to_server,established; content:"DELETE "; depth:7; nocase;
metadata:ruleset community, service http; reference:nessus,10498; classtype:web-
application-activity; sid:1603; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 4080 (msg:"SERVER-WEBAPP iChat directory
traversal attempt"; flow:to_server,established; content:"/../../"; metadata:ruleset
community; reference:cve,1999-0897; classtype:web-application-activity; sid:1604;
rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 6004 (msg:"SERVER-OTHER iParty DOS
attempt"; flow:to_server,established; content:"|FF FF FF FF FF FF|";
metadata:ruleset community; reference:bugtraq,6844; reference:cve,1999-1566;
reference:nessus,10111; classtype:misc-attack; sid:1605; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP icat
access"; flow:to_server,established; content:"/icat"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:cve,1999-1069; classtype:web-
application-activity; sid:1606; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
HyperSeek hsx.cgi access"; flow:to_server,established; content:"/hsx.cgi";
http_uri; metadata:ruleset community, service http; reference:bugtraq,2314;
reference:cve,2001-0253; reference:nessus,10602; classtype:web-application-
activity; sid:1607; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
htmlscript attempt"; flow:to_server,established; content:"/htmlscript?../..";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2001; reference:cve,1999-0264; reference:nessus,10106;
classtype:web-application-attack; sid:1608; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
formmail arbitrary command execution attempt"; flow:to_server,established;
content:"/formmail"; fast_pattern; nocase; http_uri; content:"%0a"; nocase;
metadata:ruleset community, service http; reference:bugtraq,1187;
reference:bugtraq,2079; reference:cve,1999-0172; reference:cve,2000-0411;
reference:nessus,10076; reference:nessus,10782; classtype:web-application-attack;
sid:1610; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
eXtropia webstore access"; flow:to_server,established; content:"/web_store.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1774; reference:cve,2000-1005; reference:nessus,10532;
classtype:web-application-activity; sid:1611; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ftp.pl attempt"; flow:to_server,established; content:"/ftp.pl?"; nocase; http_uri;
content:"dir=../.."; distance:0; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,1471; reference:cve,2000-0674;
reference:nessus,10467; classtype:web-application-attack; sid:1612; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
handler attempt"; flow:to_server,established; content:"/handler"; http_uri;
content:"|7C|"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:bugtraq,380; reference:cve,1999-0148; reference:nessus,10100;
classtype:web-application-attack; sid:1613; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Novell Groupwise gwweb.exe attempt"; flow:to_server,established;
content:"/GWWEB.EXE?"; nocase; http_uri; content:"HELP="; distance:0; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,879;
reference:cve,1999-1005; reference:cve,1999-1006; reference:nessus,10877;
classtype:attempted-recon; sid:1614; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
htgrep attempt"; flow:to_server,established; content:"/htgrep"; http_uri;
content:"hdr=/"; metadata:ruleset community, service http; reference:cve,2000-0832;
reference:nessus,10495; classtype:web-application-attack; sid:1615; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS named version
attempt"; flow:to_server; content:"|07|version"; offset:12; nocase; content:"|04|
bind|00|"; offset:12; nocase; metadata:ruleset community, service dns;
reference:nessus,10028; classtype:attempted-recon; sid:1616; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Bugzilla doeditvotes.cgi access"; flow:to_server,established;
content:"/doeditvotes.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,3800; reference:cve,2002-0011;
classtype:web-application-activity; sid:1617; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS .asp
chunked Transfer-Encoding"; flow:to_server,established; content:".asp"; nocase;
http_uri; content:"Transfer-Encoding|3A|"; nocase; http_header; content:"chunked";
nocase; http_header; metadata:ruleset community, service http;
reference:bugtraq,4474; reference:bugtraq,4485; reference:cve,2002-0071;
reference:cve,2002-0079; reference:nessus,10932; classtype:web-application-attack;
sid:1618; rev:26;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP CMD overflow
attempt"; flow:to_server,established; content:"CMD"; nocase; isdataat:200,relative;
pcre:"/^CMD(?!\n)\s[^\n]{200}/smi"; metadata:ruleset community, service ftp;
classtype:attempted-admin; sid:1621; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP RNFR ././
attempt"; flow:to_server,established; content:"RNFR "; fast_pattern:only; content:"
././"; metadata:ruleset community, service ftp; reference:cve,1999-0081;
classtype:misc-attack; sid:1622; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP invalid MODE";
flow:to_server,established; content:"MODE"; fast_pattern:only; pcre:"/^MODE\s+
[^ABSC]{1}/msi"; metadata:ruleset community, service ftp;
reference:url,www.faqs.org/rfcs/rfc959.html; classtype:protocol-command-decode;
sid:1623; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP PWD overflow
attempt"; flow:to_server,established; content:"PWD"; nocase; isdataat:190,relative;
pcre:"/^PWD\s.{190}/smi"; metadata:ruleset community, service ftp;
classtype:protocol-command-decode; sid:1624; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP SYST overflow
attempt"; flow:to_server,established; content:"SYST"; nocase;
isdataat:100,relative; pcre:"/^SYST(?!\n)\s[^\n]{100}/smi"; metadata:ruleset
community, service ftp; reference:url,www.faqs.org/rfcs/rfc959.html;
classtype:protocol-command-decode; sid:1625; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
/StoreCSVS/InstantOrder.asmx request"; flow:to_server,established;
content:"/StoreCSVS/InstantOrder.asmx"; nocase; http_uri; metadata:ruleset
community, service http; classtype:web-application-activity; sid:1626; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
FormHandler.cgi directory traversal attempt attempt"; flow:to_server,established;
content:"/FormHandler.cgi"; nocase; http_uri; content:"reply_message_attach=";
fast_pattern:only; content:"/../"; metadata:ruleset community, service http;
reference:bugtraq,798; reference:bugtraq,799; reference:cve,1999-1050;
reference:nessus,10075; classtype:web-application-attack; sid:1628; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP PASS overflow
attempt"; flow:to_server,established; content:"PASS"; nocase; isdataat:50,relative;
pcre:"/^PASS\s[^\n]{50}/smi"; metadata:policy max-detect-ips drop, ruleset
community, service pop3; reference:bugtraq,21645; reference:bugtraq,791;
reference:cve,1999-1511; reference:cve,2006-6605; reference:nessus,10325;
classtype:attempted-admin; sid:1634; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP APOP overflow
attempt"; flow:to_server,established; content:"APOP"; nocase;
isdataat:256,relative; pcre:"/^APOP\s[^\n]{256}/smi"; metadata:ruleset community,
service pop3; reference:bugtraq,1652; reference:cve,2000-0840; reference:cve,2000-
0841; reference:nessus,10559; classtype:attempted-admin; sid:1635; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 32000 (msg:"SERVER-OTHER Xtramail
Username overflow attempt"; flow:to_server,established; content:"Username|3A|";
nocase; isdataat:100,relative; pcre:"/^Username\:[^\n]{100}/smi"; metadata:ruleset
community; reference:bugtraq,791; reference:cve,1999-1511; reference:nessus,10323;
classtype:attempted-admin; sid:1636; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP yabb
access"; flow:to_server,established; content:"/YaBB"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1668;
reference:cve,2000-0853; reference:nessus,10512; classtype:attempted-recon;
sid:1637; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"INDICATOR-SCAN SSH Version map
attempt"; flow:to_server,established; content:"Version_Mapper"; fast_pattern:only;
metadata:ruleset community; classtype:network-scan; sid:1638; rev:9;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 6666:7000 (msg:"POLICY-SOCIAL IRC DCC
file transfer request"; flow:to_server,established; content:"PRIVMSG "; nocase;
content:" |3A|.DCC SEND"; distance:0; fast_pattern; nocase; metadata:ruleset
community; classtype:policy-violation; sid:1639; rev:13;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 6666:7000 (msg:"POLICY-SOCIAL IRC DCC
chat request"; flow:to_server,established; content:"PRIVMSG "; nocase; content:" |
3A|.DCC CHAT chat"; distance:0; fast_pattern; nocase; metadata:ruleset community;
classtype:policy-violation; sid:1640; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 6789:6790 (msg:"SERVER-OTHER DB2 dos
attempt"; flow:to_server,established; dsize:1; metadata:ruleset community;
reference:bugtraq,3010; reference:cve,2001-1143; reference:nessus,10871;
classtype:denial-of-service; sid:1641; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
document.d2w access"; flow:to_server,established; content:"/document.d2w";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2017; reference:cve,2000-1110; classtype:web-application-
activity; sid:1642; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
db2www access"; flow:to_server,established; content:"/db2www"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:cve,2000-0677;
classtype:web-application-activity; sid:1643; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
test-cgi attempt"; flow:to_server,established; content:"/test-cgi/*?*";
fast_pattern:only; http_uri; metadata:policy max-detect-ips drop, ruleset
community, service http; reference:bugtraq,2003; reference:cve,1999-0070;
reference:nessus,10282; classtype:web-application-attack; sid:1644; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
testcgi access"; flow:to_server,established; content:"/testcgi"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,7214;
reference:cve,2003-1531; reference:nessus,11610; classtype:web-application-
activity; sid:1645; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
test.cgi access"; flow:to_server,established; content:"/test.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:web-application-activity; sid:1646; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
perl.exe command attempt"; flow:to_server,established; content:"/perl.exe?";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-0509; reference:nessus,10173;
reference:url,www.cert.org/advisories/CA-1996-11.html; classtype:attempted-recon;
sid:1648; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP perl
command attempt"; flow:to_server,established; content:"/perl?"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:cve,1999-0509;
reference:nessus,10173; reference:url,www.cert.org/advisories/CA-1996-11.html;
classtype:attempted-recon; sid:1649; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
tst.bat access"; flow:to_server,established; content:"/tst.bat"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,770;
reference:cve,1999-0885; reference:nessus,10014; classtype:web-application-
activity; sid:1650; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
environ.pl access"; flow:to_server,established; content:"/environ.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:web-application-activity; sid:1651; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
campas attempt"; flow:to_server,established; content:"/campas?|0A|";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1975; reference:cve,1999-0146; reference:nessus,10035;
classtype:web-application-attack; sid:1652; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cart32.exe access"; flow:to_server,established; content:"/cart32.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1153; reference:nessus,10389; classtype:web-application-activity;
sid:1654; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
pfdispaly.cgi arbitrary command execution attempt"; flow:to_server,established;
content:"/pfdispaly.cgi?"; nocase; http_uri; content:"'"; distance:0; nocase;
http_uri; metadata:ruleset community, service http; reference:cve,1999-0270;
reference:nessus,10174; classtype:web-application-attack; sid:1655; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
pfdispaly.cgi access"; flow:to_server,established; content:"/pfdispaly.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,64; reference:cve,1999-0270; reference:nessus,10174;
classtype:web-application-activity; sid:1656; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
pagelog.cgi directory traversal attempt"; flow:to_server,established;
content:"/pagelog.cgi"; nocase; http_uri; content:"name=../"; fast_pattern:only;
metadata:ruleset community, service http; reference:bugtraq,1864;
reference:cve,2000-0940; reference:nessus,10591; classtype:web-application-
activity; sid:1657; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
pagelog.cgi access"; flow:to_server,established; content:"/pagelog.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1864; reference:cve,2000-0940; reference:nessus,10591;
classtype:web-application-activity; sid:1658; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-OTHER Adobe
Coldfusion sendmail.cfm access"; flow:to_server,established;
content:"/sendmail.cfm"; nocase; http_uri; metadata:ruleset community, service
http; reference:cve,1999-0760; reference:cve,2001-0535; classtype:attempted-recon;
sid:1659; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
trace.axd access"; flow:to_server,established; content:"/trace.axd"; nocase;
http_uri; metadata:ruleset community, service http; reference:nessus,10993;
classtype:web-application-activity; sid:1660; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
cmd32.exe access"; flow:to_server,established; content:"cmd32.exe"; nocase;
http_uri; metadata:ruleset community, service http; classtype:web-application-
attack; sid:1661; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/~ftp access"; flow:to_server,established; content:"/~ftp"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:attempted-recon;
sid:1662; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP *
%20.pl access"; flow:to_server,established; content:" .pl"; fast_pattern:only;
http_uri; pcre:"/\/[^\r\n]*\x20.pl/Ui"; metadata:ruleset community, service http;
reference:nessus,11007; reference:url,rtfm.vn.ua/inet/sec/cgi-bugs.htm;
reference:url,www.securityfocus.com/archive/1/149482; classtype:web-application-
attack; sid:1663; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
mkplog.exe access"; flow:to_server,established; content:"/mkplog.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:web-application-activity; sid:1664; rev:13;)
# alert tcp $HTTP_SERVERS $HTTP_PORTS -> $EXTERNAL_NET any (msg:"INDICATOR-
COMPROMISE index of /cgi-bin/ response"; flow:to_client,established; file_data;
content:"Index of /cgi-bin/"; nocase; metadata:ruleset community, service http;
reference:nessus,10039; classtype:bad-unknown; sid:1666; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cross site scripting HTML Image tag set to javascript attempt";
flow:to_server,established; content:"img src=javascript"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,4858;
reference:cve,2002-0902; classtype:web-application-attack; sid:1667; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/cgi-bin/ access"; flow:to_server,established; content:"/cgi-bin/"; http_uri;
content:"/cgi-bin/ HTTP"; fast_pattern:only; metadata:ruleset community, service
http; classtype:web-application-attack; sid:1668; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/cgi-dos/ access"; flow:to_server,established; content:"/cgi-dos/"; http_uri;
content:"/cgi-dos/ HTTP"; fast_pattern:only; metadata:ruleset community, service
http; classtype:web-application-attack; sid:1669; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/home/ftp access"; flow:to_server,established; content:"/home/ftp";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,11032; classtype:web-application-activity; sid:1670; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/home/www access"; flow:to_server,established; content:"/home/www";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,11032; classtype:web-application-activity; sid:1671; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP CWD ~ attempt";
flow:to_server,established; content:"CWD"; fast_pattern:only; pcre:"/^CWD\s+~/smi";
metadata:policy max-detect-ips drop, ruleset community, service ftp;
reference:bugtraq,2601; reference:bugtraq,9215; reference:cve,2001-0421;
classtype:denial-of-service; sid:1672; rev:22;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
EXECUTE_SYSTEM attempt"; flow:to_server,established; content:"EXECUTE_SYSTEM";
nocase; metadata:ruleset community; classtype:system-call-detect; sid:1673; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
connect_data remote version detection attempt"; flow:to_server,established;
content:"connect_data|28|command=version|29|"; nocase; metadata:ruleset community;
classtype:protocol-command-decode; sid:1674; rev:8;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
misparsed login response"; flow:to_client,established; content:"description=|28|";
nocase; content:!"connect_data=|28|sid="; nocase; content:!"address=|28|
protocol=tcp"; nocase; metadata:ruleset community; classtype:suspicious-login;
sid:1675; rev:8;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
select union attempt"; flow:to_server,established; content:"select "; nocase;
content:" union "; nocase; metadata:ruleset community; classtype:protocol-command-
decode; sid:1676; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
select like '%' attempt"; flow:to_server,established; content:" where "; nocase;
content:" like '%'"; nocase; metadata:ruleset community; classtype:protocol-
command-decode; sid:1677; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
select like '%' attempt backslash escaped"; flow:to_server,established; content:"
where "; nocase; content:" like |22|%|22|"; nocase; metadata:ruleset community;
classtype:protocol-command-decode; sid:1678; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
describe attempt"; flow:to_server,established; content:"describe "; nocase;
metadata:ruleset community; classtype:protocol-command-decode; sid:1679; rev:8;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
all_constraints access"; flow:to_server,established; content:"all_constraints";
nocase; metadata:ruleset community; classtype:protocol-command-decode; sid:1680;
rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
all_views access"; flow:to_server,established; content:"all_views"; nocase;
metadata:ruleset community; classtype:protocol-command-decode; sid:1681; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
all_source access"; flow:to_server,established; content:"all_source"; nocase;
metadata:ruleset community; classtype:protocol-command-decode; sid:1682; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
all_tables access"; flow:to_server,established; content:"all_tables"; nocase;
metadata:ruleset community; classtype:protocol-command-decode; sid:1683; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
all_tab_columns access"; flow:to_server,established; content:"all_tab_columns";
nocase; metadata:ruleset community; classtype:protocol-command-decode; sid:1684;
rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
all_tab_privs access"; flow:to_server,established; content:"all_tab_privs"; nocase;
metadata:ruleset community; classtype:protocol-command-decode; sid:1685; rev:8;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dba_tablespace access"; flow:to_server,established; content:"dba_tablespace";
nocase; metadata:ruleset community; classtype:protocol-command-decode; sid:1686;
rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dba_tables access"; flow:to_server,established; content:"dba_tables"; nocase;
metadata:ruleset community; classtype:protocol-command-decode; sid:1687; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
user_tablespace access"; flow:to_server,established; content:"user_tablespace";
nocase; metadata:ruleset community; classtype:protocol-command-decode; sid:1688;
rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.all_users access"; flow:to_server,established; content:"sys.all_users"; nocase;
metadata:ruleset community; classtype:protocol-command-decode; sid:1689; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
grant attempt"; flow:to_server,established; content:"grant "; nocase; content:" to
"; nocase; metadata:ruleset community; classtype:protocol-command-decode; sid:1690;
rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
ALTER USER attempt"; flow:to_server,established; content:"alter user"; nocase;
content:" identified by "; nocase; metadata:ruleset community; classtype:protocol-
command-decode; sid:1691; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
drop table attempt"; flow:to_server,established; content:"drop table"; nocase;
metadata:ruleset community; classtype:protocol-command-decode; sid:1692; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
create table attempt"; flow:to_server,established; content:"create table"; nocase;
metadata:ruleset community; classtype:protocol-command-decode; sid:1693; rev:8;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
alter table attempt"; flow:to_server,established; content:"alter table"; nocase;
metadata:ruleset community; classtype:protocol-command-decode; sid:1694; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
truncate table attempt"; flow:to_server,established; content:"truncate table";
nocase; metadata:ruleset community; classtype:protocol-command-decode; sid:1695;
rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
create database attempt"; flow:to_server,established; content:"create database";
nocase; metadata:ruleset community; classtype:protocol-command-decode; sid:1696;
rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
alter database attempt"; flow:to_server,established; content:"alter database";
nocase; metadata:ruleset community; classtype:protocol-command-decode; sid:1697;
rev:7;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
imagemap.exe access"; flow:to_server,established; content:"/imagemap.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,739; reference:cve,1999-0951; reference:nessus,10122;
classtype:web-application-activity; sid:1700; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
calendar-admin.pl access"; flow:to_server,established; content:"/calendar-
admin.pl"; fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1215; reference:cve,2000-0432; reference:nessus,10506;
classtype:web-application-activity; sid:1701; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Amaya templates sendtemp.pl access"; flow:to_server,established;
content:"/sendtemp.pl"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,2504; reference:cve,2001-0272; classtype:web-
application-activity; sid:1702; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
auktion.cgi directory traversal attempt"; flow:to_server,established;
content:"/auktion.cgi"; fast_pattern; nocase; http_uri; content:"menue=../../";
nocase; metadata:ruleset community, service http; reference:bugtraq,2367;
reference:cve,2001-0212; reference:nessus,10638; classtype:web-application-attack;
sid:1703; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cal_make.pl directory traversal attempt"; flow:to_server,established;
content:"/cal_make.pl"; nocase; http_uri; content:"p0=../../"; fast_pattern:only;
metadata:ruleset community, service http; reference:bugtraq,2663;
reference:cve,2001-0463; reference:nessus,10664; classtype:web-application-attack;
sid:1704; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
echo.bat arbitrary command execution attempt"; flow:to_server,established;
content:"/echo.bat"; http_uri; content:"&"; metadata:ruleset community, service
http; reference:bugtraq,1002; reference:cve,2000-0213; reference:nessus,10246;
classtype:web-application-attack; sid:1705; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
echo.bat access"; flow:to_server,established; content:"/echo.bat";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1002; reference:cve,2000-0213; reference:nessus,10246;
classtype:web-application-activity; sid:1706; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
hello.bat arbitrary command execution attempt"; flow:to_server,established;
content:"/hello.bat"; http_uri; content:"&"; metadata:ruleset community, service
http; reference:bugtraq,1002; reference:cve,2000-0213; reference:nessus,10246;
classtype:web-application-attack; sid:1707; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
hello.bat access"; flow:to_server,established; content:"/hello.bat";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1002; reference:cve,2000-0213; reference:nessus,10246;
classtype:web-application-activity; sid:1708; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ad.cgi access"; flow:to_server,established; content:"/ad.cgi"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,2103;
reference:cve,2001-0025; reference:nessus,11464; classtype:web-application-
activity; sid:1709; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
bbs_forum.cgi access"; flow:to_server,established; content:"/bbs_forum.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2177; reference:cve,2001-0123;
reference:url,www.cgisecurity.com/advisory/3.1.txt; classtype:web-application-
activity; sid:1710; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
bsguest.cgi access"; flow:to_server,established; content:"/bsguest.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2159; reference:cve,2001-0099; classtype:web-application-
activity; sid:1711; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
bslist.cgi access"; flow:to_server,established; content:"/bslist.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2160; reference:cve,2001-0100; classtype:web-application-
activity; sid:1712; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cgforum.cgi access"; flow:to_server,established; content:"/cgforum.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1951; reference:cve,2000-1132; classtype:web-application-
activity; sid:1713; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
newdesk access"; flow:to_server,established; content:"/newdesk"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:web-application-
activity; sid:1714; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
register.cgi access"; flow:to_server,established; content:"/register.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2157; reference:cve,2001-0076; classtype:web-application-
activity; sid:1715; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
gbook.cgi access"; flow:to_server,established; content:"/gbook.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1940; reference:cve,2000-1131; classtype:web-application-
activity; sid:1716; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
simplestguest.cgi access"; flow:to_server,established;
content:"/simplestguest.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,2106; reference:cve,2001-0022;
classtype:web-application-activity; sid:1717; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
statsconfig.pl access"; flow:to_server,established; content:"/statsconfig.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2211; reference:cve,2001-0113; classtype:web-application-
activity; sid:1718; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
talkback.cgi directory traversal attempt"; flow:to_server,established;
content:"/talkbalk.cgi"; nocase; http_uri; content:"article=../../";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,2547; reference:cve,2001-0420; classtype:web-application-attack;
sid:1719; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
talkback.cgi access"; flow:to_server,established; content:"/talkbalk.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2547; reference:cve,2001-0420; classtype:web-application-
activity; sid:1720; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
adcycle access"; flow:to_server,established; content:"/adcycle"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,3741;
reference:cve,2001-1226; classtype:web-application-activity; sid:1721; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
MachineInfo access"; flow:to_server,established; content:"/MachineInfo";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1067; classtype:web-application-activity; sid:1722; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
emumail.cgi NULL attempt"; flow:to_server,established; content:"/emumail.cgi";
http_uri; content:"type="; nocase; content:"%00"; metadata:ruleset community,
service http; reference:bugtraq,5824; reference:cve,2002-1526; classtype:web-
application-activity; sid:1723; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
emumail.cgi access"; flow:to_server,established; content:"/emumail.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,5824; reference:cve,2002-1526; classtype:web-application-
activity; sid:1724; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS +.htr
code fragment attempt"; flow:to_server,established; content:" .htr"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,1488;
reference:cve,2000-0630; reference:cve,2001-0004; reference:nessus,10680;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS00-044;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms01-004 ;
classtype:web-application-attack; sid:1725; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
doctodep.btr access"; flow:to_server,established; content:"doctodep.btr"; http_uri;
metadata:ruleset community, service http; classtype:web-application-activity;
sid:1726; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP SGI
InfoSearch fname access"; flow:to_server,established; content:"/infosrch.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1031; reference:cve,2000-0207; classtype:web-application-
activity; sid:1727; rev:20;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 6666:7000 (msg:"POLICY-SOCIAL IRC
channel join"; flow:to_server,established; dsize:<140; content:"JOIN "; pcre:"/(&|
#|\+|!)/R"; metadata:ruleset community; classtype:policy-violation; sid:1729;
rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ustorekeeper.pl directory traversal attempt"; flow:to_server,established;
content:"/ustorekeeper.pl"; nocase; http_uri; content:"file=../../";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,2536; reference:cve,2001-0466; reference:nessus,10645;
classtype:web-application-attack; sid:1730; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
a1stats access"; flow:to_server,established; content:"/a1stats/"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,2705;
reference:cve,2001-0561; reference:nessus,10669; classtype:web-application-
activity; sid:1731; rev:14;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap rwalld
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 A8|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc;
reference:bugtraq,205; reference:cve,1999-0181; classtype:rpc-portmap-decode;
sid:1732; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap rwalld
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
A8|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; reference:bugtraq,205; reference:cve,1999-0181;
classtype:rpc-portmap-decode; sid:1733; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP USER overflow
attempt"; flow:to_server,established; content:"USER"; nocase;
isdataat:100,relative; pcre:"/^USER(?!\n)\s[^\n]{100}/smi"; metadata:policy max-
detect-ips drop, ruleset community, service ftp; reference:bugtraq,10078;
reference:bugtraq,10720; reference:bugtraq,1227; reference:bugtraq,1504;
reference:bugtraq,15352; reference:bugtraq,1690; reference:bugtraq,22044;
reference:bugtraq,22045; reference:bugtraq,4638; reference:bugtraq,49750;
reference:bugtraq,7307; reference:bugtraq,8376; reference:cve,1999-1510;
reference:cve,1999-1514; reference:cve,1999-1519; reference:cve,1999-1539;
reference:cve,2000-0479; reference:cve,2000-0656; reference:cve,2000-0761;
reference:cve,2000-0943; reference:cve,2000-1194; reference:cve,2001-0256;
reference:cve,2001-0794; reference:cve,2001-0826; reference:cve,2002-0126;
reference:cve,2002-1522; reference:cve,2003-0271; reference:cve,2004-0286;
reference:cve,2004-0695; reference:cve,2005-3683; classtype:attempted-admin;
sid:1734; rev:50;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"BROWSER-OTHER Mozilla
Netscape XMLHttpRequest local file read attempt"; flow:to_client,established;
file_data; content:"new XMLHttpRequest|28|"; content:"file|3A|//"; nocase;
metadata:ruleset community, service http; reference:bugtraq,4628;
reference:cve,2002-0354; classtype:web-application-attack; sid:1735; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
squirrel mail spell-check arbitrary command attempt"; flow:to_server,established;
content:"/squirrelspell/modules/check_me.mod.php"; fast_pattern; nocase; http_uri;
content:"SQSPELL_APP["; nocase; metadata:ruleset community, service http;
reference:bugtraq,3952; classtype:web-application-attack; sid:1736; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
squirrel mail theme arbitrary command attempt"; flow:to_server,established;
content:"/left_main.php"; nocase; http_uri; content:"cmdd="; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,4385;
reference:cve,2002-0516; classtype:web-application-attack; sid:1737; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
global.inc access"; flow:to_server,established; content:"/global.inc";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4612; reference:cve,2002-0614; classtype:web-application-attack;
sid:1738; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
DNSTools administrator authentication bypass attempt"; flow:to_server,established;
content:"/dnstools.php"; nocase; http_uri; content:"user_logged_in=true"; nocase;
http_uri; content:"user_dnstools_administrator=true"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,4617;
reference:cve,2002-0613; classtype:web-application-attack; sid:1739; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
DNSTools authentication bypass attempt"; flow:to_server,established;
content:"/dnstools.php"; fast_pattern; nocase; http_uri;
content:"user_logged_in=true"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4617; reference:cve,2002-0613; classtype:web-application-attack;
sid:1740; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
DNSTools access"; flow:to_server,established; content:"/dnstools.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4617; reference:cve,2002-0613; classtype:web-application-
activity; sid:1741; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Blahz-DNS dostuff.php modify user attempt"; flow:to_server,established;
content:"/dostuff.php?"; nocase; http_uri; content:"action=modify_user";
distance:0; nocase; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4618; reference:cve,2002-0599; classtype:web-application-attack;
sid:1742; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Blahz-DNS dostuff.php access"; flow:to_server,established; content:"/dostuff.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4618; reference:cve,2002-0599; classtype:web-application-
activity; sid:1743; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
SecureSite authentication bypass attempt"; flow:to_server,established;
content:"secure_site, ok"; nocase; metadata:ruleset community, service http;
reference:bugtraq,4621; classtype:web-application-attack; sid:1744; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Messagerie supp_membre.php access"; flow:to_server,established;
content:"/supp_membre.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,4635; classtype:web-application-
activity; sid:1745; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap cachefsd
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 87 8B|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc;
reference:bugtraq,4674; reference:cve,2002-0033; reference:cve,2002-0084;
reference:nessus,10951; classtype:rpc-portmap-decode; sid:1746; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap cachefsd
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 87
8B|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; reference:bugtraq,4674; reference:cve,2002-0033;
reference:cve,2002-0084; reference:nessus,10951; classtype:rpc-portmap-decode;
sid:1747; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
users.xml access"; flow:to_server,established; content:"/users.xml"; nocase;
http_uri; metadata:ruleset community, service http; classtype:web-application-
activity; sid:1750; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 32772:34000 (msg:"SERVER-OTHER cachefsd
buffer overflow attempt"; flow:to_server,established; isdataat:720; content:"|00 01
87 86 00 00 00 01 00 00 00 05|"; fast_pattern:only; metadata:ruleset community;
reference:bugtraq,4631; reference:cve,2002-0084; reference:nessus,10951;
classtype:misc-attack; sid:1751; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
as_web.exe access"; flow:to_server,established; content:"/as_web.exe"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,4670;
reference:cve,2002-1727; reference:cve,2002-1728; classtype:web-application-
activity; sid:1753; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
as_web4.exe access"; flow:to_server,established; content:"/as_web4.exe"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,4670;
reference:cve,2002-1727; reference:cve,2002-1728; classtype:web-application-
activity; sid:1754; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP partial body
buffer overflow attempt"; flow:to_server,established; content:"PARTIAL"; nocase;
content:"BODY["; distance:0; nocase; isdataat:1024,relative; pcre:"/\sPARTIAL.*?
BODY\[[^\]]{1024}/smi"; metadata:ruleset community, service imap;
reference:bugtraq,4713; reference:cve,2002-0379; reference:nessus,10966;
classtype:misc-attack; sid:1755; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS NewsPro
administration authentication attempt"; flow:to_server,established;
content:"logged,true"; metadata:ruleset community, service http;
reference:bugtraq,4672; reference:cve,2002-1734; classtype:web-application-
activity; sid:1756; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP b2
arbitrary command execution attempt"; flow:to_server,established; content:"/b2/b2-
include/"; http_uri; content:"b2inc"; content:"http|3A|//"; metadata:ruleset
community, service http; reference:bugtraq,4673; reference:cve,2002-0734;
reference:cve,2002-1466; reference:nessus,11667; classtype:web-application-attack;
sid:1757; rev:14;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 445 (msg:"SQL xp_cmdshell program
execution 445"; flow:to_server,established; content:"x|00|p|00|_|00|c|00|m|00|d|00|
s|00|h|00|e|00|l|00|l|00|"; fast_pattern:only; metadata:ruleset community;
reference:bugtraq,5309; classtype:attempted-user; sid:1759; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP phf
arbitrary command execution attempt"; flow:to_server,established; content:"/phf";
fast_pattern; nocase; http_uri; content:"QALIAS"; nocase; content:"%0a"; nocase;
metadata:policy max-detect-ips drop, ruleset community, service http;
reference:bugtraq,629; reference:cve,1999-0067; classtype:web-application-attack;
sid:1762; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Nortel Contivity cgiproc DOS attempt"; flow:to_server,established;
content:"/cgiproc?Nocfile="; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,938; reference:cve,2000-0063;
reference:cve,2000-0064; reference:nessus,10160; classtype:web-application-attack;
sid:1763; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Nortel Contivity cgiproc DOS attempt"; flow:to_server,established;
content:"/cgiproc?|24|"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,938; reference:cve,2000-0063; reference:cve,2000-
0064; reference:nessus,10160; classtype:web-application-attack; sid:1764; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Nortel Contivity cgiproc access"; flow:to_server,established; content:"/cgiproc";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,938; reference:cve,2000-0063; reference:cve,2000-0064;
reference:nessus,10160; classtype:web-application-activity; sid:1765; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
search.dll directory listing attempt"; flow:to_server,established;
content:"/search.dll"; http_uri; content:"query=%00"; metadata:ruleset community,
service http; reference:bugtraq,1684; reference:cve,2000-0835;
reference:nessus,10514; classtype:web-application-attack; sid:1766; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
search.dll access"; flow:to_server,established; content:"/search.dll"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1684;
reference:cve,2000-0835; reference:nessus,10514; classtype:web-application-
activity; sid:1767; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.DS_Store access"; flow:to_server,established; content:"/.DS_Store"; http_uri;
metadata:ruleset community, service http;
reference:url,www.macintouch.com/mosxreaderreports46.html; classtype:web-
application-activity; sid:1769; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
.FBCIndex access"; flow:to_server,established; content:"/.FBCIndex"; http_uri;
metadata:ruleset community, service http;
reference:url,www.securiteam.com/securitynews/5LP0O005FS.html; classtype:web-
application-activity; sid:1770; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500 (msg:"POLICY-OTHER IPSec PGPNet
connection attempt"; flow:to_server; content:"|00 00 00 00 00 00 00 00 00 00 00 00
00 00 01 10 02 00 00 00 00 00 00 00 00 88 0D 00 00 5C 00 00 00 01 00 00 00 01 00 00
00|P|01 01 00 02 03 00 00 24 01 01 00 00 80 01 00 06 80 02 00 02 80 03 00 03 80 04
00 05 80 0B 00 01 00 0C 00 04 00 01|Q|80 00 00 00 24 02 01 00 00 80 01 00 05 80 02
00 01 80 03 00 03 80 04 00 02 80 0B 00 01 00 0C 00 04 00 01|Q|80 00 00 00 10|";
fast_pattern:only; metadata:ruleset community; classtype:protocol-command-decode;
sid:1771; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
pbserver access"; flow:to_server,established; content:"/pbserver/pbserver.dll";
nocase; http_uri; metadata:ruleset community, service http; reference:cve,2000-
1089; reference:url,technet.microsoft.com/en-us/security/bulletin/ms00-094;
classtype:web-application-activity; sid:1772; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
php.exe access"; flow:to_server,established; content:"/php.exe"; fast_pattern:only;
http_uri; metadata:ruleset community, service http;
reference:url,www.securitytracker.com/alerts/2002/Jan/1003104.html; classtype:web-
application-activity; sid:1773; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
bb_smilies.php access"; flow:to_server,established; content:"/bb_smilies.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:url,www.securiteam.com/securitynews/Serious_security_hole_in_PHP-
Nuke__bb_smilies_.html; classtype:web-application-activity; sid:1774; rev:15;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"SERVER-MYSQL root login
attempt"; flow:to_server,established; content:"|0A 00 00 01 85 04 00 00 80|root|
00|"; fast_pattern:only; metadata:ruleset community, service mysql;
classtype:protocol-command-decode; sid:1775; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"SERVER-MYSQL show
databases attempt"; flow:to_server,established; content:"|0F 00 00 00 03|show
databases"; fast_pattern:only; metadata:ruleset community, service mysql;
classtype:protocol-command-decode; sid:1776; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP EXPLOIT STAT
asterisk dos attempt"; flow:to_server,established; content:"STAT";
fast_pattern:only; pcre:"/^STAT\s+[^\n]*\x2a/smi"; metadata:ruleset community,
service ftp; reference:bugtraq,4482; reference:cve,2002-0073;
reference:nessus,10934; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS02-018; classtype:attempted-dos; sid:1777; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP EXPLOIT STAT ? dos
attempt"; flow:to_server,established; content:"STAT"; fast_pattern:only;
pcre:"/^STAT\s+[^\n]*\x3f/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,4482; reference:cve,2002-0073; reference:nessus,10934;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS02-018;
classtype:attempted-dos; sid:1778; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
csPassword.cgi access"; flow:to_server,established; content:"/csPassword.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4885; reference:bugtraq,4886; reference:bugtraq,4887;
reference:bugtraq,4889; reference:cve,2002-0917; reference:cve,2002-0918;
classtype:web-application-activity; sid:1787; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
csPassword password.cgi.tmp access"; flow:to_server,established;
content:"/password.cgi.tmp"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,4889; reference:cve,2002-0920;
classtype:web-application-activity; sid:1788; rev:11;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 6666:7000 (msg:"POLICY-SOCIAL IRC dns
request"; flow:to_server,established; content:"USERHOST "; metadata:ruleset
community; classtype:policy-violation; sid:1789; rev:12;)
# alert tcp $EXTERNAL_NET 6666:7000 -> $HOME_NET any (msg:"POLICY-SOCIAL IRC dns
response"; flow:to_client,established; content:"|3A|"; content:" 302 ";
content:"=+"; fast_pattern:only; metadata:ruleset community; classtype:policy-
violation; sid:1790; rev:11;)
# alert tcp $EXTERNAL_NET 119 -> $HOME_NET any (msg:"PROTOCOL-NNTP return code
buffer overflow attempt"; flow:to_client,established; content:"200";
isdataat:256,relative; pcre:"/^200\s[^\n]{256}/smi"; metadata:ruleset community;
reference:bugtraq,4900; reference:cve,2002-0909; classtype:protocol-command-decode;
sid:1792; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS .asa
HTTP header buffer overflow attempt"; flow:to_server,established; content:"HTTP/";
nocase; content:".asa"; fast_pattern; nocase; http_uri; content:"|3A|"; content:"|
0A|"; content:"|00|"; metadata:ruleset community, service http;
reference:bugtraq,4476; reference:cve,2002-0150; reference:nessus,10936;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS02-018;
classtype:web-application-attack; sid:1802; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS .cer
HTTP header buffer overflow attempt"; flow:to_server,established; content:"HTTP/";
nocase; content:".cer"; fast_pattern; nocase; http_uri; content:"|3A|"; content:"|
0A|"; content:"|00|"; metadata:ruleset community, service http;
reference:bugtraq,4476; reference:cve,2002-0150; reference:nessus,10936;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS02-018;
classtype:web-application-attack; sid:1803; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS .cdx
HTTP header buffer overflow attempt"; flow:to_server,established; content:"HTTP/";
nocase; content:".cdx"; fast_pattern; nocase; http_uri; content:"|3A|"; content:"|
0A|"; content:"|00|"; metadata:ruleset community, service http;
reference:bugtraq,4476; reference:cve,2002-0150; reference:nessus,10936;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS02-018;
classtype:web-application-attack; sid:1804; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oracle Reports CGI access"; flow:to_server,established; content:"/rwcgi60";
fast_pattern:only; http_uri; content:"setauth="; metadata:ruleset community,
service http; reference:bugtraq,4848; reference:cve,2002-0947; classtype:web-
application-activity; sid:1805; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS .htr
chunked Transfer-Encoding"; flow:to_server,established; content:".htr"; nocase;
http_uri; content:"Transfer-Encoding|3A|"; nocase; http_header; content:"chunked";
nocase; http_header; metadata:ruleset community, service http;
reference:bugtraq,4855; reference:bugtraq,5003; reference:cve,2002-0364;
reference:nessus,11028; classtype:web-application-attack; sid:1806; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"POLICY-OTHER
Chunked-Encoding transfer attempt"; flow:to_server,established; content:"Transfer-
Encoding: chunked|0D 0A 0D 0A 0D 0A|"; nocase; isdataat:!0,relative,rawbytes;
metadata:ruleset community, service http; reference:bugtraq,4474;
reference:bugtraq,4485; reference:bugtraq,5033; reference:cve,2002-0071;
reference:cve,2002-0079; reference:cve,2002-0392; reference:nessus,10932;
classtype:policy-violation; sid:1807; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
apache chunked encoding memory corruption exploit attempt";
flow:to_server,established; content:"|C0|PR|89 E1|PQRP|B8 3B 00 00 00 CD 80|";
fast_pattern:only; http_header; metadata:ruleset community, service http;
reference:bugtraq,5033; reference:cve,2002-0392; classtype:web-application-
activity; sid:1808; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-APACHE
Apache Chunked-Encoding worm attempt"; flow:to_server,established; content:"X-
CCCCCCC|3A 20|"; fast_pattern:only; http_header; metadata:ruleset community,
service http; reference:bugtraq,4474; reference:bugtraq,4485;
reference:bugtraq,5033; reference:cve,2002-0071; reference:cve,2002-0079;
reference:cve,2002-0392; reference:nessus,10932; classtype:web-application-attack;
sid:1809; rev:19;)
# alert tcp $HOME_NET 22 -> $EXTERNAL_NET any (msg:"SERVER-OTHER successful gobbles
ssh exploit GOBBLE"; flow:to_client,established; content:"*GOBBLE*";
metadata:ruleset community; reference:bugtraq,5093; reference:cve,2002-0390;
reference:cve,2002-0640; classtype:successful-admin; sid:1810; rev:19;)
# alert tcp $HOME_NET 22 -> $EXTERNAL_NET any (msg:"SERVER-OTHER successful gobbles
ssh exploit uname"; flow:to_client,established; content:"uname"; metadata:ruleset
community; reference:bugtraq,5093; reference:cve,2002-0390; reference:cve,2002-
0640; reference:nessus,11031; classtype:misc-attack; sid:1811; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"SERVER-OTHER gobbles SSH
exploit attempt"; flow:to_server,established; content:"GOBBLES"; metadata:ruleset
community; reference:bugtraq,5093; reference:cve,2002-0639; reference:nessus,11031;
classtype:misc-attack; sid:1812; rev:13;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP digital island
bandwidth query"; content:"mailto|3A|[email protected]"; depth:22; metadata:ruleset
community; classtype:misc-activity; sid:1813; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
CISCO VoIP DOS ATTEMPT"; flow:to_server,established;
content:"/StreamingStatistics"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4794; reference:cve,2002-0882; reference:nessus,11013;
classtype:misc-attack; sid:1814; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
directory.php arbitrary command attempt"; flow:to_server,established;
content:"/directory.php"; http_uri; content:"dir="; content:"|3B|";
metadata:ruleset community, service http; reference:bugtraq,4278;
reference:cve,2002-0434; reference:nessus,11017; classtype:misc-attack; sid:1815;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
directory.php access"; flow:to_server,established; content:"/directory.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4278; reference:cve,2002-0434; classtype:misc-attack; sid:1816;
rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS MS Site
Server default login attempt"; flow:to_server,established;
content:"/SiteServer/Admin/knowledge/persmbr/"; nocase; http_uri;
pcre:"/^Authorization\x3A\s*Basic\s+TERBUF9Bbm9ueW1vdXM6TGRhcFBhc3N3b3JkXzE=/smi";
metadata:ruleset community, service http; reference:nessus,11018; classtype:web-
application-attack; sid:1817; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS MS Site
Server admin attempt"; flow:to_server,established; content:"/Site
Server/Admin/knowledge/persmbr/"; nocase; http_uri; metadata:ruleset community,
service http; reference:nessus,11018; classtype:web-application-attack; sid:1818;
rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 2533 (msg:"SERVER-OTHER Alcatel PABX
4400 connection attempt"; flow:to_server,established; content:"|00 01|C"; depth:3;
metadata:ruleset community; reference:nessus,11019; classtype:misc-activity;
sid:1819; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP IBM
Net.Commerce orderdspc.d2w access"; flow:to_server,established;
content:"/ncommerce3/ExecMacro/orderdspc.d2w"; http_uri; metadata:ruleset
community, service http; reference:bugtraq,2350; reference:cve,2001-0319;
reference:nessus,11020; classtype:web-application-activity; sid:1820; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 515 (msg:"SERVER-OTHER LPD dvips remote
command execution attempt"; flow:to_server,established; content:"psfile=|22|`";
metadata:ruleset community; reference:bugtraq,3241; reference:cve,2001-1002;
reference:nessus,11023; classtype:system-call-detect; sid:1821; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
AlienForm alienform.cgi directory traversal attempt"; flow:to_server,established;
content:"/alienform.cgi"; http_uri; content:".|7C|./.|7C|."; metadata:ruleset
community, service http; reference:bugtraq,4983; reference:cve,2002-0934;
reference:nessus,11027; classtype:web-application-attack; sid:1822; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
AlienForm af.cgi directory traversal attempt"; flow:to_server,established;
content:"/af.cgi"; http_uri; content:".|7C|./.|7C|."; metadata:ruleset community,
service http; reference:bugtraq,4983; reference:cve,2002-0934;
reference:nessus,11027; classtype:web-application-attack; sid:1823; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
AlienForm alienform.cgi access"; flow:to_server,established;
content:"/alienform.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4983; reference:cve,2002-0934;
reference:nessus,11027; classtype:web-application-activity; sid:1824; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
AlienForm af.cgi access"; flow:to_server,established; content:"/af.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4983; reference:cve,2002-0934; reference:nessus,11027;
classtype:web-application-activity; sid:1825; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP WEB-
INF access"; flow:to_server,established; content:"/WEB-INF"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,1830;
reference:bugtraq,5119; reference:cve,2000-1050; reference:cve,2001-0179;
reference:nessus,11037; classtype:web-application-activity; sid:1826; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-APACHE
Apache Tomcat servlet mapping cross site scripting attempt";
flow:to_server,established; content:"/servlet/"; http_uri; content:"/org.apache.";
http_uri; metadata:ruleset community, service http; reference:bugtraq,5193;
reference:cve,2002-0682; reference:nessus,11041; classtype:web-application-attack;
sid:1827; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP iPlanet
Search directory traversal attempt"; flow:to_server,established; content:"/search";
nocase; http_uri; content:"NS-query-pat="; fast_pattern:only; http_uri;
content:"../"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,5191; reference:cve,2002-1042; reference:nessus,11043;
classtype:web-application-attack; sid:1828; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-APACHE
Apache Tomcat TroubleShooter servlet access"; flow:to_server,established;
content:"/examples/servlet/TroubleShooter"; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4575; reference:cve,2002-2006;
reference:nessus,11046; classtype:web-application-activity; sid:1829; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-APACHE
Apache Tomcat SnoopServlet servlet access"; flow:to_server,established;
content:"/examples/servlet/SnoopServlet"; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4575; reference:cve,2002-2006;
reference:nessus,11046; classtype:web-application-activity; sid:1830; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
jigsaw dos attempt"; flow:to_server,established; content:"/servlet/con"; http_uri;
pcre:"/\x2Fcon\b/Ui"; metadata:ruleset community, service http;
reference:bugtraq,5258; reference:cve,2002-1052; reference:nessus,11047;
classtype:web-application-attack; sid:1831; rev:12;)
# alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"POLICY-SOCIAL ICQ forced user
addition"; flow:established,to_client; content:"Content-Type|3A| application/x-
icq"; fast_pattern:only; content:"[ICQ User]"; metadata:ruleset community;
reference:bugtraq,3226; reference:cve,2001-1305; classtype:policy-violation;
sid:1832; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP PHP-
Wiki cross site scripting attempt"; flow:to_server,established;
content:"/modules.php?"; http_uri; content:"name=Wiki"; fast_pattern; nocase;
http_uri; content:"<script"; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,5254; reference:cve,2002-1070; classtype:web-application-
attack; sid:1834; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Macromedia SiteSpring cross site scripting attempt"; flow:to_server,established;
content:"/error/500error.jsp"; nocase; http_uri; content:"et="; http_uri;
content:"<script"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; reference:bugtraq,5249; reference:cve,2002-1027; classtype:web-application-
attack; sid:1835; rev:14;)
# alert tcp $EXTERNAL_NET 22 -> $HOME_NET any (msg:"SERVER-OTHER SSH server banner
overflow"; flow:to_client,established; content:"SSH-"; nocase;
isdataat:200,relative; pcre:"/^SSH-\s?[^\n]{200}/ism"; metadata:ruleset community;
reference:bugtraq,5287; reference:cve,2002-1059; reference:nessus,15822;
classtype:misc-attack; sid:1838; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
mailman cross site scripting attempt"; flow:to_server,established;
content:"/mailman/"; nocase; http_uri; content:"?"; http_uri; content:"info=";
http_uri; content:"<script"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,5298; reference:cve,2002-0855;
reference:nessus,14984; classtype:web-application-attack; sid:1839; rev:14;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-JAVA Oracle
Javascript document.domain attempt"; flow:to_client,established; file_data;
content:"document.domain|28|"; nocase; metadata:ruleset community, service http;
reference:bugtraq,5346; reference:cve,2002-0815; classtype:attempted-user;
sid:1840; rev:15;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"BROWSER-FIREFOX
Mozilla 1.0 Javascript arbitrary cookie access attempt";
flow:to_client,established; file_data; content:"javascript|3A|//";
fast_pattern:only; content:"document.cookie"; nocase; metadata:ruleset community,
service http; reference:bugtraq,5293; reference:cve,2002-2314; classtype:attempted-
user; sid:1841; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP login buffer
overflow attempt"; flow:established,to_server; content:"LOGIN"; nocase;
isdataat:100,relative; pcre:"/\sLOGIN\s[^\n]{100}/i"; metadata:policy max-detect-
ips drop, ruleset community, service imap; reference:bugtraq,13727;
reference:bugtraq,21110; reference:bugtraq,502; reference:cve,1999-0005;
reference:cve,1999-1557; reference:cve,2004-1011; reference:cve,2005-1255;
reference:cve,2006-5961; reference:cve,2007-1373; reference:cve,2007-2795;
reference:cve,2007-3925; reference:nessus,10123; reference:nessus,10125;
classtype:attempted-user; sid:1842; rev:34;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 33270 (msg:"MALWARE-BACKDOOR trinity
connection attempt"; flow:to_server,established; content:"!@|23|"; depth:3;
metadata:ruleset community; reference:cve,2000-0138; reference:nessus,10501;
classtype:attempted-admin; sid:1843; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP authenticate
overflow attempt"; flow:established,to_server; content:"AUTHENTICATE"; nocase;
isdataat:100,relative; pcre:"/\sAUTHENTICATE\s[^\n]{100}/smi"; metadata:ruleset
community, service imap; reference:bugtraq,12995; reference:bugtraq,130;
reference:cve,1999-0005; reference:cve,1999-0042; reference:nessus,10292;
classtype:misc-attack; sid:1844; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP list literal
overflow attempt"; flow:established,to_server; content:"LIST"; fast_pattern:only;
pcre:"/\sLIST\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative;
metadata:ruleset community, service imap; reference:bugtraq,1110;
reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:1845;
rev:24;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 5800:5802 (msg:"POLICY-MULTIMEDIA
vncviewer Java applet download attempt"; flow:to_server,established;
content:"/vncviewer.jar"; metadata:ruleset community; reference:nessus,10758;
classtype:misc-activity; sid:1846; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webalizer access"; flow:to_server,established; content:"/webalizer/";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3473; reference:cve,2001-0835; reference:nessus,10816;
classtype:web-application-activity; sid:1847; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webcart-lite access"; flow:to_server,established; content:"/webcart-lite/";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-0610; reference:nessus,10298; classtype:web-application-
activity; sid:1848; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webfind.exe access"; flow:to_server,established; content:"/webfind.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1487; reference:cve,2000-0622; reference:nessus,10475;
classtype:web-application-activity; sid:1849; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP way-
board.cgi access"; flow:to_server,established; content:"/way-board.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10610; classtype:web-application-activity; sid:1850; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
active.log access"; flow:to_server,established; content:"/active.log";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1497; reference:cve,2000-0642; reference:nessus,10470;
classtype:web-application-activity; sid:1851; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
robots.txt access"; flow:to_server,established; content:"/robots.txt";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10302; classtype:web-application-activity; sid:1852; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 35555 (msg:"MALWARE-BACKDOOR win-trin00
connection attempt"; flow:to_server; content:"png []..Ks l44"; depth:14;
metadata:ruleset community; reference:cve,2000-0138; reference:nessus,10307;
classtype:attempted-admin; sid:1853; rev:12;)
# alert icmp $EXTERNAL_NET any <> $HOME_NET any (msg:"PROTOCOL-ICMP Stacheldraht
handler->agent niggahbitch"; icmp_id:9015; itype:0; content:"niggahbitch";
metadata:ruleset community; reference:cve,2000-0138;
reference:url,staff.washington.edu/dittrich/misc/stacheldraht.analysis;
classtype:attempted-dos; sid:1854; rev:13;)
# alert icmp $EXTERNAL_NET any <> $HOME_NET any (msg:"PROTOCOL-ICMP Stacheldraht
agent->handler skillz"; icmp_id:6666; itype:0; content:"skillz"; metadata:ruleset
community; reference:cve,2000-0138;
reference:url,staff.washington.edu/dittrich/misc/stacheldraht.analysis;
classtype:attempted-dos; sid:1855; rev:13;)
# alert icmp $EXTERNAL_NET any <> $HOME_NET any (msg:"PROTOCOL-ICMP Stacheldraht
handler->agent ficken"; icmp_id:6667; itype:0; content:"ficken"; metadata:ruleset
community; reference:cve,2000-0138;
reference:url,staff.washington.edu/dittrich/misc/stacheldraht.analysis;
classtype:attempted-dos; sid:1856; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
robot.txt access"; flow:to_server,established; content:"/robot.txt";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10302; classtype:web-application-activity; sid:1857; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
CISCO PIX Firewall Manager directory traversal attempt";
flow:to_server,established; content:"/pixfir~1/how_to_login.html"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,691;
reference:cve,1999-0158; reference:nessus,10819; classtype:misc-attack; sid:1858;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 9090 (msg:"SERVER-WEBAPP Oracle
JavaServer default password login attempt"; flow:to_server,established;
content:"/servlet/admin"; content:"ae9f86d6beaa3f9ecb9a5b7e072a4138";
metadata:ruleset community; reference:nessus,10995; classtype:default-login-
attempt; sid:1859; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8080 (msg:"SERVER-WEBAPP Linksys router
default password login attempt"; flow:to_server,established;
content:"Authorization|3A|"; nocase; http_header;
pcre:"/^Authorization\x3a(\s*|\s*\r?\n\s+)Basic\s+OmFkbWlu/smiH"; metadata:ruleset
community, service http; reference:nessus,10999; classtype:default-login-attempt;
sid:1860; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8080 (msg:"SERVER-WEBAPP Linksys router
default username and password login attempt"; flow:to_server,established;
content:"YWRtaW46YWRtaW4"; pcre:"/^Authorization\x3a\s*Basic\s+(?-
i)YWRtaW46YWRtaW4[=\s]/smi"; metadata:ruleset community; reference:nessus,10999;
classtype:default-login-attempt; sid:1861; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
mrtg.cgi directory traversal attempt"; flow:to_server,established;
content:"/mrtg.cgi"; http_uri; content:"cfg=/../"; metadata:ruleset community,
service http; reference:bugtraq,4017; reference:cve,2002-0232;
reference:nessus,11001; classtype:web-application-attack; sid:1862; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP SITE NEWER
attempt"; flow:to_server,established; content:"SITE"; nocase; content:"NEWER";
distance:1; nocase; pcre:"/^SITE\s+NEWER/smi"; metadata:ruleset community, service
ftp; reference:cve,1999-0880; reference:nessus,10319; classtype:attempted-dos;
sid:1864; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webdist.cgi arbitrary command attempt"; flow:to_server,established;
content:"/webdist.cgi"; nocase; http_uri; content:"distloc=|3B|";
fast_pattern:only; metadata:ruleset community, service http; reference:bugtraq,374;
reference:cve,1999-0039; reference:nessus,10299; classtype:web-application-attack;
sid:1865; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP USER overflow
attempt"; flow:to_server,established; content:"USER"; isdataat:50,relative;
pcre:"/^USER\s[^\n]{50}/smi"; metadata:policy max-detect-ips drop, ruleset
community, service pop3; reference:bugtraq,11256; reference:bugtraq,19651;
reference:bugtraq,789; reference:cve,1999-0494; reference:cve,2002-1781;
reference:cve,2006-2502; reference:cve,2006-4364; reference:nessus,10311;
reference:url,www.delegate.org/mail-lists/delegate-en/1475; classtype:attempted-
admin; sid:1866; rev:25;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 177 (msg:"X11 xdmcp info query";
flow:to_server; content:"|00 01 00 02 00 01 00|"; fast_pattern:only;
metadata:ruleset community; reference:nessus,10891; classtype:attempted-recon;
sid:1867; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8080 (msg:"SERVER-WEBAPP Interactive
Story story.pl arbitrary file read attempt"; flow:to_server,established;
content:"/story.pl"; http_uri; content:"next=../"; metadata:ruleset community,
service http; reference:bugtraq,3028; reference:cve,2001-0804;
reference:nessus,10817; classtype:default-login-attempt; sid:1868; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8080 (msg:"SERVER-WEBAPP Interactive
Story story.pl access"; flow:to_server,established; content:"/story.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3028; reference:cve,2001-0804; reference:nessus,10817;
classtype:default-login-attempt; sid:1869; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
siteUserMod.cgi access"; flow:to_server,established;
content:"/.cobalt/siteUserMod/siteUserMod.cgi"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,951;
reference:cve,2000-0117; reference:nessus,10253; classtype:web-application-
activity; sid:1870; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oracle XSQLConfig.xml access"; flow:to_server,established;
content:"/XSQLConfig.xml"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4290; reference:cve,2002-0568; reference:nessus,10855;
classtype:web-application-activity; sid:1871; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oracle Dynamic Monitoring Services dms access"; flow:to_server,established;
content:"/dms0"; http_uri; metadata:ruleset community, service http;
reference:nessus,10848; classtype:web-application-activity; sid:1872; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
globals.jsa access"; flow:to_server,established; content:"/globals.jsa"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,4034;
reference:cve,2002-0562; reference:nessus,10850; classtype:web-application-
activity; sid:1873; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oracle Java Process Manager access"; flow:to_server,established;
content:"/oprocmgr-status"; http_uri; metadata:ruleset community, service http;
reference:nessus,10851; classtype:web-application-activity; sid:1874; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cgicso access"; flow:to_server,established; content:"/cgicso"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,6141;
reference:cve,2002-1652; reference:nessus,10779; reference:nessus,10780;
classtype:web-application-activity; sid:1875; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP nph-
publish.cgi access"; flow:to_server,established; content:"/nph-publish.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1177; reference:nessus,10164; classtype:web-application-
activity; sid:1876; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
printenv access"; flow:to_server,established; content:"/printenv";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1658; reference:cve,2000-0868; reference:nessus,10188;
reference:nessus,10503; classtype:web-application-activity; sid:1877; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
sdbsearch.cgi access"; flow:to_server,established; content:"/sdbsearch.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1658; reference:cve,2000-0868; reference:nessus,10503;
classtype:web-application-activity; sid:1878; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
book.cgi arbitrary command execution attempt"; flow:to_server,established;
content:"/book.cgi"; fast_pattern:only; http_uri; content:"current=|7C|"; nocase;
metadata:ruleset community, service http; reference:bugtraq,3178;
reference:cve,2001-1114; reference:nessus,10721; classtype:web-application-attack;
sid:1879; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
oracle web application server access"; flow:to_server,established; content:"/ows-
bin/"; fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1053; reference:cve,2000-0169; reference:nessus,10348;
classtype:web-application-activity; sid:1880; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP bad
HTTP 1.1 request - potential worm attack"; flow:to_server,established; content:"GET
/ HTTP/1.1|0D 0A 0D 0A|"; depth:18; metadata:ruleset community, service http;
reference:url,securityresponse.symantec.com/avcenter/security/Content/2002.09.13.ht
ml; classtype:web-application-activity; sid:1881; rev:13;)
# alert ip $HOME_NET any -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE id check
returned userid"; content:"uid="; nocase; content:" gid="; distance:0;
pcre:"/uid=\d{1,5}\S+\s+gid=\d{1,5}/smi"; metadata:policy max-detect-ips drop,
ruleset community; classtype:bad-unknown; sid:1882; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 443 (msg:"SERVER-OTHER OpenSSL Worm
traffic"; flow:to_server,established; content:"TERM=xterm"; fast_pattern:only;
metadata:ruleset community, service ssl; reference:url,www.cert.org/advisories/CA-
2002-27.html; classtype:web-application-attack; sid:1887; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP SITE CPWD overflow
attempt"; flow:established,to_server; content:"SITE"; nocase; content:"CPWD";
distance:0; nocase; isdataat:100,relative; pcre:"/^SITE\s+CPWD\s[^\n]{100}/smi";
metadata:ruleset community, service ftp; reference:bugtraq,5427;
reference:cve,2002-0826; classtype:misc-attack; sid:1888; rev:14;)
# alert udp $EXTERNAL_NET 2002 -> $HOME_NET 2002 (msg:"MALWARE-CNC slapper worm
admin traffic"; content:"|00 00|E|00 00|E|00 00|@|00|"; depth:10; metadata:ruleset
community; reference:url,isc.incidents.org/analysis.html?id=167;
reference:url,www.cert.org/advisories/CA-2002-27.html; classtype:trojan-activity;
sid:1889; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1024: (msg:"PROTOCOL-RPC status GHBN
format string attack"; flow:to_server; content:"|00 01 86 B8|"; depth:4; offset:12;
content:"|00 00 00 02|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"%x %x"; within:256; content:"|00 00 00 00|";
depth:4; offset:4; metadata:ruleset community; reference:bugtraq,1480;
reference:cve,2000-0666; reference:nessus,10544; classtype:misc-attack; sid:1890;
rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1024: (msg:"PROTOCOL-RPC status GHBN
format string attack"; flow:to_server,established; content:"|00 01 86 B8|";
depth:4; offset:16; content:"|00 00 00 02|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"%x %x";
within:256; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset community;
reference:bugtraq,1480; reference:cve,2000-0666; reference:nessus,10544;
classtype:misc-attack; sid:1891; rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"PROTOCOL-SNMP null community
string attempt"; content:"|04 01 00|"; depth:15; offset:5; metadata:ruleset
community, service snmp; reference:bugtraq,2112; reference:bugtraq,8974;
reference:cve,1999-0517; classtype:misc-attack; sid:1892; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"PROTOCOL-SNMP missing
community string attempt"; content:"0"; depth:1; content:"|02|"; within:6;
content:"|04 00|"; within:8; pcre:"/^\x30(\x84....|\x82..|
[^\x80-\xFF])\x02(\x84\x00\x00\x00\x01.|\x82\x00\x01.|\x01.)\x04\x00/";
metadata:ruleset community, service snmp; reference:bugtraq,2112;
reference:cve,1999-0517; classtype:misc-attack; sid:1893; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 749 (msg:"INDICATOR-SHELLCODE kadmind
buffer overflow attempt"; flow:to_server,established; content:"|00 C0 05 08 00 C0
05 08 00 C0 05 08 00 C0 05 08|"; fast_pattern:only; metadata:ruleset community;
reference:bugtraq,5731; reference:bugtraq,6024; reference:cve,2002-1226;
reference:cve,2002-1235; reference:nessus,15015;
reference:url,www.kb.cert.org/vuls/id/875073; classtype:shellcode-detect; sid:1894;
rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 751 (msg:"INDICATOR-SHELLCODE kadmind
buffer overflow attempt"; flow:to_server,established; content:"|00 C0 05 08 00 C0
05 08 00 C0 05 08 00 C0 05 08|"; fast_pattern:only; metadata:ruleset community;
reference:bugtraq,5731; reference:bugtraq,6024; reference:cve,2002-1226;
reference:cve,2002-1235; reference:url,www.kb.cert.org/vuls/id/875073;
classtype:shellcode-detect; sid:1895; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 749 (msg:"INDICATOR-SHELLCODE kadmind
buffer overflow attempt"; flow:to_server,established; content:"|FF FF|KADM0.0A|00
00 FB 03|"; metadata:ruleset community; reference:bugtraq,5731;
reference:bugtraq,6024; reference:cve,2002-1226; reference:cve,2002-1235;
reference:url,www.kb.cert.org/vuls/id/875073; classtype:shellcode-detect; sid:1896;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 751 (msg:"INDICATOR-SHELLCODE kadmind
buffer overflow attempt"; flow:to_server,established; content:"|FF FF|KADM0.0A|00
00 FB 03|"; metadata:ruleset community; reference:bugtraq,5731;
reference:bugtraq,6024; reference:cve,2002-1226; reference:cve,2002-1235;
reference:url,www.kb.cert.org/vuls/id/875073; classtype:shellcode-detect; sid:1897;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 749 (msg:"INDICATOR-SHELLCODE kadmind
buffer overflow attempt"; flow:to_server,established; content:"/shh//bi";
metadata:ruleset community; reference:bugtraq,5731; reference:bugtraq,6024;
reference:cve,2002-1226; reference:cve,2002-1235;
reference:url,www.kb.cert.org/vuls/id/875073; classtype:shellcode-detect; sid:1898;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 751 (msg:"INDICATOR-SHELLCODE kadmind
buffer overflow attempt"; flow:to_server,established; content:"/shh//bi";
metadata:ruleset community; reference:bugtraq,5731; reference:bugtraq,6024;
reference:cve,2002-1226; reference:cve,2002-1235;
reference:url,www.kb.cert.org/vuls/id/875073; classtype:shellcode-detect; sid:1899;
rev:12;)
# alert tcp $HOME_NET 749 -> $EXTERNAL_NET any (msg:"SERVER-OTHER successful
kadmind buffer overflow attempt"; flow:to_client,established; content:"*GOBBLE*";
depth:8; metadata:ruleset community; reference:bugtraq,5731;
reference:bugtraq,6024; reference:cve,2002-1226; reference:cve,2002-1235;
reference:url,www.kb.cert.org/vuls/id/875073; classtype:successful-admin; sid:1900;
rev:15;)
# alert tcp $HOME_NET 751 -> $EXTERNAL_NET any (msg:"SERVER-OTHER successful
kadmind buffer overflow attempt"; flow:to_client,established; content:"*GOBBLE*";
depth:8; metadata:ruleset community; reference:bugtraq,5731;
reference:bugtraq,6024; reference:cve,2002-1226; reference:cve,2002-1235;
reference:url,www.kb.cert.org/vuls/id/875073; classtype:successful-admin; sid:1901;
rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP lsub literal
overflow attempt"; flow:to_server,established; content:"LSUB"; fast_pattern:only;
pcre:"/\sLSUB\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative;
metadata:ruleset community, service imap; reference:bugtraq,1110;
reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:1902;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP rename overflow
attempt"; flow:established,to_server; content:"RENAME"; nocase;
isdataat:100,relative; pcre:"/\sRENAME\s[^\n]{100}/smi"; metadata:ruleset
community, service imap; reference:bugtraq,1110; reference:cve,2000-0284;
reference:nessus,10374; classtype:misc-attack; sid:1903; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP find overflow
attempt"; flow:established,to_server; content:"FIND"; nocase;
isdataat:100,relative; pcre:"/^\sFIND\s[^\n]{100}/smi"; metadata:ruleset community,
service imap; reference:bugtraq,1110; reference:cve,2000-0284;
reference:nessus,10374; classtype:misc-attack; sid:1904; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500: (msg:"PROTOCOL-RPC AMD UDP
amqproc_mount plog overflow attempt"; flow:to_server; content:"|00 04 93 F3|";
depth:4; offset:12; content:"|00 00 00 07|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,512,0,relative; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; reference:bugtraq,614; reference:cve,1999-0704;
classtype:misc-attack; sid:1905; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 500: (msg:"PROTOCOL-RPC AMD TCP
amqproc_mount plog overflow attempt"; flow:to_server,established; content:"|00 04
93 F3|"; depth:4; offset:16; content:"|00 00 00 07|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,512,0,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,614; reference:cve,1999-0704;
classtype:misc-attack; sid:1906; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC CMSD UDP
CMSD_CREATE buffer overflow attempt"; flow:to_server; content:"|00 01 86 E4|";
depth:4; offset:12; content:"|00 00 00 15|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,1024,0,relative; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community, service sunrpc; reference:bugtraq,36615;
reference:bugtraq,524; reference:cve,1999-0696; reference:cve,2009-3699;
classtype:attempted-admin; sid:1907; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC CMSD TCP
CMSD_CREATE buffer overflow attempt"; flow:to_server,established; content:"|00 01
86 E4|"; depth:4; offset:16; content:"|00 00 00 15|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,1024,0,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,524; reference:cve,1999-0696;
classtype:attempted-admin; sid:1908; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC CMSD TCP
CMSD_INSERT buffer overflow attempt"; flow:to_server,established; content:"|00 01
86 E4|"; depth:4; offset:16; content:"|00 00 00 06|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_jump:4,0,relative,align; byte_test:4,>,1000,28,relative; content:"|00 00 00
00|"; depth:4; offset:8; metadata:ruleset community; reference:bugtraq,524;
reference:cve,1999-0696; reference:url,www.cert.org/advisories/CA-99-08-cmsd.html;
classtype:misc-attack; sid:1909; rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC CMSD udp
CMSD_INSERT buffer overflow attempt"; flow:to_server; content:"|00 01 86 E4|";
depth:4; offset:12; content:"|00 00 00 06|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_jump:4,0,relative,align; byte_test:4,>,1000,28,relative; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community; reference:cve,1999-0696;
reference:url,www.cert.org/advisories/CA-99-08-cmsd.html; classtype:misc-attack;
sid:1910; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC sadmind UDP
NETMGT_PROC_SERVICE CLIENT_DOMAIN overflow attempt"; flow:to_server; content:"|00
01 87 88|"; depth:4; offset:12; content:"|00 00 00 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_jump:4,124,relative,align; byte_jump:4,20,relative,align;
byte_test:4,>,512,4,relative; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; reference:bugtraq,866; reference:cve,1999-0977;
classtype:attempted-admin; sid:1911; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC sadmind TCP
NETMGT_PROC_SERVICE CLIENT_DOMAIN overflow attempt"; flow:to_server,established;
content:"|00 01 87 88|"; depth:4; offset:16; content:"|00 00 00 01|"; within:4;
distance:4; byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_jump:4,124,relative,align; byte_jump:4,20,relative,align;
byte_test:4,>,512,4,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,0866; reference:bugtraq,866;
reference:cve,1999-0977; classtype:attempted-admin; sid:1912; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC STATD UDP stat
mon_name format string exploit attempt"; flow:to_server; content:"|00 01 86 B8|";
depth:4; offset:12; content:"|00 00 00 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,100,0,relative; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; reference:bugtraq,1480; reference:cve,2000-0666;
reference:nessus,10544; classtype:attempted-admin; sid:1913; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC STATD TCP stat
mon_name format string exploit attempt"; flow:to_server,established; content:"|00
01 86 B8|"; depth:4; offset:16; content:"|00 00 00 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,100,0,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,1480; reference:cve,2000-0666;
reference:nessus,10544; classtype:attempted-admin; sid:1914; rev:18;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC STATD UDP monitor
mon_name format string exploit attempt"; flow:to_server; content:"|00 01 86 B8|";
depth:4; offset:12; content:"|00 00 00 02|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,100,0,relative; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; reference:bugtraq,1480; reference:cve,2000-0666;
reference:nessus,10544; classtype:attempted-admin; sid:1915; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC STATD TCP monitor
mon_name format string exploit attempt"; flow:to_server,established; content:"|00
01 86 B8|"; depth:4; offset:16; content:"|00 00 00 02|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,100,0,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,1480; reference:cve,2000-0666;
reference:nessus,10544; classtype:attempted-admin; sid:1916; rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1900 (msg:"INDICATOR-SCAN UPnP service
discover attempt"; flow:to_server; content:"M-SEARCH "; depth:9; content:"ssdp|3A|
discover"; fast_pattern:only; metadata:policy max-detect-ips drop, ruleset
community; classtype:network-scan; sid:1917; rev:15;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-ICMP SolarWinds IP
scan attempt"; icode:0; itype:8; content:"SolarWinds.Net"; fast_pattern:only;
metadata:ruleset community; classtype:network-scan; sid:1918; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP CWD overflow
attempt"; flow:to_server,established; content:"CWD"; nocase; isdataat:180,relative;
pcre:"/^CWD(?!\n)\s[^\n]{180}/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,11069; reference:bugtraq,1227; reference:bugtraq,1690;
reference:bugtraq,6869; reference:bugtraq,7251; reference:bugtraq,7950;
reference:cve,1999-0219; reference:cve,1999-1058; reference:cve,1999-1510;
reference:cve,2000-1035; reference:cve,2000-1194; reference:cve,2001-0781;
reference:cve,2002-0126; reference:cve,2002-0405; classtype:attempted-admin;
sid:1919; rev:31;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP SITE NEWER
overflow attempt"; flow:to_server,established; content:"SITE"; nocase;
content:"NEWER"; distance:0; nocase; isdataat:100,relative;
pcre:"/^SITE\s+NEWER\s[^\n]{100}/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,229; reference:cve,1999-0800; classtype:attempted-admin;
sid:1920; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP SITE ZIPCHK
overflow attempt"; flow:to_server,established; content:"SITE"; nocase;
content:"ZIPCHK"; distance:1; nocase; isdataat:100,relative;
pcre:"/^SITE\s+ZIPCHK\s[^\n]{100}/smi"; metadata:ruleset community, service ftp;
reference:cve,2000-0040; classtype:attempted-admin; sid:1921; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap proxy
attempt TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 05|"; within:4; distance:4; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community, service sunrpc; classtype:rpc-
portmap-decode; sid:1922; rev:12;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap proxy
attempt UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 05|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:4; metadata:ruleset community, service sunrpc; classtype:rpc-portmap-decode;
sid:1923; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd UDP export
request"; flow:to_server; content:"|00 01 86 A5|"; depth:4; offset:12; content:"|00
00 00 05|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; classtype:attempted-recon; sid:1924; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd TCP
exportall request"; flow:to_server,established; content:"|00 01 86 A5|"; depth:4;
offset:16; content:"|00 00 00 06|"; within:4; distance:4; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community; classtype:attempted-recon; sid:1925;
rev:12;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd UDP
exportall request"; flow:to_server; content:"|00 01 86 A5|"; depth:4; offset:12;
content:"|00 00 00 06|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:4; metadata:ruleset community; classtype:attempted-recon; sid:1926; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP authorized_keys";
flow:to_server,established; content:"authorized_keys"; fast_pattern:only;
metadata:ruleset community, service ftp; classtype:suspicious-filename-detect;
sid:1927; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP shadow retrieval
attempt"; flow:to_server,established; content:"RETR"; nocase; content:"shadow";
pcre:"/^RETR[^\n]*shadow$/smi"; metadata:ruleset community, service ftp;
classtype:suspicious-filename-detect; sid:1928; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP auth literal
overflow attempt"; flow:established,to_server; content:"AUTH"; fast_pattern:only;
pcre:"/({(?=\d+}[^\n]*?\sAUTH)|AUTH\s[^\n]*?{(?=\d+}))/smi";
byte_test:5,>,256,0,string,dec,relative; metadata:policy max-detect-ips drop,
ruleset community, service imap; reference:bugtraq,21724; reference:cve,1999-0005;
reference:cve,2006-6424; classtype:misc-attack; sid:1930; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP rpc-
nlog.pl access"; flow:to_server,established; content:"/rpc-nlog.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1278; reference:url,marc.theaimsgroup.com/?
l=bugtraq&m=91470326629357&w=2; reference:url,marc.theaimsgroup.com/?
l=bugtraq&m=91471400632145&w=2; classtype:web-application-activity; sid:1931;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP rpc-
smb.pl access"; flow:to_server,established; content:"/rpc-smb.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,1999-1278; classtype:web-application-activity; sid:1932; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cart.cgi access"; flow:to_server,established; content:"/cart.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1115; reference:cve,2000-0252; reference:nessus,10368;
classtype:web-application-activity; sid:1933; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP AUTH overflow
attempt"; flow:to_server,established; content:"AUTH"; nocase; isdataat:50,relative;
pcre:"/^AUTH\s[^\n]{50}/smi"; metadata:ruleset community, service pop3;
reference:bugtraq,830; reference:cve,1999-0822; reference:nessus,10184;
classtype:attempted-admin; sid:1936; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP LIST overflow
attempt"; flow:to_server,established; content:"LIST"; nocase; isdataat:10,relative;
pcre:"/^LIST\s[^\n]{10}/smi"; metadata:ruleset community, service pop3;
reference:bugtraq,948; reference:cve,2000-0096; reference:nessus,10197;
classtype:attempted-admin; sid:1937; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP XTND overflow
attempt"; flow:to_server,established; content:"XTND"; nocase; isdataat:50,relative;
pcre:"/^XTND\s[^\n]{50}/smi"; metadata:ruleset community, service pop3;
classtype:attempted-admin; sid:1938; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 67 (msg:"SERVER-OTHER bootp hardware
address length overflow"; flow:to_server; content:"|01|"; depth:1;
byte_test:1,>,6,2; metadata:ruleset community; reference:cve,1999-0798;
classtype:misc-activity; sid:1939; rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 67 (msg:"SERVER-OTHER bootp invalid
hardware type"; flow:to_server; content:"|01|"; depth:1; byte_test:1,>,7,1;
metadata:ruleset community; reference:cve,1999-0798; classtype:misc-activity;
sid:1940; rev:8;)
# alert udp any any -> any 69 (msg:"PROTOCOL-TFTP GET filename overflow attempt";
flow:to_server; content:"|00 01|"; depth:2; isdataat:100,relative; content:!"|00|";
within:100; metadata:policy max-detect-ips drop, ruleset community, service tftp;
reference:bugtraq,20131; reference:bugtraq,22923; reference:bugtraq,36121;
reference:bugtraq,5328; reference:cve,2002-0813; reference:cve,2006-4948;
reference:cve,2007-1435; reference:cve,2009-2957; reference:cve,2009-2958;
reference:nessus,18264; classtype:attempted-admin; sid:1941; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP RMDIR overflow
attempt"; flow:to_server,established; content:"RMDIR"; nocase;
isdataat:100,relative; pcre:"/^RMDIR(?!\n)\s[^\n]{100}/smi"; metadata:ruleset
community, service ftp; reference:bugtraq,819; classtype:attempted-admin; sid:1942;
rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/Carello/add.exe access"; flow:to_server,established; content:"/Carello/add.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1245; reference:cve,2000-0396; reference:nessus,11776;
classtype:web-application-activity; sid:1943; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/ecscripts/ecware.exe access"; flow:to_server,established;
content:"/ecscripts/ecware.exe"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,6066; classtype:web-application-
activity; sid:1944; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8888 (msg:"SERVER-WEBAPP answerbook2
admin attempt"; flow:to_server,established; content:"/cgi-bin/admin/admin";
metadata:ruleset community; reference:bugtraq,5383; reference:cve,2000-0696;
classtype:web-application-activity; sid:1946; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8888 (msg:"SERVER-WEBAPP answerbook2
arbitrary command execution attempt"; flow:to_server,established; content:"/ab2/";
content:"|3B|"; distance:1; metadata:ruleset community; reference:bugtraq,1556;
reference:cve,2000-0697; classtype:web-application-attack; sid:1947; rev:14;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS dns zone transfer
via UDP detected"; flow:to_server; content:"|00 01 00 00 00 00 00|"; depth:8;
offset:4; byte_test:1,!&,0xF8,2; content:"|00 00 FC 00 01|"; fast_pattern;
isdataat:!1,relative; metadata:ruleset community, service dns; reference:cve,1999-
0532; reference:nessus,10595; classtype:attempted-recon; sid:1948; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap SET
attempt TCP 111"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 01|"; within:4; distance:4; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community, service sunrpc; classtype:rpc-
portmap-decode; sid:1949; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap SET
attempt UDP 111"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 01|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:4; metadata:ruleset community, service sunrpc; classtype:rpc-portmap-decode;
sid:1950; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd TCP mount
request"; flow:to_server,established; content:"|00 01 86 A5|"; depth:4; offset:16;
content:"|00 00 00 01|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:8; metadata:ruleset community; reference:cve,1999-0210; classtype:attempted-
recon; sid:1951; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd UDP mount
request"; flow:to_server; content:"|00 01 86 A5|"; depth:4; offset:12; content:"|00
00 00 01|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:policy max-detect-ips drop, ruleset community; classtype:attempted-recon;
sid:1952; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 500: (msg:"PROTOCOL-RPC AMD TCP pid
request"; flow:to_server,established; content:"|00 04 93 F3|"; depth:4; offset:16;
content:"|00 00 00 09|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:8; metadata:ruleset community; classtype:rpc-portmap-decode; sid:1953;
rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500: (msg:"PROTOCOL-RPC AMD UDP pid
request"; flow:to_server; content:"|00 04 93 F3|"; depth:4; offset:12; content:"|00
00 00 09|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; classtype:rpc-portmap-decode; sid:1954; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 500: (msg:"PROTOCOL-RPC AMD TCP version
request"; flow:to_server,established; content:"|00 04 93 F3|"; depth:4; offset:16;
content:"|00 00 00 08|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:8; metadata:ruleset community; classtype:rpc-portmap-decode; sid:1955;
rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500: (msg:"PROTOCOL-RPC AMD UDP version
request"; flow:to_server; content:"|00 04 93 F3|"; depth:4; offset:12; content:"|00
00 00 08|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; reference:bugtraq,1554; reference:cve,2000-0696;
classtype:rpc-portmap-decode; sid:1956; rev:14;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC sadmind UDP
PING"; content:"|00 01 87 88|"; depth:4; offset:12; content:"|00 00 00 00|";
within:4; distance:4; content:"|00 00 00 00|"; depth:4; offset:4; metadata:ruleset
community; reference:bugtraq,866; reference:cve,1999-0977; reference:nessus,10229;
classtype:protocol-command-decode; sid:1957; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC sadmind TCP
PING"; flow:to_server,established; content:"|00 01 87 88|"; depth:4; offset:16;
content:"|00 00 00 00|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:8; metadata:ruleset community; reference:bugtraq,866; reference:cve,1999-
0977; reference:nessus,10229; classtype:protocol-command-decode; sid:1958; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap NFS
request UDP"; content:"|00 01 86 A0|"; depth:4; offset:12; content:"|00 00 00 03|";
within:4; distance:4; byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
content:"|00 01 86 A3|"; within:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community, service sunrpc; classtype:rpc-portmap-decode; sid:1959;
rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap NFS
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
A3|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:1960; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap RQUOTA
request UDP"; content:"|00 01 86 A0|"; depth:4; offset:12; content:"|00 00 00 03|";
within:4; distance:4; byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
content:"|00 01 86 AB|"; within:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community, service sunrpc; classtype:rpc-portmap-decode; sid:1961;
rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap RQUOTA
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
AB|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:1962; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC RQUOTA getquota
overflow attempt UDP"; content:"|00 01 86 AB|"; depth:4; offset:12; content:"|00 00
00 01|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; byte_test:4,>,128,0,relative; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community; reference:bugtraq,864;
reference:cve,1999-0974; classtype:misc-attack; sid:1963; rev:14;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC tooltalk UDP
overflow attempt"; flow:to_server; content:"|00 01 86 F3|"; depth:4; offset:12;
content:"|00 00 00 07|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; byte_test:4,>,128,0,relative; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community; reference:bugtraq,122;
reference:cve,1999-0003; classtype:attempted-admin; sid:1964; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC tooltalk TCP
overflow attempt"; flow:to_server,established; content:"|00 01 86 F3|"; depth:4;
offset:16; content:"|00 00 00 07|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,128,0,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,122; reference:cve,1999-0003;
reference:cve,2001-0717; classtype:attempted-admin; sid:1965; rev:17;)
# alert udp $EXTERNAL_NET any -> 255.255.255.255 27155 (msg:"SERVER-OTHER
GlobalSunTech Access Point Information Disclosure attempt"; flow:to_server;
content:"gstsearch"; fast_pattern:only; metadata:ruleset community;
reference:bugtraq,6100; reference:cve,2002-2137; classtype:misc-activity; sid:1966;
rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
phpbb quick-reply.php arbitrary command attempt"; flow:to_server,established;
content:"/quick-reply.php"; http_uri; content:"phpbb_root_path="; metadata:ruleset
community, service http; reference:bugtraq,6173; reference:cve,2002-2287;
classtype:web-application-attack; sid:1967; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
phpbb quick-reply.php access"; flow:to_server,established; content:"/quick-
reply.php"; fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,6173; reference:cve,2002-2287; classtype:web-application-
activity; sid:1968; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP ion-
p access"; flow:to_server,established; content:"/ion-p"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,6091;
reference:cve,2002-1559; reference:nessus,11729; classtype:web-application-
activity; sid:1969; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS MDAC
Content-Type overflow attempt"; flow:to_server,established; content:"/msadcs.dll";
nocase; http_uri; content:"Content-Type|3A|"; nocase; isdataat:50,relative;
content:!"|0A|"; within:50; pcre:"/^POST\s/smi"; metadata:ruleset community,
service http; reference:bugtraq,6214; reference:cve,2002-1142;
reference:nessus,11161; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS02-065; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS98-004; reference:url,www.foundstone.com/knowledge/randd-
advisories-display.html?id=337; classtype:web-application-attack; sid:1970;
rev:22;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP SITE EXEC format
string attempt"; flow:to_server,established; content:"SITE"; nocase;
content:"EXEC"; distance:0; nocase; pcre:"/^SITE\s+EXEC\s[^\n]*?%[^\n]*?%/smi";
metadata:ruleset community, service ftp; reference:bugtraq,1387;
reference:bugtraq,1505; reference:cve,2000-0573; classtype:bad-unknown; sid:1971;
rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP PASS overflow
attempt"; flow:to_server,established; content:"PASS"; nocase;
isdataat:100,relative; pcre:"/^PASS(?!\n)\s[^\n]{100}/smi"; metadata:policy max-
detect-ips drop, ruleset community, service ftp; reference:bugtraq,10078;
reference:bugtraq,10720; reference:bugtraq,15457; reference:bugtraq,1690;
reference:bugtraq,22045; reference:bugtraq,3884; reference:bugtraq,45957;
reference:bugtraq,8601; reference:bugtraq,9285; reference:cve,1999-1519;
reference:cve,1999-1539; reference:cve,2000-1035; reference:cve,2002-0126;
reference:cve,2002-0895; reference:cve,2005-3683; reference:cve,2006-6576;
classtype:attempted-admin; sid:1972; rev:32;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP MKD overflow
attempt"; flow:to_server,established; content:"MKD"; nocase; isdataat:150,relative;
pcre:"/^MKD(?!\n)\s[^\n]{150}/smi"; metadata:policy max-detect-ips drop, ruleset
community, service ftp; reference:bugtraq,11772; reference:bugtraq,15457;
reference:bugtraq,39041; reference:bugtraq,612; reference:bugtraq,7278;
reference:bugtraq,9872; reference:cve,1999-0911; reference:cve,2004-1135;
reference:cve,2005-3683; reference:cve,2009-3023; reference:cve,2010-0625;
reference:nessus,12108; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS09-053; reference:url,www.kb.cert.org/vuls/id/276653;
classtype:attempted-admin; sid:1973; rev:31;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP REST overflow
attempt"; flow:to_server,established; content:"REST"; nocase;
isdataat:100,relative; pcre:"/^REST(?!\n)\s[^\n]{100}/smi"; metadata:ruleset
community, service ftp; reference:bugtraq,2972; reference:cve,2001-0826;
reference:nessus,11755; classtype:attempted-admin; sid:1974; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP DELE overflow
attempt"; flow:to_server,established; content:"DELE"; nocase;
isdataat:100,relative; pcre:"/^DELE(?!\n)\s[^\n]{100}/mi"; metadata:policy max-
detect-ips drop, ruleset community, service ftp; reference:bugtraq,15457;
reference:bugtraq,2972; reference:bugtraq,46922; reference:cve,2001-0826;
reference:cve,2001-1021; reference:cve,2005-3683; reference:cve,2010-4228;
reference:nessus,11755; classtype:attempted-admin; sid:1975; rev:27;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP RMD overflow
attempt"; flow:to_server,established; content:"RMD"; nocase; isdataat:100,relative;
pcre:"/^RMD(?!\n)\s[^\n]{100}/smi"; metadata:policy max-detect-ips drop, ruleset
community, service ftp; reference:bugtraq,15457; reference:bugtraq,2972;
reference:bugtraq,39041; reference:cve,2000-0133; reference:cve,2001-0826;
reference:cve,2001-1021; reference:cve,2005-3683; reference:cve,2010-0625;
classtype:attempted-admin; sid:1976; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
xp_regwrite attempt"; flow:to_server,established; content:"xp_regwrite";
fast_pattern:only; metadata:ruleset community, service http; classtype:web-
application-activity; sid:1977; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
xp_regdeletekey attempt"; flow:to_server,established; content:"xp_regdeletekey";
fast_pattern:only; metadata:ruleset community, service http; classtype:web-
application-activity; sid:1978; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP perl
post attempt"; flow:to_server,established; content:"POST"; depth:4;
content:"/perl/"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,5520; reference:cve,2002-1436; reference:nessus,11158;
classtype:web-application-attack; sid:1979; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 2140 (msg:"MALWARE-BACKDOOR DeepThroat
3.1 Connection"; flow:to_server; content:"00"; depth:2; metadata:ruleset community;
reference:mcafee,98574; reference:nessus,10053; classtype:trojan-activity;
sid:1980; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 3150 (msg:"MALWARE-BACKDOOR DeepThroat
3.1 Connection attempt on port 3150"; flow:to_server; content:"00"; depth:2;
metadata:ruleset community; reference:mcafee,98574; reference:nessus,10053;
classtype:trojan-activity; sid:1981; rev:11;)
# alert udp $HOME_NET 3150 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR DeepThroat
3.1 Server Response on port 3150"; flow:to_client; content:"Ahhhh My Mouth Is
Open"; metadata:ruleset community; reference:mcafee,98574; reference:nessus,10053;
classtype:trojan-activity; sid:1982; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 4120 (msg:"MALWARE-BACKDOOR DeepThroat
3.1 Connection attempt on port 4120"; flow:to_server; content:"00"; depth:2;
metadata:ruleset community; reference:mcafee,98574; reference:nessus,10053;
classtype:trojan-activity; sid:1983; rev:10;)
# alert udp $HOME_NET 4120 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR DeepThroat
3.1 Server Response on port 4120"; flow:to_client; content:"Ahhhh My Mouth Is
Open"; metadata:ruleset community; reference:mcafee,98574; reference:nessus,10053;
classtype:trojan-activity; sid:1984; rev:11;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR Doly variant
outbound connection attempt"; flow:to_client,established; content:"* Doly trojan
v1.5 - Connected."; fast_pattern:only; metadata:impact_flag red, ruleset community,
service http;
reference:url,virustotal.com/en/file/499446edf3dfd200ebf3df2526cd4d101979e626afcd18
60193f71829be23922/; classtype:trojan-activity; sid:1985; rev:8;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 1863 (msg:"POLICY-SOCIAL Microsoft MSN
outbound file transfer request"; flow:established; content:"MSG "; depth:4;
content:"Content-Type|3A| application/x-msnmsgrp2p"; nocase; content:"INVITE";
distance:0; nocase; metadata:ruleset community; classtype:policy-violation;
sid:1986; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7100 (msg:"SERVER-OTHER xfs overflow
attempt"; flow:to_server,established; isdataat:512; content:"B|00 02|"; depth:3;
metadata:ruleset community; reference:bugtraq,6241; reference:cve,2002-1317;
reference:nessus,11188; classtype:misc-activity; sid:1987; rev:11;)
# alert tcp $EXTERNAL_NET 1863 -> $HOME_NET any (msg:"POLICY-SOCIAL Microsoft MSN
outbound file transfer accept"; flow:established; content:"MSG "; depth:4;
content:"Content-Type|3A| application/x-msnmsgrp2p"; distance:0; nocase;
content:"MSNSLP/1.0 200 OK"; distance:0; nocase; metadata:ruleset community;
classtype:policy-violation; sid:1988; rev:11;)
# alert tcp $EXTERNAL_NET 1863 -> $HOME_NET any (msg:"POLICY-SOCIAL Microsoft MSN
outbound file transfer rejected"; flow:established; content:"MSG "; depth:4;
content:"Content-Type|3A| application/x-msnmsgrp2p"; distance:0; nocase;
content:"MSNSLP/1.0 603 Decline"; distance:0; nocase; metadata:ruleset community;
classtype:policy-violation; sid:1989; rev:12;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 1863 (msg:"POLICY-SOCIAL Microsoft MSN
user search"; flow:to_server,established; content:"CAL "; depth:4; nocase;
metadata:ruleset community; classtype:policy-violation; sid:1990; rev:7;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 1863 (msg:"POLICY-SOCIAL Microsoft MSN
login attempt"; flow:to_server,established; content:"USR "; depth:4; nocase;
content:" TWN "; distance:1; nocase; metadata:ruleset community; classtype:policy-
violation; sid:1991; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP LIST directory
traversal attempt"; flow:to_server,established; content:"LIST"; nocase;
content:".."; distance:1; content:".."; distance:1; metadata:ruleset community,
service ftp; reference:bugtraq,2618; reference:cve,2001-0680; reference:cve,2002-
1054; reference:nessus,11112; classtype:protocol-command-decode; sid:1992; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP login literal
buffer overflow attempt"; flow:established,to_server; pcre:"/\sLOGIN\s[^\n]*?\
{\s*(-|[3-9][0-9]{2}|2[6-9][0-9]|25[7-9]|[0-9]{4})/smi"; content:"LOGIN";
fast_pattern:only; metadata:policy max-detect-ips drop, ruleset community, service
imap; reference:bugtraq,14718; reference:bugtraq,21724; reference:bugtraq,23810;
reference:bugtraq,6298; reference:cve,2002-1580; reference:cve,2005-1758;
reference:cve,2006-6424; reference:cve,2007-0221; reference:nessus,12532;
classtype:misc-attack; sid:1993; rev:24;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
vpasswd.cgi access"; flow:to_server,established; content:"/vpasswd.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,6038; reference:nessus,11165; classtype:web-application-activity;
sid:1994; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
alya.cgi access"; flow:to_server,established; content:"/alya.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,11118; classtype:web-application-activity; sid:1995; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
viralator.cgi access"; flow:to_server,established; content:"/viralator.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3495; reference:cve,2001-0849; reference:nessus,11107;
classtype:web-application-activity; sid:1996; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
read_body.php access attempt"; flow:to_server,established;
content:"/read_body.php"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,6302; reference:cve,2002-1341;
reference:nessus,11415; classtype:web-application-activity; sid:1997; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
calendar.php access"; flow:to_server,established; content:"/calendar.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,5820; reference:bugtraq,9353; reference:cve,2002-1660;
reference:cve,2004-1785; reference:nessus,11179; classtype:web-application-
activity; sid:1998; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
edit_image.php access"; flow:to_server,established; content:"/edit_image.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3288; reference:cve,2001-1020; reference:nessus,11104;
classtype:web-application-activity; sid:1999; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
readmsg.php access"; flow:to_server,established; content:"/readmsg.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,2001-1408; reference:nessus,11073; classtype:web-application-
activity; sid:2000; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
smartsearch.cgi access"; flow:to_server,established; content:"/smartsearch.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,7133; classtype:web-application-activity; sid:2001; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
remote include path attempt"; flow:to_server,established; content:".php"; nocase;
http_uri; content:"path="; fast_pattern:only; http_uri; pcre:"/path=(https?|ftps?|
php)/Ui"; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/File_inclusion_vulnerability;
reference:url,php.net/manual/en/function.include.php; classtype:web-application-
attack; sid:2002; rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1434 (msg:"SQL Worm propagation
attempt"; flow:to_server; content:"|04|"; depth:1; content:"|81 F1 03 01 04 9B 81
F1 01|"; fast_pattern:only; content:"sock"; content:"send"; metadata:ruleset
community; reference:bugtraq,5310; reference:bugtraq,5311; reference:cve,2002-0649;
reference:nessus,11214; reference:url,vil.nai.com/vil/content/v_99992.htm;
classtype:misc-attack; sid:2003; rev:15;)
# alert udp $HOME_NET any -> $EXTERNAL_NET 1434 (msg:"SQL Worm propagation attempt
OUTBOUND"; flow:to_server; content:"|04|"; depth:1; content:"|81 F1 03 01 04 9B 81
F1|"; fast_pattern:only; content:"sock"; content:"send"; metadata:ruleset
community; reference:bugtraq,5310; reference:bugtraq,5311; reference:cve,2002-0649;
reference:nessus,11214; reference:url,vil.nai.com/vil/content/v_99992.htm;
classtype:misc-attack; sid:2004; rev:14;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap
kcms_server request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4;
offset:12; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 87|}";
within:4; content:"|00 00 00 00|"; depth:4; offset:4; metadata:ruleset community,
service sunrpc; reference:bugtraq,6665; reference:cve,2003-0027;
reference:url,www.kb.cert.org/vuls/id/850785; classtype:rpc-portmap-decode;
sid:2005; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap
kcms_server request TCP"; flow:to_server,established; content:"|00 01 86 A0|";
depth:4; offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 87|}";
within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset community,
service sunrpc; reference:bugtraq,6665; reference:cve,2003-0027;
reference:url,www.kb.cert.org/vuls/id/850785; classtype:rpc-portmap-decode;
sid:2006; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 32771:34000 (msg:"PROTOCOL-RPC
kcms_server directory traversal attempt"; flow:to_server,established; content:"|00
01 87|}"; depth:4; offset:16; byte_jump:4,20,relative,align;
byte_jump:4,4,relative,align; content:"/../"; distance:0; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community, service sunrpc;
reference:bugtraq,6665; reference:cve,2003-0027;
reference:url,www.kb.cert.org/vuls/id/850785; classtype:misc-attack; sid:2007;
rev:16;)
# alert tcp $HOME_NET 2401 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE CVS
invalid user authentication response"; flow:to_client,established; content:"E Fatal
error, aborting."; fast_pattern:only; content:"|3A| no such user"; metadata:ruleset
community; classtype:misc-attack; sid:2008; rev:9;)
# alert tcp $HOME_NET 2401 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE CVS
invalid repository response"; flow:to_client,established; content:"error ";
content:"|3A| no such repository"; content:"I HATE YOU"; fast_pattern:only;
metadata:ruleset community; classtype:misc-attack; sid:2009; rev:7;)
# alert tcp $HOME_NET 2401 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE CVS
double free exploit attempt response"; flow:to_client,established; content:"free|28
29 3A| warning|3A| chunk is already free"; fast_pattern:only; metadata:ruleset
community; reference:bugtraq,6650; reference:cve,2003-0015; reference:nessus,11385;
classtype:misc-attack; sid:2010; rev:12;)
# alert tcp $HOME_NET 2401 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE CVS
invalid directory response"; flow:to_client,established; content:"E protocol error|
3A| invalid directory syntax in"; fast_pattern:only; metadata:ruleset community;
reference:bugtraq,6650; reference:cve,2003-0015; reference:nessus,11385;
classtype:misc-attack; sid:2011; rev:12;)
# alert tcp $HOME_NET 2401 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE CVS
missing cvsroot response"; flow:to_client,established; content:"E protocol error|
3A| Root request missing"; fast_pattern:only; metadata:ruleset community;
classtype:misc-attack; sid:2012; rev:7;)
# alert tcp $HOME_NET 2401 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE CVS
invalid module response"; flow:to_client,established; content:"cvs server|3A|
cannot find module"; fast_pattern:only; content:"error"; metadata:ruleset
community; classtype:misc-attack; sid:2013; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap UNSET
attempt TCP 111"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 02|"; within:4; distance:4; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community, service sunrpc;
reference:bugtraq,1892; classtype:rpc-portmap-decode; sid:2014; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap UNSET
attempt UDP 111"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 02|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:4; metadata:ruleset community, service sunrpc; reference:bugtraq,1892;
reference:cve,2011-0321; classtype:rpc-portmap-decode; sid:2015; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap status
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
B8|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; classtype:rpc-portmap-decode; sid:2016; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap espd
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 05 F7|u"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc;
reference:bugtraq,2714; reference:cve,2001-0331; classtype:rpc-portmap-decode;
sid:2017; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd TCP dump
request"; flow:to_server,established; content:"|00 01 86 A5|"; depth:4; offset:16;
content:"|00 00 00 02|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:8; metadata:ruleset community; classtype:attempted-recon; sid:2018; rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd UDP dump
request"; flow:to_server; content:"|00 01 86 A5|"; depth:4; offset:12; content:"|00
00 00 02|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; classtype:attempted-recon; sid:2019; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd TCP
unmount request"; flow:to_server,established; content:"|00 01 86 A5|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community; classtype:attempted-recon; sid:2020;
rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd UDP
unmount request"; flow:to_server; content:"|00 01 86 A5|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:4; metadata:ruleset community; classtype:attempted-recon; sid:2021; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd TCP
unmountall request"; flow:to_server,established; content:"|00 01 86 A5|"; depth:4;
offset:16; content:"|00 00 00 04|"; within:4; distance:4; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community; classtype:attempted-recon; sid:2022;
rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd UDP
unmountall request"; flow:to_server; content:"|00 01 86 A5|"; depth:4; offset:12;
content:"|00 00 00 04|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:4; metadata:ruleset community; classtype:attempted-recon; sid:2023; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC RQUOTA getquota
overflow attempt TCP"; flow:to_server,established; content:"|00 01 86 AB|";
depth:4; offset:16; content:"|00 00 00 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,128,0,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,864; reference:cve,1999-0974;
classtype:misc-attack; sid:2024; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC yppasswd username
overflow attempt UDP"; flow:to_server; content:"|00 01 86 A9|"; depth:4; offset:12;
content:"|00 00 00 01|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; byte_jump:4,0,relative,align;
byte_test:4,>,64,0,relative; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; reference:bugtraq,2763; reference:cve,2001-0779;
reference:nessus,10684; classtype:rpc-portmap-decode; sid:2025; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC yppasswd username
overflow attempt TCP"; flow:to_server,established; content:"|00 01 86 A9|";
depth:4; offset:16; content:"|00 00 00 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_jump:4,0,relative,align; byte_test:4,>,64,0,relative; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community; reference:bugtraq,2763;
reference:cve,2001-0779; reference:nessus,10684; classtype:rpc-portmap-decode;
sid:2026; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC yppasswd old
password overflow attempt UDP"; flow:to_server; content:"|00 01 86 A9|"; depth:4;
offset:12; content:"|00 00 00 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,64,0,relative; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; reference:bugtraq,2763; reference:cve,2001-0779;
classtype:rpc-portmap-decode; sid:2027; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC yppasswd old
password overflow attempt TCP"; flow:to_server,established; content:"|00 01 86
A9|"; depth:4; offset:16; content:"|00 00 00 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,64,0,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,2763; reference:cve,2001-0779;
classtype:rpc-portmap-decode; sid:2028; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC yppasswd new
password overflow attempt UDP"; flow:to_server; content:"|00 01 86 A9|"; depth:4;
offset:12; content:"|00 00 00 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_jump:4,0,relative,align; byte_jump:4,0,relative,align;
byte_test:4,>,64,0,relative; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community; reference:bugtraq,2763; reference:cve,2001-0779;
classtype:rpc-portmap-decode; sid:2029; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC yppasswd new
password overflow attempt TCP"; flow:to_server,established; content:"|00 01 86
A9|"; depth:4; offset:16; content:"|00 00 00 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_jump:4,0,relative,align; byte_jump:4,0,relative,align;
byte_test:4,>,64,0,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,2763; reference:cve,2001-0779;
classtype:rpc-portmap-decode; sid:2030; rev:12;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC yppasswd user
update UDP"; flow:to_server; content:"|00 01 86 A9|"; depth:4; offset:12;
content:"|00 00 00 01|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:4; metadata:ruleset community; reference:bugtraq,2763; reference:cve,2001-
0779; classtype:rpc-portmap-decode; sid:2031; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC yppasswd user
update TCP"; flow:to_server,established; content:"|00 01 86 A9|"; depth:4;
offset:16; content:"|00 00 00 01|"; within:4; distance:4; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community; reference:bugtraq,2763;
reference:cve,2001-0779; classtype:rpc-portmap-decode; sid:2032; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC ypserv maplist
request UDP"; flow:to_server; content:"|00 01 86 A4|"; depth:4; offset:12;
content:"|00 00 00 0B|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:4; metadata:ruleset community; reference:bugtraq,5914;
reference:bugtraq,6016; reference:cve,2002-1232; reference:nessus,13976;
classtype:rpc-portmap-decode; sid:2033; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC ypserv maplist
request TCP"; flow:to_server,established; content:"|00 01 86 A4|"; depth:4;
offset:16; content:"|00 00 00 0B|"; within:4; distance:4; content:"|00 00 00 00|";
depth:4; offset:8; metadata:ruleset community; reference:bugtraq,5914;
reference:bugtraq,6016; reference:cve,2002-1232; classtype:rpc-portmap-decode;
sid:2034; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap network-
status-monitor request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4;
offset:12; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 03 0D|p";
within:4; content:"|00 00 00 00|"; depth:4; offset:4; metadata:ruleset community,
service sunrpc; classtype:rpc-portmap-decode; sid:2035; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap network-
status-monitor request TCP"; flow:to_server,established; content:"|00 01 86 A0|";
depth:4; offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 03 0D|p";
within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset community,
service sunrpc; classtype:rpc-portmap-decode; sid:2036; rev:12;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC network-status-
monitor mon-callback request UDP"; flow:to_server; content:"|00 03 0D|p"; depth:4;
offset:12; content:"|00 00 00 01|"; within:4; distance:4; content:"|00 00 00 00|";
depth:4; offset:4; metadata:ruleset community; classtype:rpc-portmap-decode;
sid:2037; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC network-status-
monitor mon-callback request TCP"; flow:to_server,established; content:"|00 03 0D|
p"; depth:4; offset:16; content:"|00 00 00 01|"; within:4; distance:4; content:"|00
00 00 00|"; depth:4; offset:8; metadata:ruleset community; classtype:rpc-portmap-
decode; sid:2038; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 67 (msg:"SERVER-OTHER bootp hostname
format string attempt"; flow:to_server; content:"|01|"; depth:1; content:"|0C|";
distance:240; content:"%"; distance:0; content:"%"; within:8; distance:1;
content:"%"; within:8; distance:1; metadata:ruleset community;
reference:bugtraq,4701; reference:cve,2002-0702; reference:nessus,11312;
classtype:misc-attack; sid:2039; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 49 (msg:"POLICY-OTHER xtacacs login
attempt"; flow:to_server; content:"|80 01|"; depth:2; content:"|00|"; distance:4;
metadata:ruleset community; classtype:misc-activity; sid:2040; rev:7;)
# alert udp $HOME_NET 49 -> $EXTERNAL_NET any (msg:"INDICATOR-SCAN xtacacs failed
login response"; flow:to_client; content:"|80 02|"; depth:2; content:"|02|";
distance:4; metadata:ruleset community; classtype:misc-activity; sid:2041; rev:7;)
# alert udp $HOME_NET 49 -> $EXTERNAL_NET any (msg:"POLICY-OTHER xtacacs accepted
login response"; flow:to_client; content:"|80 02|"; depth:2; content:"|01|";
distance:4; metadata:ruleset community; classtype:misc-activity; sid:2042; rev:7;)
# alert udp $HOME_NET 500 -> $EXTERNAL_NET 500 (msg:"INDICATOR-SCAN isakmp login
failed"; content:"|10 05|"; depth:2; offset:17; content:"|00 00 00 01 01 00 00
18|"; within:8; distance:13; metadata:ruleset community; classtype:misc-activity;
sid:2043; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1723 (msg:"POLICY-OTHER PPTP Start
Control Request attempt"; flow:to_server,established,no_stream; content:"|00 01|";
depth:2; offset:2; content:"|00 01|"; depth:2; offset:8; metadata:ruleset
community; classtype:attempted-admin; sid:2044; rev:8;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC snmpXdmi overflow
attempt UDP"; flow:to_server; content:"|00 01 87 99|"; depth:4; offset:12;
content:"|00 00 01 01|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; byte_test:4,>,1024,20,relative; content:"|00 00 00
00|"; depth:4; offset:4; metadata:policy max-detect-ips drop, ruleset community;
reference:bugtraq,2417; reference:cve,2001-0236; reference:nessus,10659;
reference:url,www.cert.org/advisories/CA-2001-05.html; classtype:attempted-admin;
sid:2045; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP partial
body.peek buffer overflow attempt"; flow:to_server,established; content:"PARTIAL";
nocase; content:"BODY.PEEK["; distance:0; nocase; pcre:"/\sPARTIAL.*BODY\.PEEK\
[[^\]]{1024}/smi"; metadata:ruleset community, service imap;
reference:bugtraq,4713; reference:cve,2002-0379; reference:nessus,10966;
classtype:misc-attack; sid:2046; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 873 (msg:"SERVER-OTHER rsyncd module
list access"; flow:to_server,established; content:"|23|list"; depth:5;
metadata:ruleset community; classtype:misc-activity; sid:2047; rev:5;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1434 (msg:"SQL ping attempt";
flow:to_server; content:"|02|"; depth:1; metadata:ruleset community;
reference:nessus,10674; classtype:misc-activity; sid:2049; rev:8;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1434 (msg:"SERVER-MSSQL version overflow
attempt"; flow:to_server; dsize:>100; content:"|04|"; depth:1; metadata:ruleset
community; reference:bugtraq,5310; reference:cve,2002-0649; reference:nessus,10674;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS02-039;
classtype:attempted-admin; sid:2050; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cached_feed.cgi moreover shopping cart access"; flow:to_server,established;
content:"/cached_feed.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1762; reference:cve,2000-0906;
classtype:web-application-activity; sid:2051; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
overflow.cgi access"; flow:to_server,established; content:"/overflow.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,6326; reference:cve,2002-1361; reference:nessus,11190;
reference:url,www.cert.org/advisories/CA-2002-35.html; classtype:web-application-
activity; sid:2052; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Bugtraq process_bug.cgi access"; flow:to_server,established;
content:"/process_bug.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,3272; reference:cve,2002-0008;
classtype:web-application-activity; sid:2053; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Bugtraq enter_bug.cgi arbitrary command attempt"; flow:to_server,established;
content:"/enter_bug.cgi"; fast_pattern; nocase; http_uri; content:"who=";
content:"|3B|"; distance:0; metadata:ruleset community, service http;
reference:bugtraq,3272; reference:cve,2002-0008; classtype:web-application-attack;
sid:2054; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Bugtraq enter_bug.cgi access"; flow:to_server,established;
content:"/enter_bug.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,3272; reference:cve,2002-0008; classtype:web-
application-activity; sid:2055; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP TRACE
attempt"; flow:to_server,established; content:"TRACE"; depth:5; metadata:ruleset
community, service http; reference:bugtraq,9561; reference:cve,2003-1567;
reference:cve,2004-2320; reference:cve,2010-0360; reference:nessus,11213;
classtype:web-application-attack; sid:2056; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
helpout.exe access"; flow:to_server,established; content:"/helpout.exe"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,6002;
reference:cve,2002-1169; reference:nessus,11162; classtype:web-application-
activity; sid:2057; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
MsmMask.exe attempt"; flow:to_server,established; content:"/MsmMask.exe"; http_uri;
content:"mask="; metadata:ruleset community, service http; reference:nessus,11163;
classtype:web-application-attack; sid:2058; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
MsmMask.exe access"; flow:to_server,established; content:"/MsmMask.exe"; http_uri;
metadata:ruleset community, service http; reference:nessus,11163; classtype:web-
application-activity; sid:2059; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP DB4Web
access"; flow:to_server,established; content:"/DB4Web/"; http_uri; metadata:ruleset
community, service http; reference:nessus,11180; classtype:web-application-
activity; sid:2060; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-APACHE Apache
Tomcat null byte directory listing attempt"; flow:to_server,established; content:"|
00|.jsp"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2518; reference:bugtraq,6721; reference:cve,2003-0042;
reference:nessus,11438; classtype:web-application-attack; sid:2061; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
iPlanet .perf access"; flow:to_server,established; content:"/.perf"; http_uri;
metadata:ruleset community, service http; reference:nessus,11220; classtype:web-
application-activity; sid:2062; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Demarc
SQL injection attempt"; flow:to_server,established; content:"/dm/demarc"; http_uri;
content:"s_key="; content:"'"; distance:0; content:"'"; distance:1; content:"'";
distance:0; metadata:ruleset community, service http; reference:bugtraq,4520;
reference:cve,2002-0539; classtype:web-application-activity; sid:2063; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Lotus
Notes .csp script source download attempt"; flow:to_server,established;
content:".csp."; http_uri; metadata:ruleset community, service http; classtype:web-
application-attack; sid:2065; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Lotus
Notes .pl script source download attempt"; flow:to_server,established;
content:".pl"; http_uri; content:".pl"; content:"."; within:1; metadata:ruleset
community, service http; reference:bugtraq,6841; reference:cve,2003-1408;
classtype:web-application-attack; sid:2066; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Lotus
Notes .exe script source download attempt"; flow:to_server,established;
content:".exe"; http_uri; content:".exe"; content:"."; within:1; metadata:ruleset
community, service http; reference:bugtraq,6841; reference:cve,2003-1408;
classtype:web-application-attack; sid:2067; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
BitKeeper arbitrary command attempt"; flow:to_server,established;
content:"/diffs/"; http_uri; content:"'"; content:"|3B|"; distance:0; content:"'";
distance:1; metadata:ruleset community, service http; reference:bugtraq,6588;
classtype:web-application-attack; sid:2068; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP chip.ini
access"; flow:to_server,established; content:"/chip.ini"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,2755;
reference:bugtraq,2775; reference:cve,2001-0749; reference:cve,2001-0771;
classtype:web-application-activity; sid:2069; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
post32.exe arbitrary command attempt"; flow:to_server,established;
content:"/post32.exe|7C|"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1485; classtype:web-application-attack; sid:2070; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
post32.exe access"; flow:to_server,established; content:"/post32.exe"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1485; classtype:web-
application-activity; sid:2071; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP lyris.pl
access"; flow:to_server,established; content:"/lyris.pl"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,1584;
reference:cve,2000-0758; classtype:web-application-activity; sid:2072; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
globals.pl access"; flow:to_server,established; content:"/globals.pl"; http_uri;
metadata:ruleset community, service http; reference:bugtraq,2671;
reference:cve,2001-0330; classtype:web-application-activity; sid:2073; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Mambo uploadimage.php upload php file attempt"; flow:to_server,established;
content:"/uploadimage.php"; http_uri; content:"userfile_name="; content:".php";
distance:1; metadata:ruleset community, service http; reference:bugtraq,6572;
reference:cve,2003-1204; reference:nessus,16315; classtype:web-application-attack;
sid:2074; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Mambo upload.php upload php file attempt"; flow:to_server,established;
content:"/upload.php"; http_uri; content:"userfile_name="; content:".php";
distance:1; metadata:ruleset community, service http; reference:bugtraq,6572;
reference:cve,2003-1204; reference:nessus,16315; classtype:web-application-attack;
sid:2075; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Mambo uploadimage.php access"; flow:to_server,established;
content:"/uploadimage.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,6572; reference:cve,2003-1204;
reference:nessus,16315; classtype:web-application-activity; sid:2076; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Mambo upload.php access"; flow:to_server,established; content:"/upload.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,6572; reference:cve,2003-1204; reference:nessus,16315;
classtype:web-application-activity; sid:2077; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
phpBB privmsg.php access"; flow:to_server,established; content:"/privmsg.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,6634; reference:cve,2003-1530; classtype:web-application-
activity; sid:2078; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap nlockmgr
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 01 86 B5|"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc;
reference:bugtraq,1372; reference:cve,2000-0508; reference:nessus,10220;
classtype:rpc-portmap-decode; sid:2079; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap nlockmgr
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 01 86
B5|"; within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset
community, service sunrpc; reference:bugtraq,1372; reference:cve,2000-0508;
reference:nessus,10220; classtype:rpc-portmap-decode; sid:2080; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap rpc.xfsmd
request UDP"; flow:to_server; content:"|00 01 86 A0|"; depth:4; offset:12;
content:"|00 00 00 03|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|00 05 F7|h"; within:4; content:"|00 00 00
00|"; depth:4; offset:4; metadata:ruleset community, service sunrpc;
reference:bugtraq,5072; reference:bugtraq,5075; reference:cve,2002-0359;
classtype:rpc-portmap-decode; sid:2081; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap rpc.xfsmd
request TCP"; flow:to_server,established; content:"|00 01 86 A0|"; depth:4;
offset:16; content:"|00 00 00 03|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|00 05 F7|h";
within:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:ruleset community,
service sunrpc; reference:bugtraq,5072; reference:bugtraq,5075; reference:cve,2002-
0359; classtype:rpc-portmap-decode; sid:2082; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC rpc.xfsmd
xfs_export attempt UDP"; flow:to_server; content:"|00 05 F7|h"; depth:4; offset:12;
content:"|00 00 00 0D|"; within:4; distance:4; content:"|00 00 00 00|"; depth:4;
offset:4; metadata:ruleset community; reference:bugtraq,5072;
reference:bugtraq,5075; reference:cve,2002-0359; classtype:rpc-portmap-decode;
sid:2083; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC rpc.xfsmd
xfs_export attempt TCP"; flow:to_server,established; content:"|00 05 F7|h";
depth:4; offset:16; content:"|00 00 00 0D|"; within:4; distance:4; content:"|00 00
00 00|"; depth:4; offset:8; metadata:ruleset community; reference:bugtraq,5072;
reference:bugtraq,5075; reference:cve,2002-0359; classtype:rpc-portmap-decode;
sid:2084; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
parse_xml.cgi access"; flow:to_server,established; content:"/parse_xml.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,6954; reference:bugtraq,6955; reference:bugtraq,6956;
reference:bugtraq,6958; reference:cve,2003-0050; reference:cve,2003-0051;
reference:cve,2003-0052; reference:cve,2003-0053; reference:cve,2003-0423;
classtype:web-application-activity; sid:2085; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
streaming server parse_xml.cgi access"; flow:to_server,established;
content:"/parse_xml.cgi"; fast_pattern:only; metadata:ruleset community, service
http; reference:bugtraq,6954; reference:bugtraq,6955; reference:bugtraq,6956;
reference:bugtraq,6958; reference:cve,2003-0050; reference:cve,2003-0051;
reference:cve,2003-0052; reference:cve,2003-0053; reference:cve,2003-0423;
classtype:web-application-activity; sid:2086; rev:14;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL From comment
overflow attempt"; flow:to_server,established; content:"From|3A|"; nocase;
content:"<><><><><><><><><><><><><><><><><><><><><><>"; distance:0; content:"|28|";
distance:1; content:"|29|"; distance:1; metadata:ruleset community, service smtp;
reference:bugtraq,6991; reference:cve,2002-1337;
reference:url,www.kb.cert.org/vuls/id/398025; classtype:attempted-admin; sid:2087;
rev:14;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC ypupdated
arbitrary command attempt UDP"; content:"|00 01 86 BC|"; depth:4; offset:12;
content:"|00 00 00 01|"; within:4; distance:4; byte_jump:4,4,relative,align;
byte_jump:4,4,relative,align; content:"|7C|"; distance:4; content:"|00 00 00 00|";
depth:4; offset:4; metadata:policy max-detect-ips drop, ruleset community;
reference:bugtraq,1749; reference:bugtraq,28383; reference:cve,1999-0208;
classtype:misc-attack; sid:2088; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC ypupdated
arbitrary command attempt TCP"; flow:to_server,established; content:"|00 01 86
BC|"; depth:4; offset:16; content:"|00 00 00 01|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align; content:"|7C|";
distance:4; content:"|00 00 00 00|"; depth:4; offset:8; metadata:policy max-detect-
ips drop, ruleset community; reference:bugtraq,1749; reference:cve,1999-0208;
classtype:misc-attack; sid:2089; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS WEBDAV
exploit attempt"; flow:to_server,established; content:"HTTP/1.1|0A|Content-type|3A|
text/xml|0A|HOST|3A|"; http_header; content:"Accept|3A| */*|0A|Translate|3A| f|0A|
Content-length|3A|5276|0A 0A|"; http_header; metadata:ruleset community, service
http; reference:bugtraq,7116; reference:bugtraq,7716; reference:cve,2003-0109;
reference:nessus,11413; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms03-007; classtype:attempted-admin; sid:2090; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS WEBDAV
nessus safe scan attempt"; flow:to_server,established; content:"SEARCH / HTTP/1.1|
0D 0A|Host|3A|"; content:"|0D 0A 0D 0A|"; within:255; metadata:ruleset community,
service http; reference:bugtraq,7116; reference:cve,2003-0109;
reference:nessus,11412; reference:nessus,11413;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms03-007;
classtype:attempted-admin; sid:2091; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap proxy
integer overflow attempt UDP"; flow:to_server; content:"|00 01 86 A0 00|"; depth:5;
offset:12; content:"|00 00 00 05|"; within:4; distance:3;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,2048,12,relative; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community, service sunrpc; reference:bugtraq,36564;
reference:bugtraq,7123; reference:cve,2003-0028; reference:nessus,11420;
classtype:rpc-portmap-decode; sid:2092; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 111 (msg:"PROTOCOL-RPC portmap proxy
integer overflow attempt TCP"; flow:to_server,established; content:"|00 01 86 A0
00|"; depth:5; offset:16; content:"|00 00 00 05|"; within:4; distance:3;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,2048,12,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community, service sunrpc; reference:bugtraq,7123;
reference:cve,2003-0028; reference:nessus,11420; classtype:rpc-portmap-decode;
sid:2093; rev:12;)
# alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC CMSD UDP
CMSD_CREATE array buffer overflow attempt"; flow:to_server; content:"|00 01 86
E4|"; depth:4; offset:12; content:"|00 00 00 15|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,1024,20,relative; content:"|00 00 00 00|"; depth:4; offset:4;
metadata:ruleset community, service sunrpc; reference:bugtraq,36615;
reference:bugtraq,5356; reference:cve,2002-0391; reference:cve,2009-3699;
reference:nessus,11418; classtype:attempted-admin; sid:2094; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC CMSD TCP
CMSD_CREATE array buffer overflow attempt"; flow:to_server,established; content:"|
00 01 86 E4|"; depth:4; offset:16; content:"|00 00 00 15|"; within:4; distance:4;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,1024,20,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,5356; reference:cve,2002-0391;
reference:nessus,11418; classtype:attempted-admin; sid:2095; rev:14;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR SubSeven 2.1
Gold server connection response"; flow:to_client,established; content:"connected.
time/date|3A| "; depth:22; content:"version|3A| GOLD 2.1"; distance:1;
metadata:ruleset community; reference:mcafee,10566; reference:nessus,10409;
classtype:trojan-activity; sid:2100; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"OS-WINDOWS Microsoft Windows
SMB Trans Max Param/Count OS-WINDOWS attempt"; flow:to_server,established;
content:"|00|"; depth:1; content:"|FF|SMB%"; within:5; distance:3; byte_test:1,!
&,128,6,relative; pcre:"/^.{27}/sR"; content:"|00 00 00 00|"; within:4; distance:5;
metadata:ruleset community; reference:bugtraq,5556; reference:cve,2002-0724;
reference:nessus,11110; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS02-045; reference:url,www.corest.com/common/showdoc.php?
idx=262; classtype:protocol-command-decode; sid:2101; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB Trans2 OPEN2
unicode maximum param count overflow attempt"; flow:established,to_server;
content:"|00|"; depth:1; content:"|FF|SMB2"; within:5; distance:3;
byte_test:1,&,128,6,relative; pcre:"/^.{27}/sR"; content:"|00 00|"; within:2;
distance:29; byte_test:2,>,1024,-12,relative,little; metadata:ruleset community;
reference:cve,2003-0201; classtype:protocol-command-decode; sid:2103; rev:16;)
# alert tcp $HOME_NET 512 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE rexec
username too long response"; flow:to_client,established; content:"username too
long"; depth:17; metadata:ruleset community; reference:bugtraq,7459;
reference:cve,2003-1097; classtype:unsuccessful-user; sid:2104; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP authenticate
literal overflow attempt"; flow:established,to_server; content:"AUTHENTICATE";
fast_pattern:only; pcre:"/\sAUTHENTICATE\s[^\n]*?\{/smi";
byte_test:5,>,256,0,string,dec,relative; metadata:policy max-detect-ips drop,
ruleset community, service imap; reference:bugtraq,21724; reference:cve,1999-0042;
reference:cve,2006-6424; reference:nessus,10292; classtype:misc-attack; sid:2105;
rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP lsub overflow
attempt"; flow:to_server,established; content:"LSUB"; isdataat:100,relative;
pcre:"/\sLSUB\s[^\n]{100}/smi"; metadata:policy max-detect-ips drop, ruleset
community, service imap; reference:bugtraq,1110; reference:bugtraq,15006;
reference:cve,2000-0284; reference:cve,2005-3155; reference:nessus,10374;
classtype:misc-attack; sid:2106; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP create buffer
overflow attempt"; flow:to_server,established; content:"CREATE";
isdataat:1024,relative; pcre:"/\sCREATE\s[^\n]{1024}/smi"; metadata:ruleset
community, service imap; reference:bugtraq,7446; reference:cve,2003-1470;
classtype:misc-attack; sid:2107; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP CAPA overflow
attempt"; flow:to_server,established; content:"CAPA"; nocase; isdataat:10,relative;
pcre:"/^CAPA\s[^\n]{10}/smi"; metadata:ruleset community, service pop3;
classtype:attempted-admin; sid:2108; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP TOP overflow
attempt"; flow:to_server,established; content:"TOP"; nocase; isdataat:50,relative;
pcre:"/^TOP\s[^\n]{50}/smi"; metadata:ruleset community, service pop3;
classtype:attempted-admin; sid:2109; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP STAT overflow
attempt"; flow:to_server,established; content:"STAT"; nocase; isdataat:10,relative;
pcre:"/^STAT\s[^\n]{10}/smi"; metadata:ruleset community, service pop3;
classtype:attempted-admin; sid:2110; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP DELE overflow
attempt"; flow:to_server,established; content:"DELE"; nocase; isdataat:10,relative;
pcre:"/^DELE\s[^\n]{10}/smi"; metadata:ruleset community, service pop3;
classtype:attempted-admin; sid:2111; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP RSET overflow
attempt"; flow:to_server,established; content:"RSET"; nocase; isdataat:10,relative;
pcre:"/^RSET\s[^\n]{10}/smi"; metadata:ruleset community, service pop3;
classtype:attempted-admin; sid:2112; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 512 (msg:"PROTOCOL-SERVICES rexec
username overflow attempt"; flow:to_server,established; content:"|00|"; offset:9;
content:"|00|"; distance:0; content:"|00|"; distance:0; metadata:ruleset community;
classtype:attempted-admin; sid:2113; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 512 (msg:"PROTOCOL-SERVICES rexec
password overflow attempt"; flow:to_server,established; content:"|00|"; content:"|
00|"; distance:33; content:"|00|"; distance:0; metadata:ruleset community;
classtype:attempted-admin; sid:2114; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
album.pl access"; flow:to_server,established; content:"/album.pl";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,7444; reference:cve,2003-1456; reference:nessus,11581;
classtype:web-application-activity; sid:2115; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
chipcfg.cgi access"; flow:to_server,established; content:"/chipcfg.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,2767; reference:cve,2001-1341;
reference:url,archives.neohapsis.com/archives/bugtraq/2001-05/0233.html;
classtype:web-application-activity; sid:2116; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
Battleaxe Forum login.asp access"; flow:to_server,established;
content:"myaccount/login.asp"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,7416; reference:cve,2003-0215;
reference:nessus,11548; classtype:web-application-activity; sid:2117; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP list overflow
attempt"; flow:established,to_server; content:"LIST"; nocase;
isdataat:100,relative; pcre:"/\sLIST\s[^\n]{100}/smi"; metadata:policy max-detect-
ips drop, ruleset community, service imap; reference:bugtraq,1110;
reference:bugtraq,15006; reference:cve,2000-0284; reference:cve,2005-3155;
reference:nessus,10374; classtype:misc-attack; sid:2118; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP rename literal
overflow attempt"; flow:established,to_server; content:"RENAME"; fast_pattern:only;
pcre:"/\sRENAME\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative;
metadata:ruleset community, service imap; reference:bugtraq,1110;
reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:2119;
rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP create literal
buffer overflow attempt"; flow:to_server,established; content:"CREATE";
fast_pattern:only; pcre:"/\sCREATE\s*\{/smi";
byte_test:5,>,256,0,string,dec,relative; metadata:ruleset community, service imap;
reference:bugtraq,7446; reference:cve,2003-1470; classtype:misc-attack; sid:2120;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP DELE negative
argument attempt"; flow:to_server,established; content:"DELE"; fast_pattern:only;
pcre:"/^DELE\s+-\d/smi"; metadata:ruleset community, service pop3;
reference:bugtraq,6053; reference:bugtraq,7445; reference:cve,2002-1539;
reference:nessus,11570; classtype:misc-attack; sid:2121; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP UIDL negative
argument attempt"; flow:to_server,established; content:"UIDL"; fast_pattern:only;
pcre:"/^UIDL\s+-\d/smi"; metadata:ruleset community, service pop3;
reference:bugtraq,6053; reference:cve,2002-1539; reference:nessus,11570;
classtype:misc-attack; sid:2122; rev:17;)
# alert tcp $HOME_NET !21:23 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE
Microsoft cmd.exe banner"; flow:established; content:"Microsoft Windows"; depth:18;
content:"|28|C|29| Copyright 1985-"; distance:0; content:"Microsoft Corp.";
distance:0; metadata:policy max-detect-ips drop, ruleset community;
reference:nessus,11633; classtype:successful-admin; sid:2123; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 34012 (msg:"MALWARE-BACKDOOR Remote PC
Access connection"; flow:to_server,established; content:"|28 00 01 00 04 00 00 00
00 00 00 00|"; depth:12; metadata:ruleset community; reference:nessus,11673;
classtype:trojan-activity; sid:2124; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP CWD Root directory
traversal attempt"; flow:to_server,established; content:"CWD"; nocase; content:"C|
3A 5C|"; distance:1; metadata:ruleset community, service ftp;
reference:bugtraq,7674; reference:cve,2003-0392; reference:nessus,11677;
classtype:protocol-command-decode; sid:2125; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1723 (msg:"OS-WINDOWS Microsoft Windows
PPTP Start Control Request buffer overflow attempt";
flow:to_server,established,no_stream; isdataat:156; content:"|00 01|"; depth:2;
offset:2; content:"|00 01|"; depth:2; offset:8; metadata:ruleset community;
reference:bugtraq,5807; reference:cve,2002-1214; reference:nessus,11178;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS02-063;
classtype:attempted-admin; sid:2126; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ikonboard.cgi access"; flow:to_server,established; content:"/ikonboard.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,7361; reference:nessus,11605; classtype:web-application-activity;
sid:2127; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
swsrv.cgi access"; flow:to_server,established; content:"/swsrv.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,7510; reference:cve,2003-0217; reference:nessus,11608;
classtype:web-application-activity; sid:2128; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
nsiislog.dll access"; flow:to_server,established; content:"/nsiislog.dll";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,8035; reference:cve,2003-0227; reference:cve,2003-0349;
reference:nessus,11664; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms03-018; classtype:web-application-activity; sid:2129;
rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
IISProtect siteadmin.asp access"; flow:to_server,established;
content:"/iisprotect/admin/SiteAdmin.asp"; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,7675; reference:cve,2003-0377;
reference:nessus,11662; classtype:web-application-activity; sid:2130; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
IISProtect access"; flow:to_server,established; content:"/iisprotect/admin/";
nocase; http_uri; metadata:ruleset community, service http; reference:nessus,11661;
classtype:web-application-activity; sid:2131; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
Synchrologic Email Accelerator userid list access attempt";
flow:to_server,established; content:"/en/admin/aggregate.asp"; nocase; http_uri;
metadata:ruleset community, service http; reference:nessus,11657; classtype:web-
application-activity; sid:2132; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS MS
BizTalk server access"; flow:to_server,established;
content:"/biztalkhttpreceive.dll"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,7469; reference:bugtraq,7470; reference:cve,2003-
0117; reference:cve,2003-0118; reference:nessus,11638;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-016;
classtype:web-application-activity; sid:2133; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
register.asp access"; flow:to_server,established; content:"/register.asp"; nocase;
http_uri; metadata:ruleset community, service http; reference:nessus,11621;
classtype:web-application-activity; sid:2134; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
philboard.mdb access"; flow:to_server,established; content:"/philboard.mdb";
http_uri; metadata:ruleset community, service http; reference:nessus,11682;
classtype:web-application-activity; sid:2135; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
philboard_admin.asp authentication bypass attempt"; flow:to_server,established;
content:"/philboard_admin.asp"; http_uri; content:"Cookie"; nocase;
content:"philboard_admin=True"; distance:0; metadata:ruleset community, service
http; reference:bugtraq,7739; reference:nessus,11675; classtype:web-application-
attack; sid:2136; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
philboard_admin.asp access"; flow:to_server,established;
content:"/philboard_admin.asp"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,7739; reference:nessus,11675; classtype:web-application-activity;
sid:2137; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
logicworks.ini access"; flow:to_server,established; content:"/logicworks.ini";
http_uri; metadata:ruleset community, service http; reference:bugtraq,6996;
reference:cve,2003-1383; reference:nessus,11639; classtype:web-application-
activity; sid:2138; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP /*.shtml
access"; flow:to_server,established; content:"/*.shtml"; http_uri; metadata:ruleset
community, service http; reference:bugtraq,1517; reference:cve,2000-0683;
reference:nessus,11604; classtype:web-application-activity; sid:2139; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP p-
news.php access"; flow:to_server,established; content:"/p-news.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,11669; classtype:web-application-activity; sid:2140; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
shoutbox.php directory traversal attempt"; flow:to_server,established;
content:"/shoutbox.php"; http_uri; content:"conf="; content:"../"; distance:0;
metadata:ruleset community, service http; reference:nessus,11668; classtype:web-
application-attack; sid:2141; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
shoutbox.php access"; flow:to_server,established; content:"/shoutbox.php";
fast_pattern; nocase; http_uri; content:"conf="; nocase; http_uri; metadata:ruleset
community, service http; reference:nessus,11668; classtype:web-application-
activity; sid:2142; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP b2
cafelog gm-2-b2.php remote file include attempt"; flow:to_server,established;
content:"/gm-2-b2.php"; fast_pattern; nocase; http_uri; content:"b2inc=";
pcre:"/b2inc=(https?|ftps?|php)/i"; metadata:ruleset community, service http;
reference:nessus,11667; classtype:web-application-attack; sid:2143; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP b2
cafelog gm-2-b2.php access"; flow:to_server,established; content:"/gm-2-b2.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,11667; classtype:web-application-activity; sid:2144; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
TextPortal admin.php default password admin attempt"; flow:to_server,established;
content:"/admin.php"; http_uri; content:"op=admin_enter"; content:"password=admin";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,7673; reference:nessus,11660; classtype:web-application-activity;
sid:2145; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
TextPortal admin.php default password 12345 attempt"; flow:to_server,established;
content:"/admin.php"; http_uri; content:"op=admin_enter"; content:"password=12345";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,7673; reference:nessus,11660; classtype:web-application-activity;
sid:2146; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
BLNews objects.inc.php4 remote file include attempt"; flow:to_server,established;
content:"/objects.inc.php4"; http_uri; content:"Server[path]=";
pcre:"/Server\x5bpath\x5d=(https?|ftps?|php)/"; metadata:ruleset community, service
http; reference:bugtraq,7677; reference:cve,2003-0394; reference:nessus,11647;
classtype:web-application-attack; sid:2147; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
BLNews objects.inc.php4 access"; flow:to_server,established;
content:"/objects.inc.php4"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,7677; reference:cve,2003-0394; reference:nessus,11647;
classtype:web-application-activity; sid:2148; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Turba status.php access"; flow:to_server,established; content:"/turba/status.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,11646; classtype:web-application-activity; sid:2149; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ttCMS header.php remote file include attempt"; flow:to_server,established;
content:"/admin/templates/header.php"; fast_pattern; nocase; http_uri;
content:"admin_root="; nocase; http_uri; pcre:"/admin_root=(https?|ftps?|php)/Ui";
metadata:ruleset community, service http; reference:bugtraq,7542;
reference:bugtraq,7543; reference:bugtraq,7625; reference:cve,2003-1458;
reference:cve,2003-1459; reference:nessus,11636; classtype:web-application-attack;
sid:2150; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ttCMS header.php access"; flow:to_server,established;
content:"/admin/templates/header.php"; http_uri; metadata:ruleset community,
service http; reference:bugtraq,7542; reference:bugtraq,7543;
reference:bugtraq,7625; reference:cve,2003-1458; reference:cve,2003-1459;
reference:nessus,11636; classtype:web-application-activity; sid:2151; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
test.php access"; flow:to_server,established; content:"/test.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,11617; classtype:web-application-activity; sid:2152; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
autohtml.php directory traversal attempt"; flow:to_server,established;
content:"/autohtml.php"; fast_pattern; nocase; http_uri; content:"name=";
content:"../../"; distance:0; metadata:ruleset community, service http;
reference:nessus,11630; classtype:web-application-attack; sid:2153; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
autohtml.php access"; flow:to_server,established; content:"/autohtml.php";
http_uri; metadata:ruleset community, service http; reference:nessus,11630;
classtype:web-application-activity; sid:2154; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ttforum remote file include attempt"; flow:to_server,established;
content:"forum/index.php"; http_uri; content:"template="; http_uri;
pcre:"/template=(https?|ftps?|php)/Ui"; metadata:ruleset community, service http;
reference:bugtraq,7542; reference:bugtraq,7543; reference:cve,2003-1458;
reference:cve,2003-1459; reference:nessus,11615; classtype:web-application-attack;
sid:2155; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
mod_gzip_status access"; flow:to_server,established; content:"/mod_gzip_status";
http_uri; metadata:ruleset community, service http; reference:nessus,11685;
classtype:web-application-activity; sid:2156; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
IISProtect globaladmin.asp access"; flow:to_server,established;
content:"/iisprotect/admin/GlobalAdmin.asp"; nocase; http_uri; metadata:ruleset
community, service http; reference:nessus,11661; classtype:web-application-
activity; sid:2157; rev:14;)
# alert tcp any any <> any 179 (msg:"SERVER-OTHER BGP invalid length";
flow:stateless; content:"|FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF|";
byte_test:2,<,19,0,relative; metadata:ruleset community; reference:bugtraq,6213;
reference:cve,2002-1350; reference:nessus,14011; reference:nessus,15043;
reference:url,sf.net/tracker/index.php?
func=detail&aid=744523&group_id=53066&atid=469575; classtype:bad-unknown; sid:2158;
rev:12;)
# alert tcp $EXTERNAL_NET any <> $HOME_NET 179 (msg:"SERVER-OTHER BGP invalid type
0"; flow:stateless; content:"|FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF|";
depth:16; content:"|00|"; within:1; distance:2; metadata:ruleset community;
reference:bugtraq,6213; reference:cve,2002-1350; reference:nessus,14011;
reference:nessus,15043; classtype:bad-unknown; sid:2159; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"OS-WINDOWS Microsoft Windows
SMB startup folder access"; flow:to_server,established; content:"|00|"; depth:1;
content:"|FF|SMB2"; depth:5; offset:4; content:"Documents and Settings|5C|All
Users|5C|Start Menu|5C|Programs|5C|Startup|00|"; distance:0; nocase;
metadata:ruleset community, service netbios-ssn; classtype:attempted-recon;
sid:2176; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"OS-WINDOWS Microsoft Windows
SMB startup folder unicode access"; flow:to_server,established; content:"|00|";
depth:1; content:"|FF|SMB2"; depth:5; offset:4; content:"|5C 00|S|00|t|00|a|00|r|
00|t|00| |00|M|00|e|00|n|00|u|00 5C 00|P|00|r|00|o|00|g|00|r|00|a|00|m|00|s|00 5C
00|S|00|t|00|a|00|r|00|t|00|u|00|p"; distance:0; nocase; metadata:ruleset
community; classtype:attempted-recon; sid:2177; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP USER format string
attempt"; flow:to_server,established; content:"USER"; fast_pattern:only;
pcre:"/^USER\s[^\n]*?%[^\n]*?%/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,7474; reference:bugtraq,7776; reference:bugtraq,9262;
reference:bugtraq,9402; reference:bugtraq,9600; reference:bugtraq,9800;
reference:cve,2004-0277; reference:nessus,10041; reference:nessus,11687;
classtype:misc-attack; sid:2178; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP PASS format string
attempt"; flow:to_server,established; content:"PASS"; fast_pattern:only;
pcre:"/^PASS\s[^\n]*?%[^\n]*?%/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,7474; reference:bugtraq,9262; reference:bugtraq,9800;
reference:cve,2000-0699; reference:cve,2007-1195; reference:nessus,10490;
classtype:misc-attack; sid:2179; rev:16;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"PUA-P2P BitTorrent announce
request"; flow:to_server,established; content:"/announce"; content:"info_hash=";
content:"peer_id="; content:"event="; metadata:ruleset community, service http;
classtype:policy-violation; sid:2180; rev:10;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"PUA-P2P BitTorrent transfer";
flow:to_server,established; content:"|13|BitTorrent protocol"; depth:20;
metadata:ruleset community; classtype:policy-violation; sid:2181; rev:8;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail
Content-Transfer-Encoding overflow attempt"; flow:to_server,established;
content:"Content-Transfer-Encoding"; nocase; content:"|3A|"; distance:0;
isdataat:100,relative; content:!"|0A|"; within:100; pcre:"/^\s*Content-Transfer-
Encoding\s*\x3A[^\n]{100}/mi"; metadata:ruleset community, service smtp;
reference:cve,2003-0161; reference:url,www.cert.org/advisories/CA-2003-12.html;
classtype:attempted-admin; sid:2183; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"PROTOCOL-RPC mountd TCP mount
path overflow attempt"; flow:to_server,established; content:"|00 01 86 A5 00|";
depth:5; offset:16; content:"|00 00 00 01|"; within:4; distance:3;
byte_jump:4,4,relative,align; byte_jump:4,4,relative,align;
byte_test:4,>,1023,0,relative; content:"|00 00 00 00|"; depth:4; offset:8;
metadata:ruleset community; reference:bugtraq,8179; reference:cve,2003-0252;
reference:nessus,11800; classtype:misc-attack; sid:2184; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 135 (msg:"NETBIOS DCERPC invalid bind
attempt"; flow:to_server,established; content:"|05|"; depth:1; content:"|0B|";
within:1; distance:1; byte_test:1,&,1,0,relative; content:"|00|"; within:1;
distance:21; metadata:ruleset community; classtype:attempted-dos; sid:2190; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB DCERPC invalid
bind attempt"; flow:to_server,established; content:"|FF|SMB%"; depth:5; offset:4;
nocase; content:"&|00|"; within:2; distance:56; content:"|5C 00|P|00|I|00|P|00|E|00
5C 00|"; within:12; distance:5; nocase; content:"|05|"; within:1; distance:2;
content:"|0B|"; within:1; distance:1; byte_test:1,&,1,0,relative; content:"|00|";
within:1; distance:21; metadata:ruleset community, service netbios-ssn;
classtype:attempted-dos; sid:2191; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
CSMailto.cgi access"; flow:to_server,established; content:"/CSMailto.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4579; reference:bugtraq,6265; reference:cve,2002-0749;
reference:nessus,11748; classtype:web-application-activity; sid:2194; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
alert.cgi access"; flow:to_server,established; content:"/alert.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4211; reference:bugtraq,4579; reference:cve,2002-0346;
reference:nessus,11748; classtype:web-application-activity; sid:2195; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
catgy.cgi access"; flow:to_server,established; content:"/catgy.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3714; reference:bugtraq,4579; reference:cve,2001-1212;
reference:nessus,11748; classtype:web-application-activity; sid:2196; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cvsview2.cgi access"; flow:to_server,established; content:"/cvsview2.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4579; reference:bugtraq,5517; reference:cve,2003-0153;
reference:nessus,11748; classtype:web-application-activity; sid:2197; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cvslog.cgi access"; flow:to_server,established; content:"/cvslog.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4579; reference:bugtraq,5517; reference:cve,2003-0153;
reference:nessus,11748; classtype:web-application-activity; sid:2198; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
multidiff.cgi access"; flow:to_server,established; content:"/multidiff.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4579; reference:bugtraq,5517; reference:cve,2003-0153;
reference:nessus,11748; classtype:web-application-activity; sid:2199; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
dnewsweb.cgi access"; flow:to_server,established; content:"/dnewsweb.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1172; reference:bugtraq,4579; reference:cve,2000-0423;
reference:nessus,11748; classtype:web-application-activity; sid:2200; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Matt
Wright download.cgi access"; flow:to_server,established; content:"/download.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4579; reference:cve,1999-1377; reference:nessus,11748;
classtype:web-application-activity; sid:2201; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Webmin Directory edit_action.cgi access"; flow:to_server,established;
content:"/edit_action.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,3698; reference:bugtraq,4579;
reference:cve,2001-1196; reference:nessus,11748; classtype:web-application-
activity; sid:2202; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Leif
M. Wright everythingform.cgi access"; flow:to_server,established;
content:"/everythingform.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,2101; reference:bugtraq,4579;
reference:cve,2001-0023; reference:nessus,11748; classtype:web-application-
activity; sid:2203; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
EasyBoard 2000 ezadmin.cgi access"; flow:to_server,established;
content:"/ezadmin.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4068; reference:bugtraq,4579; reference:cve,2002-
0263; reference:nessus,11748; classtype:web-application-activity; sid:2204;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
EasyBoard 2000 ezboard.cgi access"; flow:to_server,established;
content:"/ezboard.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4068; reference:bugtraq,4579; reference:cve,2002-
0263; reference:nessus,11748; classtype:web-application-activity; sid:2205;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
EasyBoard 2000 ezman.cgi access"; flow:to_server,established; content:"/ezman.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4068; reference:bugtraq,4579; reference:cve,2002-0263;
reference:nessus,11748; classtype:web-application-activity; sid:2206; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
FileSeek fileseek.cgi access"; flow:to_server,established; content:"/fileseek.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4579; reference:bugtraq,6784; reference:cve,2002-0611;
reference:nessus,11748; classtype:web-application-activity; sid:2207; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Faq-
O-Matic fom.cgi access"; flow:to_server,established; content:"/fom.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4579; reference:cve,2002-0230; reference:nessus,11748;
classtype:web-application-activity; sid:2208; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Infonautics getdoc.cgi access"; flow:to_server,established; content:"/getdoc.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4579; reference:cve,2000-0288; reference:nessus,11748;
classtype:web-application-activity; sid:2209; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Multiple Vendors global.cgi access"; flow:to_server,established;
content:"/global.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4579; reference:cve,2000-0952;
reference:nessus,11748; classtype:web-application-activity; sid:2210; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Lars
Ellingsen guestserver.cgi access"; flow:to_server,established;
content:"/guestserver.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,4579; reference:cve,2001-0180;
reference:nessus,11748; classtype:web-application-activity; sid:2211; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cgiCentral WebStore imageFolio.cgi access"; flow:to_server,established;
content:"/imageFolio.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4579; reference:bugtraq,6265; reference:cve,2002-
1334; reference:nessus,11748; classtype:web-application-activity; sid:2212;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oatmeal Studios Mail File mailfile.cgi access"; flow:to_server,established;
content:"/mailfile.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,1807; reference:bugtraq,4579; reference:cve,2000-
0977; reference:nessus,11748; classtype:web-application-activity; sid:2213;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP 3R
Soft MailStudio 2000 mailview.cgi access"; flow:to_server,established;
content:"/mailview.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,1335; reference:bugtraq,4579; reference:cve,2000-
0526; reference:nessus,11748; classtype:web-application-activity; sid:2214;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Alabanza Control Panel nsManager.cgi access"; flow:to_server,established;
content:"/nsManager.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,1710; reference:bugtraq,4579; reference:cve,2000-
1023; reference:nessus,11748; classtype:web-application-activity; sid:2215;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Ipswitch IMail readmail.cgi access"; flow:to_server,established;
content:"/readmail.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,3427; reference:bugtraq,4579; reference:cve,2001-
1283; reference:nessus,11748; classtype:web-application-activity; sid:2216;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Ipswitch IMail printmail.cgi access"; flow:to_server,established;
content:"/printmail.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,3427; reference:bugtraq,4579; reference:cve,2001-
1283; reference:nessus,11748; classtype:web-application-activity; sid:2217;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oracle Cobalt RaQ service.cgi access"; flow:to_server,established;
content:"/service.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4211; reference:bugtraq,4579; reference:cve,2002-
0346; reference:nessus,11748; classtype:web-application-activity; sid:2218;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Trend Micro Interscan VirusWall setpasswd.cgi access"; flow:to_server,established;
content:"/setpasswd.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,2212; reference:bugtraq,4579; reference:cve,2001-
0133; reference:nessus,11748; classtype:web-application-activity; sid:2219;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Leif
M. Wright simplestmail.cgi access"; flow:to_server,established;
content:"/simplestmail.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,2106; reference:bugtraq,4579;
reference:cve,2001-0022; reference:nessus,11748; classtype:web-application-
activity; sid:2220; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cgiCentral WebStore ws_mail.cgi access"; flow:to_server,established;
content:"/ws_mail.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,2861; reference:bugtraq,4579; reference:cve,2001-
1343; reference:nessus,11748; classtype:web-application-activity; sid:2221;
rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Infinity CGI exploit scanner nph-exploitscanget.cgi access";
flow:to_server,established; content:"/nph-exploitscanget.cgi"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,7910;
reference:bugtraq,7911; reference:bugtraq,7913; reference:cve,2003-0434;
reference:nessus,11740; classtype:web-application-activity; sid:2222; rev:20;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
CGIScript.net csNews.cgi access"; flow:to_server,established;
content:"/csNews.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,4994; reference:cve,2002-0923;
reference:nessus,11726; classtype:web-application-activity; sid:2223; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Psunami Bulletin Board psunami.cgi access"; flow:to_server,established;
content:"/psunami.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,6607; reference:nessus,11750; classtype:web-
application-activity; sid:2224; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Linksys BEFSR41 gozila.cgi access"; flow:to_server,established;
content:"/gozila.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,6086; reference:cve,2002-1236;
reference:nessus,11773; classtype:web-application-activity; sid:2225; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
pmachine remote file include attempt"; flow:to_server,established;
content:"lib.inc.php"; fast_pattern; nocase; http_uri; content:"pm_path=";
http_uri; pcre:"/pm_path=(https?|ftps?|php)/Ui"; metadata:ruleset community,
service http; reference:bugtraq,7919; reference:nessus,11739; classtype:web-
application-attack; sid:2226; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
forum_details.php access"; flow:to_server,established; content:"forum_details.php";
http_uri; metadata:ruleset community, service http; reference:bugtraq,7933;
reference:nessus,11760; classtype:web-application-attack; sid:2227; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
phpMyAdmin db_details_importdocsql.php access"; flow:to_server,established;
content:"db_details_importdocsql.php"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,7962;
reference:bugtraq,7965; reference:nessus,11761; classtype:web-application-attack;
sid:2228; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
viewtopic.php access"; flow:to_server,established; content:"/viewtopic.php";
fast_pattern; nocase; http_uri; content:"days="; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,7979; reference:cve,2003-0486;
reference:nessus,11767; classtype:web-application-attack; sid:2229; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP NetGear
router default password login attempt admin/password"; flow:to_server,established;
content:"Authorization|3A|"; nocase; http_header; content:"YWRtaW46cGFzc3dvcmQ";
nocase; http_header;
pcre:"/^Authorization\x3a(\s*|\s*\r?\n\s+)Basic\s+YWRtaW46cGFzc3dvcmQ/smiH";
metadata:ruleset community, service http; reference:nessus,11737;
classtype:default-login-attempt; sid:2230; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
register.dll access"; flow:to_server,established; content:"/register.dll";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3327; reference:cve,2001-0958; reference:nessus,11747;
classtype:web-application-activity; sid:2231; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ContentFilter.dll access"; flow:to_server,established;
content:"/ContentFilter.dll"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,3327; reference:cve,2001-0958;
reference:nessus,11747; classtype:web-application-activity; sid:2232; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
SFNofitication.dll access"; flow:to_server,established;
content:"/SFNofitication.dll"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,3327; reference:cve,2001-0958;
reference:nessus,11747; classtype:web-application-activity; sid:2233; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
TOP10.dll access"; flow:to_server,established; content:"/TOP10.dll";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3327; reference:cve,2001-0958; reference:nessus,11747;
classtype:web-application-activity; sid:2234; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
SpamExcp.dll access"; flow:to_server,established; content:"/SpamExcp.dll";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3327; reference:cve,2001-0958; reference:nessus,11747;
classtype:web-application-activity; sid:2235; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
spamrule.dll access"; flow:to_server,established; content:"/spamrule.dll";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3327; reference:cve,2001-0958; reference:nessus,11747;
classtype:web-application-activity; sid:2236; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cgiWebupdate.exe access"; flow:to_server,established; content:"/cgiWebupdate.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3216; reference:cve,2001-1150; reference:nessus,11722;
classtype:web-application-activity; sid:2237; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
WebLogic ConsoleHelp view source attempt"; flow:to_server,established;
content:"/ConsoleHelp/"; nocase; http_uri; content:".jsp"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,1518;
reference:cve,2000-0682; reference:nessus,11724; classtype:web-application-attack;
sid:2238; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
redirect.exe access"; flow:to_server,established; content:"/redirect.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1256; reference:cve,2000-0401; reference:nessus,11723;
classtype:web-application-activity; sid:2239; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
changepw.exe access"; flow:to_server,established; content:"/changepw.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1256; reference:cve,2000-0401; reference:nessus,11723;
classtype:web-application-activity; sid:2240; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cwmail.exe access"; flow:to_server,established; content:"/cwmail.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4093; reference:cve,2002-0273; reference:nessus,11727;
classtype:web-application-activity; sid:2241; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ddicgi.exe access"; flow:to_server,established; content:"/ddicgi.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,1657; reference:cve,2000-0826; reference:nessus,11728;
classtype:web-application-activity; sid:2242; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ndcgi.exe access"; flow:to_server,established; content:"/ndcgi.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3583; reference:cve,2001-0922; reference:nessus,11730;
classtype:web-application-activity; sid:2243; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
VsSetCookie.exe access"; flow:to_server,established; content:"/VsSetCookie.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3784; reference:cve,2002-0236; reference:nessus,11731;
classtype:web-application-activity; sid:2244; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Webnews.exe access"; flow:to_server,established; content:"/Webnews.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,4124; reference:cve,2002-0290; reference:nessus,11732;
classtype:web-application-activity; sid:2245; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
webadmin.dll access"; flow:to_server,established; content:"/webadmin.dll";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,7438; reference:bugtraq,7439; reference:bugtraq,8024;
reference:cve,2003-0471; reference:nessus,11771; classtype:web-application-
activity; sid:2246; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
UploadScript11.asp access"; flow:to_server,established;
content:"/UploadScript11.asp"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,3608; reference:cve,2001-0938;
reference:nessus,11746; classtype:web-application-activity; sid:2247; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
DirectoryListing.asp access"; flow:to_server,established;
content:"/DirectoryListing.asp"; nocase; http_uri; metadata:ruleset community,
service http; reference:cve,2001-0938; classtype:web-application-activity;
sid:2248; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
/pcadmin/login.asp access"; flow:to_server,established;
content:"/pcadmin/login.asp"; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,8103; reference:nessus,11785; classtype:web-application-
activity; sid:2249; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP USER format
string attempt"; flow:to_server,established; content:"USER"; fast_pattern:only;
pcre:"/^USER\s+[^\n]*?%/smi"; metadata:ruleset community, service pop3;
reference:bugtraq,10976; reference:bugtraq,7667; reference:cve,2003-0391;
reference:nessus,11742; classtype:attempted-admin; sid:2250; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows
SMB-DS DCERPC Remote Activation bind attempt"; flow:to_server,established;
content:"|FF|SMB%"; depth:5; offset:4; nocase; content:"&|00|"; within:2;
distance:56; content:"|5C 00|P|00|I|00|P|00|E|00 5C 00|"; within:12; distance:5;
nocase; content:"|05|"; within:1; content:"|0B|"; within:1; distance:1;
byte_test:1,&,1,0,relative; content:"|B8|J|9F|M|1C|}|CF 11 86 1E 00| |AF|n|7C|W";
within:16; distance:29; tag:session,5,packets; metadata:ruleset community, service
netbios-ssn; reference:bugtraq,8234; reference:bugtraq,8458; reference:cve,2003-
0528; reference:cve,2003-0605; reference:cve,2003-0715; reference:nessus,11798;
reference:nessus,11835; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS03-039; classtype:attempted-admin; sid:2252; rev:22;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL XEXCH50
overflow attempt"; flow:to_server,established; content:"XEXCH50";
fast_pattern:only; pcre:"/^XEXCH50\s+-\d/smi"; metadata:ruleset community, service
smtp; reference:bugtraq,8838; reference:cve,2003-0714; reference:nessus,11889;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-046;
classtype:attempted-admin; sid:2253; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1024: (msg:"PROTOCOL-RPC sadmind query
with root credentials attempt TCP"; flow:to_server,established; content:"|00 01 87
88|"; depth:4; offset:16; content:"|00 00 00 01 00 00 00 01|"; within:8;
distance:4; byte_jump:4,8,relative,align; content:"|00 00 00 00|"; within:4;
metadata:ruleset community; classtype:misc-attack; sid:2255; rev:13;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1024: (msg:"PROTOCOL-RPC sadmind query
with root credentials attempt UDP"; flow:to_server; content:"|00 01 87 88|";
depth:4; offset:12; content:"|00 00 00 01 00 00 00 01|"; within:8; distance:4;
byte_jump:4,8,relative,align; content:"|00 00 00 00|"; within:4; metadata:ruleset
community, service sunrpc; classtype:misc-attack; sid:2256; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 135 (msg:"OS-WINDOWS DCERPC Messenger
Service buffer overflow attempt"; content:"|04 00|"; depth:2;
byte_test:1,>,15,2,relative; byte_jump:4,86,little,align,relative;
byte_jump:4,8,little,align,relative; byte_test:4,>,1024,0,little,relative;
metadata:ruleset community; reference:bugtraq,8826; reference:cve,2003-0717;
reference:nessus,11888; reference:nessus,11890;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-043;
classtype:attempted-admin; sid:2257; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows
SMB-DS DCERPC Messenger Service buffer overflow attempt";
flow:to_server,established; content:"|FF|SMB%"; depth:5; offset:4; nocase;
content:"&|00|"; within:2; distance:56; content:"|5C 00|P|00|I|00|P|00|E|00 5C
00|"; within:12; distance:5; nocase; content:"|04 00|"; within:2;
byte_test:1,>,15,2,relative; byte_jump:4,86,little,align,relative;
byte_jump:4,8,little,align,relative; byte_test:4,>,1024,0,little,relative;
metadata:ruleset community, service netbios-ssn; reference:bugtraq,8826;
reference:cve,2003-0717; reference:nessus,11888; reference:nessus,11890;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-043;
classtype:attempted-admin; sid:2258; rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL EXPN overflow
attempt"; flow:to_server,established; content:"EXPN"; nocase;
isdataat:255,relative; pcre:"/^EXPN[^\n]{255}/smi"; metadata:ruleset community,
service smtp; reference:bugtraq,6991; reference:bugtraq,7230; reference:cve,2002-
1337; reference:cve,2003-0161; classtype:attempted-admin; sid:2259; rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL VRFY overflow
attempt"; flow:to_server,established; content:"VRFY"; nocase;
isdataat:255,relative; pcre:"/^VRFY[^\n]{255}/smi"; metadata:ruleset community,
service smtp; reference:bugtraq,6991; reference:bugtraq,7230; reference:cve,2002-
1337; reference:cve,2003-0161; classtype:attempted-admin; sid:2260; rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail SEND
FROM prescan too many addresses overflow"; flow:to_server,established;
content:"SEND FROM|3A|"; fast_pattern:only; pcre:"/^SEND FROM\x3a\s*[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?</smi";
metadata:ruleset community, service smtp; reference:bugtraq,6991;
reference:cve,2002-1337; reference:nessus,11316; classtype:attempted-admin;
sid:2261; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail SEND
FROM prescan too long addresses overflow"; flow:to_server,established;
content:"SEND FROM|3A|"; fast_pattern:only; pcre:"/^SEND FROM\x3a\s+[\w\s@\.]
{200,}\x3b[\w\s@\.]{200,}\x3b[\w\s@\.]{200}/smi"; metadata:ruleset community,
service smtp; reference:bugtraq,7230; reference:cve,2003-0161;
reference:nessus,11499; classtype:misc-attack; sid:2262; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail SAML
FROM prescan too many addresses overflow"; flow:to_server,established;
content:"SAML FROM|3A|"; fast_pattern:only; pcre:"/^SAML FROM\x3a\s*[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?</smi";
metadata:ruleset community, service smtp; reference:bugtraq,6991;
reference:cve,2002-1337; classtype:attempted-admin; sid:2263; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail SAML
FROM prescan too long addresses overflow"; flow:to_server,established;
content:"SAML FROM|3A|"; fast_pattern:only; pcre:"/^SAML FROM\x3a\s+[\w\s@\.]
{200,}\x3b[\w\s@\.]{200,}\x3b[\w\s@\.]{200}/smi"; metadata:ruleset community,
service smtp; reference:bugtraq,7230; reference:cve,2003-0161;
reference:nessus,11499; classtype:misc-attack; sid:2264; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail SOML
FROM prescan too many addresses overflow"; flow:to_server,established;
content:"SOML FROM|3A|"; fast_pattern:only; pcre:"/^SOML FROM\x3a\s*[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?</smi";
metadata:ruleset community, service smtp; reference:bugtraq,6991;
reference:cve,2002-1337; classtype:attempted-admin; sid:2265; rev:14;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail SOML
FROM prescan too long addresses overflow"; flow:to_server,established;
content:"SOML FROM|3A|"; fast_pattern:only; pcre:"/^SOML FROM\x3a\s+[\w\s@\.]
{200,}\x3b[\w\s@\.]{200,}\x3b[\w\s@\.]{200}/smi"; metadata:ruleset community,
service smtp; reference:bugtraq,7230; reference:cve,2003-0161;
reference:nessus,11499; classtype:misc-attack; sid:2266; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail MAIL
FROM prescan too many addresses overflow"; flow:to_server,established;
content:"MAIL FROM|3A|"; fast_pattern:only; pcre:"/^MAIL FROM\x3a\s*[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?</smi";
metadata:ruleset community, service smtp; reference:bugtraq,6991;
reference:cve,2002-1337; classtype:attempted-admin; sid:2267; rev:15;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail MAIL
FROM prescan too long addresses overflow"; flow:to_server,established;
content:"MAIL FROM|3A|"; fast_pattern:only; pcre:"/^MAIL FROM\x3a\s+[\w\s@\.]
{200,}\x3b[\w\s@\.]{200,}\x3b[\w\s@\.]{200}/smi"; metadata:ruleset community,
service smtp; reference:bugtraq,7230; reference:cve,2003-0161;
reference:nessus,11499; classtype:attempted-admin; sid:2268; rev:16;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail RCPT
TO prescan too many addresses overflow"; flow:to_server,established; content:"RCPT
TO|3A|"; fast_pattern:only; pcre:"/^RCPT TO\x3a\s*[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?
<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?<[^\n]*?</smi"; metadata:ruleset community,
service smtp; reference:bugtraq,6991; reference:cve,2002-1337; classtype:attempted-
admin; sid:2269; rev:15;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Sendmail RCPT
TO prescan too long addresses overflow"; flow:to_server,established; content:"RCPT
TO|3A|"; fast_pattern:only; pcre:"/^RCPT TO\x3a\s*[\w\s@\.]{200,}\x3b[\w\s@\.]
{200,}\x3b[\w\s@\.]{200}/smi"; metadata:ruleset community, service smtp;
reference:bugtraq,7230; reference:cve,2003-0161; reference:cve,2003-0694;
reference:nessus,11499; classtype:attempted-admin; sid:2270; rev:18;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR FsSniffer
connection attempt"; flow:to_server,established; content:"RemoteNC Control
Password|3A|"; metadata:ruleset community; reference:nessus,11854;
classtype:trojan-activity; sid:2271; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP LIST integer
overflow attempt"; flow:to_server,established; content:"LIST"; fast_pattern:only;
pcre:"/^LIST\s+\x22-W\s+\d+/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,8875; reference:cve,2003-0853; reference:cve,2003-0854;
reference:nessus,11912; classtype:misc-attack; sid:2272; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP login brute
force attempt"; flow:to_server,established,no_stream; content:"LOGIN";
fast_pattern:only; detection_filter:track by_dst, count 30, seconds 30;
metadata:ruleset community, service imap; classtype:suspicious-login; sid:2273;
rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP login brute force
attempt"; flow:to_server,established,no_stream; content:"USER"; fast_pattern:only;
detection_filter:track by_dst, count 30, seconds 30; metadata:ruleset community,
service pop3; classtype:suspicious-login; sid:2274; rev:10;)
# alert tcp $SMTP_SERVERS 25 -> $EXTERNAL_NET any (msg:"SERVER-MAIL AUTH LOGON
brute force attempt"; flow:to_client,established,no_stream; content:"Authentication
unsuccessful"; offset:54; nocase; detection_filter:track by_dst, count 5, seconds
60; metadata:ruleset community, service smtp; classtype:suspicious-login; sid:2275;
rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
oracle portal demo access"; flow:to_server,established;
content:"/pls/portal/PORTAL_DEMO"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:nessus,11918; classtype:web-application-
activity; sid:2276; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
PeopleSoft PeopleBooks psdoccgi access"; flow:to_server,established;
content:"/psdoccgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,9037; reference:bugtraq,9038; reference:cve,2003-
0626; reference:cve,2003-0627; classtype:web-application-activity; sid:2277;
rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP HTTP
request with negative Content-Length attempt"; flow:to_server,established;
content:"Content-Length|3A|"; nocase;
byte_test:10,>,0x7FFFFFFF,1,relative,string,dec; metadata:policy max-detect-ips
drop, ruleset community, service http; reference:bugtraq,16354;
reference:bugtraq,17879; reference:bugtraq,9098; reference:bugtraq,9476;
reference:bugtraq,9576; reference:cve,2004-0095; reference:cve,2005-3653;
reference:cve,2006-2162; reference:cve,2006-3655; reference:cve,2014-9192;
reference:cve,2015-5343; reference:cve,2017-1000470; classtype:misc-attack;
sid:2278; rev:33;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
UpdateClasses.php access"; flow:to_server,established;
content:"/UpdateClasses.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,9057; classtype:web-application-
activity; sid:2279; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Title.php access"; flow:to_server,established; content:"/Title.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9057; classtype:web-application-activity; sid:2280; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Setup.php access"; flow:to_server,established; content:"/Setup.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9057; reference:cve,2009-1151; classtype:web-application-
activity; sid:2281; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
GlobalFunctions.php access"; flow:to_server,established;
content:"/GlobalFunctions.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,9057; classtype:web-application-
activity; sid:2282; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
DatabaseFunctions.php access"; flow:to_server,established;
content:"/DatabaseFunctions.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,9057; classtype:web-application-
activity; sid:2283; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
rolis guestbook remote file include attempt"; flow:to_server,established;
content:"/insert.inc.php"; fast_pattern; nocase; http_uri; content:"path=";
metadata:ruleset community, service http; reference:bugtraq,9057; classtype:web-
application-attack; sid:2284; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
rolis guestbook access"; flow:to_server,established; content:"/insert.inc.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9057; classtype:web-application-activity; sid:2285; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
friends.php access"; flow:to_server,established; content:"/friends.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9088; classtype:web-application-activity; sid:2286; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_comment.php access"; flow:to_server,established;
content:"/admin_comment.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2287; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_edit.php access"; flow:to_server,established;
content:"/admin_edit.php"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,8890; reference:cve,2003-1178; reference:cve,2003-
1179; reference:cve,2003-1180; reference:cve,2003-1181; reference:nessus,11487;
classtype:web-application-activity; sid:2288; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_embed.php access"; flow:to_server,established;
content:"/admin_embed.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2289; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_help.php access"; flow:to_server,established;
content:"/admin_help.php"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,8890; reference:cve,2003-1178; reference:cve,2003-
1179; reference:cve,2003-1180; reference:cve,2003-1181; reference:nessus,11487;
classtype:web-application-activity; sid:2290; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_license.php access"; flow:to_server,established;
content:"/admin_license.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2291; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_logout.php access"; flow:to_server,established;
content:"/admin_logout.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2292; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_password.php access"; flow:to_server,established;
content:"/admin_password.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2293; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_preview.php access"; flow:to_server,established;
content:"/admin_preview.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2294; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_settings.php access"; flow:to_server,established;
content:"/admin_settings.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2295; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_stats.php access"; flow:to_server,established;
content:"/admin_stats.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2296; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_templates_misc.php access"; flow:to_server,established;
content:"/admin_templates_misc.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2297; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_templates.php access"; flow:to_server,established;
content:"/admin_templates.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2298; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_tpl_misc_new.php access"; flow:to_server,established;
content:"/admin_tpl_misc_new.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2299; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll admin_tpl_new.php access"; flow:to_server,established;
content:"/admin_tpl_new.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8890; reference:cve,2003-1178;
reference:cve,2003-1179; reference:cve,2003-1180; reference:cve,2003-1181;
reference:nessus,11487; classtype:web-application-activity; sid:2300; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll booth.php access"; flow:to_server,established; content:"/booth.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,8890; reference:cve,2003-1178; reference:cve,2003-1179;
reference:cve,2003-1180; reference:cve,2003-1181; reference:nessus,11487;
classtype:web-application-activity; sid:2301; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll poll_ssi.php access"; flow:to_server,established;
content:"/poll_ssi.php"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,8890; reference:cve,2003-1178; reference:cve,2003-
1179; reference:cve,2003-1180; reference:cve,2003-1181; reference:nessus,11487;
classtype:web-application-activity; sid:2302; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Advanced Poll popup.php access"; flow:to_server,established; content:"/popup.php";
fast_pattern; nocase; http_uri; content:"include_path="; nocase; http_uri;
metadata:ruleset community, service http; reference:bugtraq,8890;
reference:cve,2003-1178; reference:cve,2003-1179; reference:cve,2003-1180;
reference:cve,2003-1181; reference:nessus,11487; classtype:web-application-
activity; sid:2303; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
files.inc.php access"; flow:to_server,established; content:"/files.inc.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,8910; reference:cve,2003-1153; classtype:web-application-
activity; sid:2304; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
chatbox.php access"; flow:to_server,established; content:"/chatbox.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,8930; reference:cve,2003-1191; classtype:web-application-
activity; sid:2305; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
gallery remote file include attempt"; flow:to_server,established;
content:"/setup/"; http_uri; content:"GALLERY_BASEDIR="; http_uri;
pcre:"/GALLERY_BASEDIR=(https?|ftps?|php)/Ui"; metadata:ruleset community, service
http; reference:bugtraq,8814; reference:cve,2003-1227; reference:nessus,11876;
classtype:web-application-attack; sid:2306; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
PayPal Storefront remote file include attempt"; flow:to_server,established;
content:"do=ext"; http_uri; content:"page="; http_uri; pcre:"/page=(https?|ftps?|
php)/Ui"; metadata:ruleset community, service http; reference:bugtraq,8791;
reference:nessus,11873; classtype:web-application-attack; sid:2307; rev:15;)
# alert tcp $HOME_NET 2401 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE CVS non-
relative path error response"; flow:to_client,established; content:"E cvs server|
3A| warning|3A| cannot make directory CVS in /"; fast_pattern:only;
metadata:ruleset community; reference:bugtraq,9178; reference:cve,2003-0977;
reference:nessus,11947; classtype:misc-attack; sid:2317; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 2401 (msg:"SERVER-OTHER CVS non-relative
path access attempt"; flow:to_server,established; content:"Argument";
pcre:"/^Argument\s+\//smi"; pcre:"/^Directory/smiR"; metadata:ruleset community;
reference:bugtraq,9178; reference:cve,2003-0977; reference:nessus,11947;
classtype:misc-attack; sid:2318; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1655 (msg:"SERVER-OTHER ebola PASS
overflow attempt"; flow:to_server,established; content:"PASS"; fast_pattern:only;
pcre:"/^PASS\s[^\n]{49}/smi"; metadata:ruleset community; reference:bugtraq,9156;
classtype:attempted-admin; sid:2319; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1655 (msg:"SERVER-OTHER ebola USER
overflow attempt"; flow:to_server,established; content:"USER"; fast_pattern:only;
pcre:"/^USER\s[^\n]{49}/smi"; metadata:ruleset community; reference:bugtraq,9156;
classtype:attempted-admin; sid:2320; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
foxweb.exe access"; flow:to_server,established; content:"/foxweb.exe"; nocase;
http_uri; metadata:ruleset community, service http; reference:nessus,11939;
classtype:web-application-activity; sid:2321; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
foxweb.dll access"; flow:to_server,established; content:"/foxweb.dll"; nocase;
http_uri; metadata:ruleset community, service http; reference:nessus,11939;
classtype:web-application-activity; sid:2322; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
iSoft-Solutions QuickStore shopping cart quickstore.cgi access";
flow:to_server,established; content:"/quickstore.cgi"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,9282;
reference:nessus,11975; classtype:web-application-activity; sid:2323; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS VP-ASP
shopsearch.asp access"; flow:to_server,established; content:"/shopsearch.asp";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,9133;
reference:bugtraq,9134; reference:nessus,11942; classtype:web-application-activity;
sid:2324; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS VP-ASP
ShopDisplayProducts.asp access"; flow:to_server,established;
content:"/ShopDisplayProducts.asp"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,9133; reference:bugtraq,9134;
reference:nessus,11942; classtype:web-application-activity; sid:2325; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
sgdynamo.exe access"; flow:to_server,established; content:"/sgdynamo.exe"; nocase;
http_uri; metadata:ruleset community, service http; reference:bugtraq,4720;
reference:cve,2002-0375; reference:nessus,11955; classtype:web-application-
activity; sid:2326; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
bsml.pl access"; flow:to_server,established; content:"/bsml.pl"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,9311;
reference:nessus,11973; classtype:web-application-activity; sid:2327; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
authentication_index.php access"; flow:to_server,established;
content:"/authentication_index.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:cve,2004-0032; reference:nessus,11982;
classtype:web-application-activity; sid:2328; rev:15;)
# alert udp $EXTERNAL_NET any -> $SQL_SERVERS any (msg:"SERVER-MSSQL probe response
overflow attempt"; flow:to_server; content:"|05|"; depth:1; byte_test:2,>,512,1;
content:"|3B|"; distance:0; isdataat:512,relative; content:!"|3B|"; within:512;
metadata:ruleset community; reference:bugtraq,9407; reference:cve,2003-0903;
reference:nessus,11990; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS04-003; classtype:attempted-user; sid:2329; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP auth overflow
attempt"; flow:to_server,established; content:"AUTH"; isdataat:368,relative;
content:!"|0A|"; within:368; metadata:ruleset community, service imap;
reference:bugtraq,8861; reference:cve,2003-1177; reference:nessus,11910;
classtype:misc-attack; sid:2330; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
MatrikzGB privilege escalation attempt"; flow:to_server,established;
content:"new_rights=admin"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8430; classtype:web-application-
activity; sid:2331; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP MKD format string
attempt"; flow:to_server,established; content:"MKD"; fast_pattern:only;
pcre:"/^MKD\s[^\n]*?%[^\n]*?%/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,9262; classtype:misc-attack; sid:2332; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP RENAME format
string attempt"; flow:to_server,established; content:"RENAME"; fast_pattern:only;
pcre:"/^RENAME\s[^\n]*?%[^\n]*?%/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,9262; classtype:misc-attack; sid:2333; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 3535 (msg:"PROTOCOL-FTP Yak! FTP server
default account login attempt"; flow:to_server,established; content:"USER"; nocase;
content:"y049575046"; fast_pattern:only; pcre:"/^USER\s+y049575046/smi";
metadata:ruleset community; reference:bugtraq,9072; classtype:suspicious-login;
sid:2334; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 3535 (msg:"PROTOCOL-FTP RMD / attempt";
flow:to_server,established; content:"RMD"; fast_pattern:only;
pcre:"/^RMD\s+\x2f$/smi"; metadata:ruleset community; reference:bugtraq,9159;
classtype:attempted-dos; sid:2335; rev:10;)
# alert udp any any -> any 69 (msg:"PROTOCOL-TFTP PUT filename overflow attempt";
flow:to_server; content:"|00|"; depth:1; byte_test:1,<,3,0,relative;
isdataat:101,relative; content:!"|00|"; within:100; distance:2; metadata:ruleset
community; reference:bugtraq,20131; reference:bugtraq,22923;
reference:bugtraq,7819; reference:bugtraq,8505; reference:cve,2003-0380;
reference:cve,2003-0729; reference:cve,2006-4948; reference:cve,2006-6184;
reference:cve,2008-1611; reference:cve,2009-2957; reference:cve,2009-2958;
reference:nessus,18264; classtype:attempted-admin; sid:2337; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP LIST buffer
overflow attempt"; flow:to_server,established; content:"LIST"; nocase;
isdataat:128,relative; pcre:"/^LIST(?!\n)\s[^\n]{128}/smi"; metadata:policy max-
detect-ips drop, ruleset community, service ftp; reference:bugtraq,10181;
reference:bugtraq,14339; reference:bugtraq,33454; reference:bugtraq,58247;
reference:bugtraq,6869; reference:bugtraq,7251; reference:bugtraq,7861;
reference:bugtraq,8486; reference:bugtraq,9675; reference:cve,1999-0349;
reference:cve,1999-1510; reference:cve,2000-0129; reference:cve,2004-1992;
reference:cve,2005-2373; reference:cve,2007-0019; reference:cve,2009-0351;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS99-003;
classtype:misc-attack; sid:2338; rev:35;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 69 (msg:"PROTOCOL-TFTP NULL command
attempt"; flow:to_server; content:"|00 00|"; depth:2; metadata:ruleset community;
reference:bugtraq,7575; classtype:bad-unknown; sid:2339; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP SITE CHMOD
overflow attempt"; flow:to_server,established; content:"SITE"; nocase;
content:"CHMOD"; distance:0; nocase; isdataat:200,relative;
pcre:"/^SITE\s+CHMOD\s[^\n]{200}/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,10181; reference:bugtraq,9483; reference:bugtraq,9675;
reference:cve,1999-0838; reference:nessus,12037; classtype:attempted-admin;
sid:2340; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP DCP-
Portal remote file include editor script attempt"; flow:to_server,established;
content:"/library/editor/editor.php"; fast_pattern; nocase; http_uri;
content:"root="; http_uri; metadata:ruleset community, service http;
reference:bugtraq,6525; classtype:web-application-attack; sid:2341; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP DCP-
Portal remote file include lib script attempt"; flow:to_server,established;
content:"/library/lib.php"; fast_pattern; nocase; http_uri; content:"root=";
http_uri; metadata:ruleset community, service http; reference:bugtraq,6525;
classtype:web-application-attack; sid:2342; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP STOR overflow
attempt"; flow:to_server,established; content:"STOR"; nocase;
isdataat:200,relative; content:!"|0D|"; within:200; content:!"|0A|"; within:200;
content:!"|00|"; within:200; metadata:ruleset community, service ftp;
reference:bugtraq,8668; reference:cve,2000-0133; reference:url,exploit-
db.com/exploits/39662/; classtype:attempted-admin; sid:2343; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP XCWD overflow
attempt"; flow:to_server,established; content:"XCWD"; nocase;
isdataat:100,relative; pcre:"/^XCWD(?!\n)\s[^\n]{100}/smi"; metadata:ruleset
community, service ftp; reference:bugtraq,11542; reference:bugtraq,8704;
reference:cve,2004-2728; classtype:attempted-admin; sid:2344; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
PhpGedView search.php access"; flow:to_server,established; content:"/search.php";
nocase; http_uri; content:"action=soundex"; fast_pattern; nocase; http_uri;
content:"firstname="; nocase; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9369; reference:cve,2004-0032; classtype:web-application-
activity; sid:2345; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
myPHPNuke chatheader.php access"; flow:to_server,established;
content:"/chatheader.php"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,6544; classtype:web-application-activity; sid:2346;
rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
myPHPNuke partner.php access"; flow:to_server,established; content:"/partner.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,6544; classtype:web-application-activity; sid:2347; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
IdeaBox cord.php file include"; flow:to_server,established; content:"/index.php";
nocase; http_uri; content:"ideaDir="; fast_pattern:only; content:"cord.php";
nocase; metadata:ruleset community, service http; reference:bugtraq,7488;
classtype:web-application-activity; sid:2353; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
IdeaBox notification.php file include"; flow:to_server,established;
content:"/index.php"; nocase; http_uri; content:"gorumDir="; fast_pattern:only;
content:"notification.php"; nocase; metadata:ruleset community, service http;
reference:bugtraq,7488; classtype:web-application-activity; sid:2354; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Invision Board emailer.php file include"; flow:to_server,established;
content:"/ad_member.php"; fast_pattern; nocase; http_uri; content:"emailer.php";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,7204;
classtype:web-application-activity; sid:2355; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
WebChat db_mysql.php file include"; flow:to_server,established;
content:"/defines.php"; nocase; http_uri; content:"WEBCHATPATH="; nocase;
content:"db_mysql.php"; fast_pattern:only; metadata:ruleset community, service
http; reference:bugtraq,7000; reference:cve,2007-0485; classtype:web-application-
attack; sid:2356; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
WebChat english.php file include"; flow:to_server,established;
content:"/defines.php"; nocase; http_uri; content:"WEBCHATPATH="; nocase;
content:"english.php"; fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,7000; reference:cve,2007-0485; classtype:web-application-attack;
sid:2357; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Typo3 translations.php file include"; flow:to_server,established;
content:"/translations.php"; fast_pattern; nocase; http_uri; content:"ONLY=";
nocase; metadata:ruleset community, service http; reference:bugtraq,6984;
classtype:web-application-attack; sid:2358; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Invision Board ipchat.php file include"; flow:to_server,established;
content:"/ipchat.php"; nocase; http_uri; content:"root_path=";
content:"conf_global.php"; fast_pattern:only; metadata:ruleset community, service
http; reference:bugtraq,6976; reference:cve,2003-1385; classtype:web-application-
attack; sid:2359; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
myphpPagetool pt_config.inc file include"; flow:to_server,established;
content:"/doc/admin"; nocase; http_uri; content:"ptinclude="; nocase;
content:"pt_config.inc"; fast_pattern:only; metadata:ruleset community, service
http; reference:bugtraq,6744; classtype:web-application-attack; sid:2360; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
news.php file include"; flow:to_server,established; content:"/news.php";
fast_pattern; nocase; http_uri; content:"template="; nocase; metadata:ruleset
community, service http; reference:bugtraq,6674; classtype:web-application-attack;
sid:2361; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP YaBB
SE packages.php file include"; flow:to_server,established; content:"/packages.php";
fast_pattern; nocase; http_uri; content:"packer.php"; nocase; metadata:ruleset
community, service http; reference:bugtraq,6663; classtype:web-application-attack;
sid:2362; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Cyboards default_header.php access"; flow:to_server,established;
content:"/default_header.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,6597; classtype:web-application-
activity; sid:2363; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Cyboards options_form.php access"; flow:to_server,established;
content:"/options_form.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,6597; classtype:web-application-
activity; sid:2364; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
newsPHP Language file include attempt"; flow:to_server,established;
content:"/nphpd.php"; fast_pattern; nocase; http_uri; content:"LangFile"; nocase;
metadata:ruleset community, service http; reference:bugtraq,8488; classtype:web-
application-activity; sid:2365; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
PhpGedView PGV authentication_index.php base directory manipulation attempt";
flow:to_server,established; content:"/authentication_index.php"; nocase; http_uri;
content:"PGV_BASE_DIRECTORY"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,9368; reference:cve,2004-0030; classtype:web-
application-attack; sid:2366; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
PhpGedView PGV functions.php base directory manipulation attempt";
flow:to_server,established; content:"/functions.php"; nocase; http_uri;
content:"PGV_BASE_DIRECTORY"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,9368; reference:cve,2004-0030; classtype:web-
application-attack; sid:2367; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
PhpGedView PGV config_gedcom.php base directory manipulation attempt";
flow:to_server,established; content:"/config_gedcom.php"; nocase; http_uri;
content:"PGV_BASE_DIRECTORY"; fast_pattern:only; metadata:ruleset community,
service http; reference:bugtraq,9368; reference:cve,2004-0030; classtype:web-
application-attack; sid:2368; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ISAPISkeleton.dll access"; flow:to_server,established;
content:"/ISAPISkeleton.dll"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,9516; reference:cve,2004-2128;
classtype:web-application-activity; sid:2369; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
BugPort config.conf file access"; flow:to_server,established;
content:"/config.conf"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,9542; reference:cve,2004-2353; classtype:attempted-
recon; sid:2370; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Sample_showcode.html access"; flow:to_server,established;
content:"/Sample_showcode.html"; nocase; http_uri; content:"fname";
metadata:ruleset community, service http; reference:bugtraq,9555;
reference:cve,2004-2170; classtype:web-application-activity; sid:2371; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Photopost PHP Pro showphoto.php access"; flow:to_server,established;
content:"/showphoto.php"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,9557; reference:cve,2004-0239; reference:cve,2004-
0250; classtype:web-application-activity; sid:2372; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP XMKD overflow
attempt"; flow:to_server,established; content:"XMKD"; nocase;
isdataat:200,relative; pcre:"/^XMKD(?!\n)\s[^\n]{200}/smi"; metadata:ruleset
community, service ftp; reference:bugtraq,7909; reference:cve,2000-0133;
reference:cve,2001-1021; classtype:attempted-admin; sid:2373; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP NLST overflow
attempt"; flow:to_server,established; content:"NLST"; nocase;
isdataat:200,relative; pcre:"/^NLST(?!\n)\s[^\n]{200}/smi"; metadata:ruleset
community, service ftp; reference:bugtraq,7909; reference:cve,1999-1544;
reference:cve,2009-3023; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS09-053; reference:url,www.kb.cert.org/vuls/id/276653;
classtype:attempted-admin; sid:2374; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 3127:3199 (msg:"MALWARE-CNC
DoomJuice/mydoom.a backdoor upload/execute"; flow:to_server,established; content:"|
85 13|<|9E A2|"; depth:5; metadata:ruleset community;
reference:url,securityresponse.symantec.com/avcenter/venc/data/w32.hllw.doomjuice.h
tml; classtype:trojan-activity; sid:2375; rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500 (msg:"SERVER-OTHER ISAKMP first
payload certificate request length overflow attempt"; flow:to_server;
byte_test:4,>,2043,24; content:"|07|"; depth:1; offset:16; byte_test:2,>,2043,30;
metadata:ruleset community; reference:bugtraq,9582; reference:cve,2004-0040;
classtype:attempted-admin; sid:2376; rev:8;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500 (msg:"SERVER-OTHER ISAKMP second
payload certificate request length overflow attempt"; flow:to_server;
byte_test:4,>,2043,24; content:"|07|"; depth:1; offset:28; byte_jump:2,30;
byte_test:2,>,2043,-2,relative; metadata:ruleset community; reference:bugtraq,9582;
reference:cve,2004-0040; classtype:attempted-admin; sid:2377; rev:8;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500 (msg:"SERVER-OTHER ISAKMP third
payload certificate request length overflow attempt"; flow:to_server;
byte_test:4,>,2043,24; byte_jump:2,30; content:"|07|"; within:1; distance:-4;
byte_jump:2,1,relative; byte_test:2,>,2043,-2,relative; metadata:ruleset community;
reference:bugtraq,9582; reference:cve,2004-0040; classtype:attempted-admin;
sid:2378; rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500 (msg:"SERVER-OTHER ISAKMP forth
payload certificate request length overflow attempt"; flow:to_server;
byte_test:4,>,2043,24; byte_jump:2,30; byte_jump:2,-2,relative; content:"|07|";
within:1; distance:-4; byte_jump:2,1,relative; byte_test:2,>,2043,-2,relative;
metadata:ruleset community; reference:bugtraq,9582; reference:cve,2004-0040;
classtype:attempted-admin; sid:2379; rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500 (msg:"SERVER-OTHER ISAKMP fifth
payload certificate request length overflow attempt"; flow:to_server;
byte_test:4,>,2043,24; byte_jump:2,30; byte_jump:2,-2,relative; byte_jump:2,-
2,relative; content:"|07|"; within:1; distance:-4; byte_jump:2,1,relative;
byte_test:2,>,2043,-2,relative; metadata:ruleset community; reference:bugtraq,9582;
reference:cve,2004-0040; classtype:attempted-admin; sid:2380; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Checkpoint Firewall-1 HTTP parsing format string vulnerability attempt";
flow:to_server,established; content:"|3A|/"; offset:11; http_uri;
pcre:"/^[^\x3a\x3f]{11,}\x3a\x2f/Usmi"; metadata:ruleset community, service http;
reference:bugtraq,9581; reference:cve,2004-0039; reference:nessus,12084;
classtype:attempted-admin; sid:2381; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"OS-WINDOWS Microsoft Windows
SMB Session Setup NTLMSSP asn1 overflow attempt"; flow:to_server,established;
content:"|00|"; depth:1; content:"|FF|SMBs"; within:5; distance:3; byte_test:1,!
&,128,6,relative; pcre:"/^.{27}/R"; byte_test:4,&,2147483648,21,relative,little;
content:!"NTLMSSP"; within:7; distance:27; asn1:double_overflow,
bitstring_overflow, relative_offset 27, oversize_length 2048; metadata:ruleset
community; reference:bugtraq,9633; reference:bugtraq,9635; reference:cve,2003-0818;
reference:nessus,12052; reference:nessus,12065;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-007;
classtype:protocol-command-decode; sid:2382; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows
SMB-DS Session Setup NTLMSSP asn1 overflow attempt"; flow:to_server,established;
content:"|00|"; depth:1; content:"|FF|SMBs"; within:5; distance:3; byte_test:1,!
&,128,6,relative; pcre:"/^.{27}/R"; byte_test:4,&,2147483648,21,relative,little;
content:!"NTLMSSP"; within:7; distance:27; asn1:double_overflow,
bitstring_overflow, relative_offset 27, oversize_length 2048; metadata:ruleset
community, service netbios-ssn; reference:bugtraq,9633; reference:bugtraq,9635;
reference:cve,2003-0818; reference:nessus,12052; reference:nessus,12065;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-007;
classtype:protocol-command-decode; sid:2383; rev:26;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS NTLM
ASN1 vulnerability scan attempt"; flow:to_server,established;
content:"Authorization|3A|"; nocase; http_header; content:"Negotiate"; within:20;
nocase; http_header;
content:"YIQAAABiBoMAAAYrBgEFBQKgggBTMIFQoA4wDAYKKwYBBAGCNwICCqM"; within:100;
http_header; metadata:ruleset community, service http; reference:bugtraq,9633;
reference:bugtraq,9635; reference:cve,2003-0818; reference:nessus,12052;
reference:nessus,12055; reference:nessus,12065;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-007;
classtype:attempted-dos; sid:2386; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Apple QuickTime streaming server view_broadcast.cgi access";
flow:to_server,established; content:"/view_broadcast.cgi"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,8257;
reference:cve,2003-0422; classtype:web-application-activity; sid:2388; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP RNTO overflow
attempt"; flow:to_server,established; content:"RNTO"; nocase;
isdataat:200,relative; pcre:"/^RNTO(?!\n)\s[^\n]{200}/smi"; metadata:policy max-
detect-ips drop, ruleset community, service ftp; reference:bugtraq,15457;
reference:bugtraq,8315; reference:cve,2000-0133; reference:cve,2001-1021;
reference:cve,2003-0466; reference:cve,2005-3683; classtype:attempted-admin;
sid:2389; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP STOU overflow
attempt"; flow:to_server,established; content:"STOU"; nocase;
isdataat:200,relative; pcre:"/^STOU\s[^\n]{200}/smi"; metadata:ruleset community,
service ftp; reference:bugtraq,8315; reference:cve,2003-0466; classtype:attempted-
admin; sid:2390; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP APPE overflow
attempt"; flow:to_server,established; content:"APPE"; nocase;
isdataat:200,relative; pcre:"/^APPE(?!\n)\s[^\n]{200}/smi"; metadata:ruleset
community, service ftp; reference:bugtraq,8315; reference:bugtraq,8542;
reference:cve,2000-0133; reference:cve,2003-0466; reference:cve,2003-0772;
classtype:attempted-admin; sid:2391; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP RETR overflow
attempt"; flow:to_server,established; content:"RETR"; nocase;
isdataat:200,relative; pcre:"/^RETR(?!\n)\s[^\n]{200}/smi"; metadata:policy max-
detect-ips drop, ruleset community, service ftp; reference:bugtraq,15457;
reference:bugtraq,23168; reference:bugtraq,8315; reference:cve,2003-0466;
reference:cve,2004-0287; reference:cve,2004-0298; reference:cve,2005-3683;
classtype:attempted-admin; sid:2392; rev:22;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/_admin access"; flow:to_server,established; content:"/_admin/"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,9537;
reference:cve,2007-1156; reference:nessus,12032; classtype:web-application-
activity; sid:2393; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 2301 (msg:"SERVER-WEBAPP Compaq web-
based management agent denial of service attempt"; flow:to_server,established;
content:"<!"; depth:75; content:">"; within:50; metadata:ruleset community;
reference:bugtraq,8014; classtype:web-application-attack; sid:2394; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
InteractiveQuery.jsp access"; flow:to_server,established;
content:"/InteractiveQuery.jsp"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,8938; reference:cve,2003-0624;
classtype:web-application-activity; sid:2395; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
CCBill whereami.cgi arbitrary command execution attempt";
flow:to_server,established; content:"/whereami.cgi?"; nocase; http_uri;
content:"g="; distance:0; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,8095; reference:url,secunia.com/advisories/9191/;
classtype:web-application-attack; sid:2396; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
CCBill whereami.cgi access"; flow:to_server,established; content:"/whereami.cgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,8095; reference:url,secunia.com/advisories/9191/; classtype:web-
application-activity; sid:2397; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
WAnewsletter newsletter.php file include attempt"; flow:to_server,established;
content:"newsletter.php"; nocase; http_uri; content:"waroot"; fast_pattern:only;
content:"start.php"; nocase; metadata:ruleset community, service http;
reference:bugtraq,6965; classtype:web-application-attack; sid:2398; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
WAnewsletter db_type.php access"; flow:to_server,established;
content:"/sql/db_type.php"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,6964; classtype:web-application-
activity; sid:2399; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
edittag.pl access"; flow:to_server,established; content:"/edittag.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,6675; reference:cve,2003-1351; classtype:web-application-
activity; sid:2400; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB Session Setup andx
username overflow attempt"; flow:stateless; content:"|00|"; depth:1; content:"|FF|
SMB"; within:4; distance:3; pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,!&,128,6,relative; content:"s"; depth:1; offset:39;
byte_jump:2,0,little,relative; byte_test:4,!&,2147483648,21,relative,little;
content:!"|00|"; within:255; distance:29; metadata:ruleset community;
reference:bugtraq,9752; reference:cve,2004-0193;
reference:url,www.eeye.com/html/Research/Advisories/AD20040226.html;
classtype:protocol-command-decode; sid:2401; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS Session Setup
andx username overflow attempt"; flow:stateless; content:"|00|"; depth:1;
content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"s"; depth:1; offset:39; byte_jump:2,0,little,relative;
byte_test:4,!&,2147483648,21,relative,little; content:!"|00|"; within:255;
distance:29; metadata:ruleset community, service netbios-ssn;
reference:bugtraq,9752; reference:cve,2004-0193;
reference:url,www.eeye.com/html/Research/Advisories/AD20040226.html;
classtype:protocol-command-decode; sid:2402; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB Session Setup
unicode username overflow attempt"; flow:stateless; content:"|00|"; depth:1;
content:"|FF|SMBs"; within:5; distance:3; byte_test:1,&,128,6,relative; pcre:"/^.
{27}/sR"; byte_test:4,!&,2147483648,21,relative,little; content:!"|00 00|";
within:510; distance:29; metadata:ruleset community; reference:bugtraq,9752;
reference:cve,2004-0193;
reference:url,www.eeye.com/html/Research/Advisories/AD20040226.html;
classtype:protocol-command-decode; sid:2403; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS Session Setup
unicode andx username overflow attempt"; flow:stateless; content:"|00|"; depth:1;
content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"s"; depth:1; offset:39;
byte_jump:2,0,little,relative; byte_test:4,!&,2147483648,21,relative,little;
content:!"|00 00|"; within:510; distance:29; metadata:ruleset community, service
netbios-ssn; reference:bugtraq,9752; reference:cve,2004-0193;
reference:url,www.eeye.com/html/Research/Advisories/AD20040226.html;
classtype:protocol-command-decode; sid:2404; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
phptest.php access"; flow:to_server,established; content:"/phptest.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9737; reference:cve,2004-2374; classtype:web-application-
activity; sid:2405; rev:14;)
# alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"PROTOCOL-TELNET APC
SmartSlot default admin account attempt"; flow:to_server,established;
content:"TENmanUFactOryPOWER"; fast_pattern:only; metadata:ruleset community,
service telnet; reference:bugtraq,9681; reference:cve,2004-0311;
reference:nessus,12066; classtype:suspicious-login; sid:2406; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
util.pl access"; flow:to_server,established; content:"/util.pl"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:bugtraq,9748;
reference:cve,2004-2379; classtype:web-application-activity; sid:2407; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Invision Power Board search.pl access"; flow:to_server,established;
content:"/search.pl"; http_uri; content:"st="; nocase; metadata:ruleset community,
service http; reference:bugtraq,9766; reference:cve,2004-0338; classtype:web-
application-activity; sid:2408; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP APOP USER
overflow attempt"; flow:to_server,established; content:"APOP"; nocase;
isdataat:256,relative; pcre:"/^APOP\s+USER\s[^\n]{256}/smi"; metadata:ruleset
community, service pop3; reference:bugtraq,9794; reference:cve,2004-2375;
classtype:attempted-admin; sid:2409; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
IGeneric Free Shopping Cart page.php access"; flow:to_server,established;
content:"/page.php"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:bugtraq,9773; classtype:web-application-activity; sid:2410;
rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 554 (msg:"SERVER-WEBAPP RealNetworks
RealSystem Server DESCRIBE buffer overflow attempt"; flow:to_server,established;
content:"DESCRIBE"; nocase; content:"../"; distance:1; pcre:"/^DESCRIBE\s[^\n]
{300}/smi"; metadata:ruleset community; reference:bugtraq,8476; reference:cve,2003-
0725; reference:nessus,11642;
reference:url,www.service.real.com/help/faq/security/rootexploit091103.html;
classtype:web-application-attack; sid:2411; rev:16;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE
successful cross site scripting forced download attempt";
flow:to_server,established; content:"|0A|Referer|3A| res|3A|/C|3A|";
metadata:ruleset community; classtype:successful-user; sid:2412; rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500 (msg:"SERVER-OTHER ISAKMP delete
hash with empty hash attempt"; flow:to_server; content:"|08|"; depth:1; offset:16;
content:"|0C|"; depth:1; offset:28; content:"|00 04|"; depth:2; offset:30;
metadata:ruleset community; reference:bugtraq,9416; reference:bugtraq,9417;
reference:cve,2004-0164; classtype:misc-attack; sid:2413; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500 (msg:"SERVER-OTHER ISAKMP initial
contact notification without SPI attempt"; flow:to_server; content:"|0B|"; depth:1;
offset:16; content:"|00 0C 00 00 00 01 01 00 06 02|"; depth:10; offset:30;
metadata:ruleset community; reference:bugtraq,9416; reference:bugtraq,9417;
reference:cve,2004-0164; classtype:misc-attack; sid:2414; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500 (msg:"SERVER-OTHER ISAKMP second
payload initial contact notification without SPI attempt"; flow:to_server;
content:"|0B|"; depth:1; offset:28; byte_jump:2,30; content:"|00 0C 00 00 00 01 01
00|`|02|"; within:10; distance:-2; metadata:ruleset community;
reference:bugtraq,9416; reference:bugtraq,9417; reference:cve,2004-0164;
classtype:misc-attack; sid:2415; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP invalid MDTM
command attempt"; flow:to_server,established; content:"MDTM"; fast_pattern:only;
pcre:"/^MDTM \d+[-+]\D/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,9751; reference:cve,2001-1021; reference:cve,2004-0330;
classtype:attempted-admin; sid:2416; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP format string
attempt"; flow:to_server,established; content:"%"; fast_pattern:only; pcre:"/\s+.*?
%.*?%/smi"; metadata:ruleset community, service ftp; reference:bugtraq,15352;
reference:bugtraq,30993; reference:bugtraq,9800; reference:cve,2002-2074;
reference:cve,2007-1195; reference:cve,2009-4769; classtype:string-detect;
sid:2417; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 3389 (msg:"POLICY-OTHER Microsoft
Windows Terminal Server no encryption session initiation attempt";
flow:to_server,established; content:"|03 00 01|"; depth:3; content:"|00|"; depth:1;
offset:288; metadata:ruleset community; reference:cve,2001-0663;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS01-052;
classtype:attempted-dos; sid:2418; rev:10;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY
RealNetworks Realplayer .ram playlist file download request";
flow:to_server,established; content:".ra"; fast_pattern:only; http_uri;
pcre:"/\x2eram?([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.realplayer.playlist;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/.ram; classtype:misc-activity; sid:2419;
rev:28;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY
RealNetworks Realplayer .rmp playlist file download request";
flow:to_server,established; content:".rmp"; fast_pattern:only; http_uri;
pcre:"/\x2ermp([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.rmp;
flowbits:set,file.realplayer.playlist; flowbits:noalert; metadata:ruleset
community, service http; reference:url,en.wikipedia.org/wiki/.ram; classtype:misc-
activity; sid:2420; rev:30;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY
RealNetworks Realplayer .rt playlist file download request";
flow:to_server,established; content:".rt"; fast_pattern:only; http_uri;
pcre:"/\x2ert([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.realplayer.playlist;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/.ram; classtype:misc-activity; sid:2422;
rev:29;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY
RealNetworks Realplayer .rp playlist file download request";
flow:to_server,established; content:".rp"; fast_pattern:only; http_uri;
pcre:"/\x2erp([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.realplayer.playlist;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/.ram; classtype:misc-activity; sid:2423;
rev:28;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP sendsys overflow
attempt"; flow:to_server,established; content:"sendsys"; fast_pattern:only;
pcre:"/^sendsys\x3a[^\n]{21}/smi"; metadata:ruleset community;
reference:bugtraq,9382; reference:cve,2004-0045; reference:nessus,11984;
classtype:attempted-admin; sid:2424; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP senduuname
overflow attempt"; flow:to_server,established; content:"senduuname";
fast_pattern:only; pcre:"/^senduuname\x3a[^\n]{21}/smi"; metadata:ruleset
community; reference:bugtraq,9382; reference:cve,2004-0045; reference:nessus,11984;
classtype:attempted-admin; sid:2425; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP version overflow
attempt"; flow:to_server,established; content:"version"; fast_pattern:only;
pcre:"/^version\x3a[^\n]{21}/smi"; metadata:ruleset community;
reference:bugtraq,9382; reference:cve,2004-0045; reference:nessus,11984;
classtype:attempted-admin; sid:2426; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP checkgroups
overflow attempt"; flow:to_server,established; content:"checkgroups";
fast_pattern:only; pcre:"/^checkgroups\x3a[^\n]{21}/smi"; metadata:ruleset
community; reference:bugtraq,9382; reference:cve,2004-0045; reference:nessus,11984;
classtype:attempted-admin; sid:2427; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP ihave overflow
attempt"; flow:to_server,established; content:"ihave"; fast_pattern:only;
pcre:"/^ihave\x3a[^\n]{21}/smi"; metadata:ruleset community;
reference:bugtraq,9382; reference:cve,2004-0045; reference:nessus,11984;
classtype:attempted-admin; sid:2428; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP sendme overflow
attempt"; flow:to_server,established; content:"sendme"; fast_pattern:only;
pcre:"/^sendme\x3a[^\n]{21}/smi"; metadata:ruleset community;
reference:bugtraq,9382; reference:cve,2004-0045; reference:nessus,11984;
classtype:attempted-admin; sid:2429; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP newgroup
overflow attempt"; flow:to_server,established; content:"newgroup";
fast_pattern:only; pcre:"/^newgroup\x3a[^\n]{32}/smi"; metadata:ruleset community,
service nntp; reference:bugtraq,9382; reference:cve,2004-0045;
reference:nessus,11984; classtype:attempted-admin; sid:2430; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP rmgroup overflow
attempt"; flow:to_server,established; content:"rmgroup"; fast_pattern:only;
pcre:"/^rmgroup\x3a[^\n]{32}/smi"; metadata:ruleset community, service nntp;
reference:bugtraq,9382; reference:cve,2004-0045; reference:nessus,11984;
classtype:attempted-admin; sid:2431; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP article post
without path attempt"; flow:to_server,established; content:"takethis";
fast_pattern:only; pcre:!"/^takethis.*?Path\x3a.*?[\r]{0,1}?\n[\r]{0,1}\n/si";
metadata:ruleset community; classtype:attempted-admin; sid:2432; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 3000 (msg:"SERVER-WEBAPP MDaemon
form2raw.cgi overflow attempt"; flow:to_server,established;
content:"/form2raw.cgi"; fast_pattern:only; pcre:"/\Wfrom=[^\x3b&\n]{100}/si";
metadata:ruleset community; reference:bugtraq,9317; reference:cve,2003-1200;
reference:url,secunia.com/advisories/10512/; classtype:web-application-attack;
sid:2433; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
MDaemon form2raw.cgi access"; flow:to_server,established; content:"/form2raw.cgi";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,9317; reference:cve,2003-1200;
reference:url,secunia.com/advisories/10512/; classtype:web-application-activity;
sid:2434; rev:11;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY Microsoft
emf file download request"; flow:to_server,established; content:".emf";
fast_pattern:only; http_uri; pcre:"/\x2eemf([\?\x5c\x2f]|$)/smiU";
flowbits:set,file.emf; metadata:policy balanced-ips alert, policy max-detect-ips
drop, policy security-ips alert, ruleset community, service http;
reference:bugtraq,10120; reference:bugtraq,28819; reference:bugtraq,9707;
reference:cve,2003-0906; reference:cve,2007-5746;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-011;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-032;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-053;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS06-001;
classtype:misc-activity; sid:2435; rev:33;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY Microsoft
Windows Audio wmf file download request"; flow:to_server,established;
content:".wmf"; fast_pattern:only; http_uri; pcre:"/\x2ewmf([\?\x5c\x2f]|$)/smiU";
flowbits:set,file.wmf; flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/.wmf; classtype:misc-activity; sid:2436;
rev:29;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-MULTIMEDIA
RealNetworks RealPlayer arbitrary javascript command attempt";
flow:to_client,established; content:"application/smi"; fast_pattern; nocase;
http_header; file_data; content:"file|3A|javascript|3A|";
pcre:"/<area\s+href=[\x22\x27]file\x3ajavascript\x3a/smi"; metadata:ruleset
community, service http; reference:bugtraq,8453; reference:bugtraq,9378;
reference:cve,2003-0726; classtype:attempted-user; sid:2437; rev:20;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-MULTIMEDIA
RealNetworks RealPlayer playlist file URL overflow attempt";
flow:to_client,established; flowbits:isset,file.realplayer.playlist; file_data;
content:"file|3A|//"; nocase; pcre:"/^file\x3a\x2f\x2f[^\n]{400}/smi";
metadata:policy max-detect-ips drop, ruleset community, service ftp-data, service
http, service imap, service pop3; reference:bugtraq,13264; reference:bugtraq,9579;
reference:cve,2004-0258; reference:cve,2005-0755; classtype:attempted-user;
sid:2438; rev:23;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-MULTIMEDIA
RealNetworks RealPlayer playlist http URL overflow attempt";
flow:to_client,established; flowbits:isset,file.realplayer.playlist; file_data;
content:"http|3A|//"; nocase; pcre:"/^http\x3a\x2f\x2f[^\n]{400}/smi";
metadata:policy max-detect-ips drop, ruleset community, service ftp-data, service
http, service imap, service pop3; reference:bugtraq,13264; reference:bugtraq,9579;
reference:cve,2004-0258; reference:cve,2005-0755; classtype:attempted-user;
sid:2439; rev:23;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-MULTIMEDIA
RealNetworks RealPlayer playlist rtsp URL overflow attempt";
flow:to_client,established; flowbits:isset,file.realplayer.playlist; file_data;
content:"rtsp|3A|//"; nocase; pcre:"/^http\x3a\x2f\x2f[^\n]{400}/smi";
metadata:policy max-detect-ips drop, ruleset community, service ftp-data, service
http, service imap, service pop3; reference:bugtraq,13264; reference:bugtraq,9579;
reference:cve,2004-0258; reference:cve,2005-0755; classtype:attempted-user;
sid:2440; rev:23;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
NetObserve authentication bypass attempt"; flow:to_server,established;
content:"login=0"; nocase; content:"login=0"; nocase; http_cookie; metadata:ruleset
community, service http; reference:bugtraq,9319; classtype:web-application-attack;
sid:2441; rev:14;)
# alert udp any 4000 -> any any (msg:"SERVER-OTHER ICQ SRV_MULTI/SRV_META_USER
overflow attempt - ISS Witty Worm"; flow:to_server; content:"|05 00|"; depth:2;
content:"|12 02|"; within:2; distance:5; byte_test:1,>,1,12,relative; content:"|05
00|"; content:"n|00|"; within:2; distance:5; content:"|05 00|"; content:"|DE 03|";
within:2; distance:5; byte_test:2,>,512,-11,relative,little; metadata:ruleset
community; reference:cve,2004-0362;
reference:url,www.eeye.com/html/Research/Advisories/AD20040318.html;
classtype:misc-attack; sid:2446; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ServletManager access"; flow:to_server,established;
content:"/servlet/ServletManager"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,3697; reference:cve,2001-1195;
reference:nessus,12122; classtype:web-application-activity; sid:2447; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
setinfo.hts access"; flow:to_server,established; content:"/setinfo.hts";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9973; reference:cve,2004-1857; reference:nessus,12120;
classtype:web-application-activity; sid:2448; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP ALLO overflow
attempt"; flow:to_server,established; content:"ALLO"; nocase;
isdataat:200,relative; pcre:"/^ALLO(?!\n)\s[^\n]{200}/smi"; metadata:ruleset
community, service ftp; reference:bugtraq,9953; reference:cve,2004-1883;
reference:nessus,14598; classtype:attempted-admin; sid:2449; rev:12;)
# alert tcp $EXTERNAL_NET 5050 -> $HOME_NET any (msg:"POLICY-SOCIAL Yahoo IM
successful logon"; flow:to_client,established; content:"YMSG"; depth:4; nocase;
content:"|00 01|"; depth:2; offset:10; metadata:ruleset community;
classtype:policy-violation; sid:2450; rev:9;)
# alert tcp $EXTERNAL_NET 5050 -> $HOME_NET any (msg:"POLICY-SOCIAL Yahoo IM
voicechat"; flow:to_client,established; content:"YMSG"; depth:4; nocase; content:"|
00|J"; depth:2; offset:10; metadata:ruleset community; classtype:policy-violation;
sid:2451; rev:9;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 5050 (msg:"POLICY-SOCIAL Yahoo IM ping";
flow:to_server,established; content:"YMSG"; depth:4; nocase; content:"|00 12|";
depth:2; offset:10; metadata:ruleset community; classtype:policy-violation;
sid:2452; rev:9;)
# alert tcp $EXTERNAL_NET 5050 -> $HOME_NET any (msg:"POLICY-SOCIAL Yahoo IM
conference invitation"; flow:to_client,established; content:"YMSG"; depth:4;
nocase; content:"|00 18|"; depth:2; offset:10; metadata:ruleset community;
classtype:policy-violation; sid:2453; rev:9;)
# alert tcp $EXTERNAL_NET 5050 -> $HOME_NET any (msg:"POLICY-SOCIAL Yahoo IM
conference logon success"; flow:to_client,established; content:"YMSG"; depth:4;
nocase; content:"|00 19|"; depth:2; offset:10; metadata:ruleset community;
classtype:policy-violation; sid:2454; rev:9;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 5050 (msg:"POLICY-SOCIAL Yahoo IM
conference message"; flow:to_server,established; content:"YMSG"; depth:4; nocase;
content:"|00 1D|"; depth:2; offset:10; metadata:ruleset community;
classtype:policy-violation; sid:2455; rev:8;)
# alert tcp $EXTERNAL_NET 5050 -> $HOME_NET any (msg:"POLICY-SOCIAL Yahoo Messenger
File Transfer Receive Request"; flow:established; content:"YMSG"; depth:4;
content:"|00|M"; depth:2; offset:10; metadata:ruleset community; classtype:policy-
violation; sid:2456; rev:9;)
# alert tcp any any <> any 5101 (msg:"POLICY-SOCIAL Yahoo IM message";
flow:established; content:"YMSG"; depth:4; nocase; metadata:ruleset community;
classtype:policy-violation; sid:2457; rev:7;)
# alert tcp $EXTERNAL_NET 5050 -> $HOME_NET any (msg:"POLICY-SOCIAL Yahoo IM
successful chat join"; flow:to_client,established; content:"YMSG"; depth:4; nocase;
content:"|00 98|"; depth:2; offset:10; metadata:ruleset community;
classtype:policy-violation; sid:2458; rev:9;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 5050 (msg:"POLICY-SOCIAL Yahoo IM
conference offer invitation"; flow:to_server,established; content:"YMSG"; depth:4;
nocase; content:"|00|P"; depth:2; offset:10; metadata:ruleset community;
classtype:policy-violation; sid:2459; rev:9;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 5100 (msg:"POLICY-SOCIAL Yahoo IM
conference request"; flow:to_server,established; content:"<R"; depth:2;
pcre:"/^\x3c(REQIMG|RVWCFG)\x3e/ism"; metadata:ruleset community; classtype:policy-
violation; sid:2460; rev:9;)
# alert tcp $EXTERNAL_NET 5100 -> $HOME_NET any (msg:"POLICY-SOCIAL Yahoo IM
conference watch"; flow:to_client,established; content:"|0D 00 05 00|"; depth:4;
metadata:ruleset community; classtype:policy-violation; sid:2461; rev:10;)
# alert ip any any -> any any (msg:"SERVER-OTHER Ethereal IGMP IGAP account
overflow attempt"; ip_proto:2; byte_test:1,>,63,0; byte_test:1,<,67,0;
byte_test:1,>,16,12; metadata:ruleset community; reference:bugtraq,9952;
reference:cve,2004-0176; reference:cve,2004-0367; classtype:attempted-admin;
sid:2462; rev:10;)
# alert ip any any -> any any (msg:"SERVER-OTHER Ethereal IGMP IGAP message
overflow attempt"; ip_proto:2; byte_test:1,>,63,0; byte_test:1,<,67,0;
byte_test:1,>,64,13; metadata:ruleset community; reference:bugtraq,9952;
reference:cve,2004-0176; reference:cve,2004-0367; classtype:attempted-admin;
sid:2463; rev:10;)
# alert ip any any -> any any (msg:"SERVER-OTHER Ethereal EIGRP prefix length
overflow attempt"; ip_proto:88; byte_test:1,>,32,44; metadata:ruleset community;
reference:bugtraq,9952; reference:cve,2004-0176; reference:cve,2004-0367;
classtype:attempted-admin; sid:2464; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS ADMIN$ share
access"; flow:established,to_server; content:"|00|"; depth:1; content:"|FF|SMBu";
within:5; distance:3; byte_test:1,!&,128,6,relative; pcre:"/^.{27}/R";
byte_jump:2,7,little,relative; content:"ADMIN|24 00|"; distance:2; nocase;
metadata:ruleset community, service netbios-ssn; classtype:protocol-command-decode;
sid:2474; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
source.jsp access"; flow:to_server,established; content:"/source.jsp";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,12119; classtype:web-application-activity; sid:2484; rev:9;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"BROWSER-PLUGINS
Symantec Norton Internet Security 2004 ActiveX clsid access";
flow:to_client,established; file_data; content:"0534CF61-83C5-4765-B19B-
45F7A4E135D0"; fast_pattern:only; metadata:ruleset community, service ftp-data,
service http, service imap, service pop3; reference:bugtraq,9916;
reference:cve,2004-0363; classtype:attempted-user; sid:2485; rev:18;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 500 (msg:"SERVER-OTHER ISAKMP invalid
identification payload attempt"; flow:to_server; content:"|05|"; depth:1;
offset:16; byte_test:1,!&,1,19; byte_test:1,>,8,32; byte_test:2,>,0,30;
byte_test:2,<,10,30; byte_test:2,!=,8,30; metadata:ruleset community;
reference:bugtraq,10004; reference:cve,2004-0184; classtype:attempted-dos;
sid:2486; rev:13;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL WinZip MIME
content-type buffer overflow"; flow:to_server,established; content:"Content-Type|
3A|"; fast_pattern:only; pcre:"/name=[^\r\n]*?\.(mim|uue|uu|b64|bhx|hqx|xxe)/smi";
pcre:"/(name|id|number|total|boundary)=\s*[^\r\n\x3b\s\x2c]{300}/smi";
metadata:ruleset community, service smtp; reference:bugtraq,9758;
reference:cve,2004-0333; reference:nessus,12621; classtype:attempted-user;
sid:2487; rev:17;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL WinZip MIME
content-disposition buffer overflow"; flow:to_server,established; content:"Content-
Type|3A|"; fast_pattern:only; pcre:"/name=[^\r\n]*?\.(mim|uue|uu|b64|bhx|hqx|
xxe)/smi"; content:"Content-Disposition|3A|"; nocase;
pcre:"/name=\s*[^\r\n\x3b\s\x2c]{300}/smi"; metadata:ruleset community, service
smtp; reference:bugtraq,9758; reference:cve,2004-0333; reference:nessus,12621;
classtype:attempted-user; sid:2488; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 80 (msg:"SERVER-OTHER esignal
STREAMQUOTE buffer overflow attempt"; flow:to_server,established;
content:"<STREAMQUOTE>"; nocase; isdataat:1040,relative; content:!"</STREAMQUOTE>";
within:1040; nocase; metadata:ruleset community; reference:bugtraq,9978;
reference:cve,2004-1868; classtype:attempted-admin; sid:2489; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 80 (msg:"SERVER-OTHER esignal SNAPQUOTE
buffer overflow attempt"; flow:to_server,established; content:"<SNAPQUOTE>";
nocase; isdataat:1024,relative; content:!"</SNAPQUOTE>"; within:1052; nocase;
metadata:ruleset community; reference:bugtraq,9978; reference:cve,2004-1868;
classtype:attempted-admin; sid:2490; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [135,139,445,593,1024:] (msg:"OS-WINDOWS
DCERPC NCACN-IP-TCP lsass DsRolerUpgradeDownlevelServer overflow attempt";
flow:to_server,established; dce_iface:3919286a-b10c-11d0-9ba8-00c04fd92ef5;
dce_opnum:9; dce_stub_data; byte_test:4,>,256,0,dce; metadata:policy max-detect-ips
drop, ruleset community, service netbios-ssn; reference:bugtraq,10108;
reference:cve,2003-0533; reference:nessus,12205;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-011;
classtype:attempted-admin; sid:2508; rev:24;)
# alert udp $EXTERNAL_NET any -> $HOME_NET [135,138,1024:] (msg:"OS-WINDOWS DCERPC
NCADG-IP-UDP lsass DsRolerUpgradeDownlevelServer overflow attempt";
dce_iface:3919286a-b10c-11d0-9ba8-00c04fd92ef5; dce_opnum:9; dce_stub_data;
byte_test:4,>,256,0,dce; metadata:ruleset community, service netbios-dgm;
reference:bugtraq,10108; reference:cve,2003-0533; reference:nessus,12205;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-011;
classtype:attempted-admin; sid:2511; rev:21;)
# alert tcp $EXTERNAL_NET any <> $HOME_NET 179 (msg:"SERVER-OTHER BGP spoofed
connection reset attempt"; flow:established,no_stream; flags:RSF*;
detection_filter:track by_dst,count 10,seconds 10; metadata:ruleset community;
reference:bugtraq,10183; reference:cve,2004-0230;
reference:url,www.uniras.gov.uk/vuls/2004/236929/index.htm; classtype:attempted-
dos; sid:2523; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 548 (msg:"SERVER-OTHER AFP FPLoginExt
username buffer overflow attempt"; flow:to_server,established; content:"|00 02|";
depth:2; content:"?"; within:1; distance:14; content:"cleartxt passwrd"; nocase;
byte_jump:2,1,relative; byte_jump:2,1,relative; isdataat:2,relative;
metadata:ruleset community; reference:bugtraq,10271; reference:cve,2004-0430;
reference:url,www.atstake.com/research/advisories/2004/a050304-1.txt;
classtype:attempted-admin; sid:2545; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP MDTM overflow
attempt"; flow:to_server,established; content:"MDTM"; nocase;
isdataat:100,relative; pcre:"/^MDTM(?!\n)\s[^\n]{100}/smi"; metadata:ruleset
community, service ftp; reference:bugtraq,9751; reference:cve,2001-1021;
reference:cve,2004-0330; reference:nessus,12080; classtype:attempted-admin;
sid:2546; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"SERVER-OTHER HP Web JetAdmin
remote file upload attempt"; flow:to_server,established;
content:"/plugins/hpjwja/script/devices_update_printer_fw_upload.hts";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,9971; reference:cve,2004-1856; classtype:web-application-
activity; sid:2547; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"SERVER-OTHER HP Web JetAdmin
setinfo access"; flow:to_server,established;
content:"/plugins/hpjdwm/script/test/setinfo.hts"; fast_pattern:only;
metadata:ruleset community; reference:bugtraq,9972; reference:cve,2004-1857;
reference:nessus,12120; classtype:web-application-activity; sid:2548; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"SERVER-OTHER HP Web JetAdmin
file write attempt"; flow:to_server,established;
content:"/plugins/framework/script/tree.xms"; fast_pattern:only;
content:"WriteToFile"; nocase; metadata:ruleset community; reference:bugtraq,9973;
classtype:web-application-activity; sid:2549; rev:6;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OTHER
Nullsoft Winamp XM file buffer overflow attempt"; flow:to_client,established;
flowbits:isset,file.xm; file_data; content:"Extended Module|3A 20|"; nocase;
byte_test:1,!=,26,20,relative; metadata:ruleset community, service ftp-data,
service http, service imap, service pop3; reference:cve,2004-1896;
reference:url,www.securityfocus.com/bid/10045; classtype:attempted-user; sid:2550;
rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7777:7778 (msg:"SERVER-OTHER Oracle Web
Cache GET overflow attempt"; flow:to_server,established; content:"GET";
pcre:"/^GET[^s]{432}/sm"; metadata:ruleset community; reference:bugtraq,9868;
reference:cve,2004-0385; reference:nessus,12126; classtype:attempted-admin;
sid:2551; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7777:7778 (msg:"SERVER-OTHER Oracle Web
Cache HEAD overflow attempt"; flow:to_server,established; content:"HEAD";
pcre:"/^HEAD[^s]{432}/sm"; metadata:ruleset community; reference:bugtraq,9868;
reference:cve,2004-0385; reference:nessus,12126; classtype:attempted-admin;
sid:2552; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7777:7778 (msg:"SERVER-OTHER Oracle Web
Cache PUT overflow attempt"; flow:to_server,established; content:"PUT";
pcre:"/^PUT[^s]{432}/sm"; metadata:ruleset community; reference:bugtraq,9868;
reference:cve,2004-0385; reference:nessus,12126; classtype:attempted-admin;
sid:2553; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7777:7778 (msg:"SERVER-OTHER Oracle Web
Cache POST overflow attempt"; flow:to_server,established; content:"POST";
pcre:"/^POST[^s]{432}/sm"; metadata:ruleset community; reference:bugtraq,9868;
reference:cve,2004-0385; reference:nessus,12126; classtype:attempted-admin;
sid:2554; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7777:7778 (msg:"SERVER-OTHER Oracle Web
Cache TRACE overflow attempt"; flow:to_server,established; content:"TRACE";
pcre:"/^TRACE[^s]{432}/sm"; metadata:ruleset community; reference:bugtraq,9868;
reference:cve,2004-0385; reference:nessus,12126; classtype:attempted-admin;
sid:2555; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7777:7778 (msg:"SERVER-OTHER Oracle Web
Cache DELETE overflow attempt"; flow:to_server,established; content:"DELETE";
pcre:"/^DELETE[^s]{432}/sm"; metadata:ruleset community; reference:bugtraq,9868;
reference:cve,2004-0385; reference:nessus,12126; classtype:attempted-admin;
sid:2556; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7777:7778 (msg:"SERVER-OTHER Oracle Web
Cache LOCK overflow attempt"; flow:to_server,established; content:"LOCK";
pcre:"/^LOCK[^s]{432}/sm"; metadata:ruleset community; reference:bugtraq,9868;
reference:cve,2004-0385; reference:nessus,12126; classtype:attempted-admin;
sid:2557; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7777:7778 (msg:"SERVER-OTHER Oracle Web
Cache MKCOL overflow attempt"; flow:to_server,established; content:"MKCOL";
pcre:"/^MKCOL[^s]{432}/sm"; metadata:ruleset community; reference:bugtraq,9868;
reference:cve,2004-0385; reference:nessus,12126; classtype:attempted-admin;
sid:2558; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7777:7778 (msg:"SERVER-OTHER Oracle Web
Cache COPY overflow attempt"; flow:to_server,established; content:"COPY";
pcre:"/^COPY[^s]{432}/sm"; metadata:ruleset community; reference:bugtraq,9868;
reference:cve,2004-0385; reference:nessus,12126; classtype:attempted-admin;
sid:2559; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7777:7778 (msg:"SERVER-OTHER Oracle Web
Cache MOVE overflow attempt"; flow:to_server,established; content:"MOVE";
pcre:"/^MOVE[^s]{432}/sm"; metadata:ruleset community; reference:bugtraq,9868;
reference:cve,2004-0385; reference:nessus,12126; classtype:attempted-admin;
sid:2560; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 873 (msg:"SERVER-OTHER rsync backup-dir
directory traversal attempt"; flow:to_server,established; content:"--backup-dir";
fast_pattern:only; pcre:"/--backup-dir\s+\x2e\x2e\x2f/"; metadata:ruleset
community; reference:bugtraq,10247; reference:cve,2004-0426;
reference:nessus,12230; classtype:string-detect; sid:2561; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 81 (msg:"SERVER-WEBAPP McAfee ePO file
upload attempt"; flow:to_server,established; content:"/spipe/repl_file"; nocase;
content:"Command=BEGIN"; nocase; metadata:ruleset community;
reference:bugtraq,10200; reference:cve,2004-0038; classtype:attempted-admin;
sid:2562; rev:8;)
# alert udp $EXTERNAL_NET 137 -> $HOME_NET 137 (msg:"NETBIOS NS lookup response
name overflow attempt"; byte_test:1,&,0x80,2; content:"|00 01|"; depth:2; offset:6;
byte_test:1,>,32,12; metadata:ruleset community, service netbios-ns;
reference:bugtraq,10333; reference:cve,2004-0444;
reference:url,www.eeye.com/html/Research/Advisories/AD20040512A.html;
classtype:attempted-admin; sid:2563; rev:7;)
# alert udp $EXTERNAL_NET 137 -> $HOME_NET 137 (msg:"NETBIOS NS lookup short
response attempt"; dsize:<56; byte_test:1,&,0x80,2; content:"|00 01|"; depth:2;
offset:6; metadata:ruleset community, service netbios-ns; reference:bugtraq,10335;
reference:cve,2004-0444;
reference:url,www.eeye.com/html/Research/Advisories/AD20040512C.html;
classtype:attempted-admin; sid:2564; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
modules.php access"; flow:to_server,established; content:"/modules.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9879; reference:cve,2004-1817; classtype:web-application-
activity; sid:2565; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
PHPBB viewforum.php access"; flow:to_server,established; content:"/viewforum.php";
nocase; http_uri; content:"topic_id="; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,9865;
reference:bugtraq,9866; reference:cve,2004-1809; reference:nessus,12093;
classtype:web-application-activity; sid:2566; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Emumail init.emu access"; flow:to_server,established; content:"/init.emu";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9861; reference:cve,2004-2334; reference:cve,2004-2385;
reference:nessus,12095; classtype:web-application-activity; sid:2567; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Emumail emumail.fcgi access"; flow:to_server,established; content:"/emumail.fcgi";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9861; reference:cve,2004-2334; reference:cve,2004-2385;
reference:nessus,12095; classtype:web-application-activity; sid:2568; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
cPanel resetpass access"; flow:to_server,established; content:"/resetpass";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,9848; reference:cve,2004-1769; classtype:web-application-
activity; sid:2569; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP invalid
HTTP version string"; flow:to_server,established; content:" HTTP/"; depth:300;
nocase; isdataat:5,relative; content:!"0.9"; within:3; content:!"1.0"; within:3;
content:!"1.1"; within:3; pcre:!"/^[^\n]* HTTP\x2f(0\.9|1\.[01])\s*\n/i";
metadata:policy max-detect-ips drop, ruleset community, service http;
reference:bugtraq,34240; reference:bugtraq,9809; reference:cve,2009-0478;
reference:nessus,11593; classtype:non-standard-protocol; sid:2570; rev:25;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
SmarterTools SmarterMail frmGetAttachment.aspx access"; flow:to_server,established;
content:"/frmGetAttachment.aspx"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,9805; reference:cve,2004-2585; classtype:web-
application-activity; sid:2571; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
SmarterTools SmarterMail login.aspx buffer overflow attempt";
flow:to_server,established; content:"/login.aspx"; nocase; http_uri;
content:"txtusername="; isdataat:980,relative; content:!"|0A|"; within:980; nocase;
metadata:ruleset community, service http; reference:bugtraq,9805;
reference:cve,2004-2585; classtype:web-application-attack; sid:2572; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
SmarterTools SmarterMail frmCompose.asp access"; flow:to_server,established;
content:"/frmCompose.aspx"; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,9805; reference:cve,2004-2585; classtype:web-application-
activity; sid:2573; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP RETR format string
attempt"; flow:to_server,established; content:"RETR"; fast_pattern:only;
pcre:"/^RETR\s[^\n]*?%[^\n]*?%/smi"; metadata:ruleset community, service ftp;
reference:bugtraq,9800; reference:cve,2004-1883; classtype:attempted-admin;
sid:2574; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Opt-
X header.php remote file include attempt"; flow:to_server,established;
content:"/header.php"; nocase; http_uri; content:"systempath="; fast_pattern:only;
pcre:"/systempath=(https?|ftps?|php)/i"; metadata:ruleset community, service http;
reference:bugtraq,9732; reference:cve,2004-2368; classtype:web-application-attack;
sid:2575; rev:11;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.generate_replication_support buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.generate_replication_support";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]
{1024,}\x22)[\r\n\s]*\x3b.*package_prefix[\r\n\s]*=>[\r\n\s]*\2|
package_prefix\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|(\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*procedure_prefix[\r\n\s]*=>[\r\n\s]*\2|
procedure_prefix\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){3}(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){4}(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck93.html; classtype:attempted-
user; sid:2576; rev:9;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OTHER local
resource redirection attempt"; flow:to_client,established; content:"Location|3A|";
nocase; http_header; pcre:"/^Location\x3a(\s*|\s*\r?\n\s+)*URL\s*\x3a/smiH";
metadata:ruleset community, service http; reference:cve,2004-0549;
reference:url,www.kb.cert.org/vuls/id/713878; classtype:attempted-user; sid:2577;
rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 88 (msg:"SERVER-OTHER kerberos principal
name overflow UDP"; flow:to_server; content:"j"; depth:1; content:"|01 A1|";
asn1:oversize_length 1024,relative_offset -1; metadata:ruleset community, service
kerberos; reference:cve,2003-0072; reference:nessus,11512;
reference:url,web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-005-buf.txt;
classtype:attempted-admin; sid:2578; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 88 (msg:"SERVER-OTHER kerberos principal
name overflow TCP"; flow:to_server,established; content:"j"; depth:1; offset:4;
content:"|01 A1|"; asn1:oversize_length 1024,relative_offset -1; metadata:ruleset
community, service kerberos; reference:cve,2003-0072; reference:nessus,11512;
reference:url,web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-005-buf.txt;
classtype:attempted-admin; sid:2579; rev:7;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"SERVER-WEBAPP server
negative Content-Length attempt"; flow:to_client,established; content:"Content-
Length"; nocase; pcre:"/^Content-Length\s*\x3a\s*-\d+/mi"; metadata:ruleset
community, service http; reference:bugtraq,10508; reference:cve,2004-0492;
reference:url,www.guninski.com/modproxy1.html; classtype:attempted-admin; sid:2580;
rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP SAP
Crystal Reports crystalimagehandler.aspx access"; flow:to_server,established;
content:"/crystalimagehandler.aspx"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:cve,2004-0204;
reference:url,www.microsoft.com/security/bulletins/200406_crystal.mspx;
classtype:web-application-activity; sid:2581; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"OS-WINDOWS SAP
Crystal Reports crystalImageHandler.asp directory traversal attempt";
flow:to_server,established; content:"/crystalimagehandler"; fast_pattern:only;
http_uri; content:"dynamicimage=../"; nocase; http_uri; metadata:ruleset community,
service http; reference:bugtraq,10260; reference:cve,2004-0204;
reference:nessus,12271; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms04-017; classtype:web-application-attack; sid:2582; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 2401 (msg:"SERVER-OTHER CVS Max-dotdot
integer overflow attempt"; flow:to_server,established; content:"Max-dotdot";
fast_pattern:only; pcre:"/^Max-dotdot[\s\r\n]*\d{3,}/msi"; metadata:ruleset
community; reference:bugtraq,10499; reference:cve,2004-0417; classtype:misc-attack;
sid:2583; rev:8;)
# alert tcp $EXTERNAL_NET 6666:6669 -> $HOME_NET any (msg:"SERVER-OTHER eMule
buffer overflow attempt"; flow:to_client,established; content:"PRIVMSG";
fast_pattern:only; pcre:"/^PRIVMSG\s+[^\s]+\s+\x3a\s*\x01SENDLINK\x7c[^\x7c]
{69}/smi"; metadata:ruleset community; reference:bugtraq,10039; reference:cve,2004-
1892; reference:nessus,12233; classtype:attempted-user; sid:2584; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
nessus 2.x 404 probe"; flow:to_server,established; content:"/NessusTest";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10386; classtype:attempted-recon; sid:2585; rev:9;)
# alert tcp $HOME_NET 4711 -> $EXTERNAL_NET any (msg:"PUA-P2P eDonkey server
response"; flow:established,to_client; content:"Server|3A| eMule";
fast_pattern:only; metadata:ruleset community; reference:url,www.emule-project.net;
classtype:policy-violation; sid:2587; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
TUTOS path disclosure attempt"; flow:to_server,established;
content:"/note_overview.php"; http_uri; content:"id="; metadata:ruleset community,
service http; reference:bugtraq,10129;
reference:url,www.securiteam.com/unixfocus/5FP0J15CKE.html; classtype:web-
application-activity; sid:2588; rev:10;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"OS-WINDOWS Microsoft
Windows Content-Disposition CLSID command attempt"; flow:to_client,established;
content:"Content-Disposition|3A|"; nocase; http_header; pcre:"/^Content-
Disposition\x3a(\s*|\s*\r?\n\s+)[^\r\n]*?\{[\da-fA-F]{8}(-[\da-fA-F]{4}){3}-[\da-
fA-F]{12}\}/smiH"; metadata:ruleset community, service http;
reference:bugtraq,9510; reference:cve,2004-0420;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms04-024;
classtype:attempted-user; sid:2589; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Samba SWAT Authorization overflow attempt"; flow:to_server,established;
content:"Authorization|3A|"; nocase; http_header; content:"Basic"; within:50;
nocase; http_header; pcre:"/^Authorization\x3a(\s*|\s*\r?\n\s+)Basic\s+=/smiH";
metadata:ruleset community, service http; reference:bugtraq,10780;
reference:cve,2004-0600; classtype:web-application-attack; sid:2597; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Samba SWAT Authorization port 901 overflow attempt"; flow:to_server,established;
content:"Authorization|3A| Basic"; nocase;
pcre:"/^Authorization\x3a(\s*|\s*\r?\n\s+)Basic\s+=/smi"; metadata:ruleset
community, service http; reference:bugtraq,10780; reference:cve,2004-0600;
classtype:web-application-attack; sid:2598; rev:13;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_grouped_column buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_grouped_column"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*sname[\r\n\s]*=>[\r\n\s]*\2|sname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|(\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]
{1024,}\x27|\x22[^\x22]{1024,}\x22)[\r\n\s]*\x3b.*oname[\r\n\s]*=>[\r\n\s]*\2|
oname\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,}))/si"; metadata:ruleset community; classtype:attempted-user; sid:2599;
rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_master_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_master_repgroup"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2601; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.create_mview_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.create_mview_repgroup"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*fname[\r\n\s]*=>[\r\n\s]*\2|fname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s
*,\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\
s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck633.html; classtype:attempted-
user; sid:2603; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.compare_old_values buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.compare_old_values"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*operation[\r\n\s]*=>[\r\n\s]*\2|operation\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s
*,\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck91.html; classtype:attempted-
user; sid:2605; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.comment_on_repobject buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.comment_on_repobject"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*type[\r\n\s]*=>[\r\n\s]*\2|type\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s
*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck634.html; classtype:attempted-
user; sid:2606; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sysdbms_repcat_rgt.check_ddl_text buffer overflow attempt";
flow:to_server,established; content:"sysdbms_repcat_rgt.check_ddl_text"; nocase;
pcre:"/\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})/si"; metadata:ruleset
community; reference:url,www.appsecinc.com/Policy/PolicyCheck97.html;
classtype:attempted-user; sid:2608; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.cancel_statistics buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.cancel_statistics"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*sname[\r\n\s]*=>[\r\n\s]*\2|sname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|(\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]
{1024,}\x27|\x22[^\x22]{1024,}\x22)[\r\n\s]*\x3b.*oname[\r\n\s]*=>[\r\n\s]*\2|
oname\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,}))/si"; metadata:ruleset community; classtype:attempted-user; sid:2609;
rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
LINK metadata buffer overflow attempt"; flow:to_server,established;
content:"CREATE"; nocase; content:"DATABASE"; nocase; content:"LINK"; nocase;
pcre:"/USING\s*((\x27[^\x27]{1000})|(\x22[^\x22]{1000}))/Rmsi"; metadata:policy
max-detect-ips drop, ruleset community; reference:bugtraq,12296;
reference:bugtraq,7453; reference:cve,2003-0222; reference:cve,2005-0297;
reference:nessus,11563; reference:url,archives.neohapsis.com/archives/bugtraq/2003-
04/0360.html; classtype:attempted-user; sid:2611; rev:12;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_auth.revoke_surrogate_repcat buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_auth.revoke_surrogate_repcat";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]
{1024,}\x22)[\r\n\s]*\x3b.*userid[\r\n\s]*=>[\r\n\s]*\2|userid\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck97.html; classtype:attempted-
user; sid:2612; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
time_zone buffer overflow attempt"; flow:to_server,established;
content:"TIME_ZONE"; nocase; pcre:"/TIME_ZONE\s*=\s*((\x27[^\x27]{1000,})|
(\x22[^\x22]{1000,}))/msi"; metadata:ruleset community; reference:bugtraq,9587;
reference:cve,2003-1208; reference:nessus,12047;
reference:url,www.nextgenss.com/advisories/ora_time_zone.txt; classtype:attempted-
user; sid:2614; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_auth.grant_surrogate_repcat buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_auth.grant_surrogate_repcat";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]
{1024,}\x22)[\r\n\s]*\x3b.*userid[\r\n\s]*=>[\r\n\s]*\2|userid\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck97.html; classtype:attempted-
user; sid:2615; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat.alter_mview_propagation buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat.alter_mview_propagation";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]
{1024,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck632.html; classtype:attempted-
user; sid:2617; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_master_repobject buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_master_repobject"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*type[\r\n\s]*=>[\r\n\s]*\2|type\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s
*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck634.html; classtype:attempted-
user; sid:2619; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_sna_utl.register_flavor_change buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat_sna_utl.register_flavor_change";
nocase; pcre:"/\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})/si"; metadata:ruleset
community; reference:url,www.appsecinc.com/Policy/PolicyCheck97.html;
classtype:attempted-user; sid:2621; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_admin.unregister_user_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat_admin.unregister_user_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]
{1024,}\x22)[\r\n\s]*\x3b.*privilege_type[\r\n\s]*=>[\r\n\s]*\2|
privilege_type\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck94.html; classtype:attempted-
user; sid:2624; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.send_old_values buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.send_old_values"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*operation[\r\n\s]*=>[\r\n\s]*\2|operation\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s
*,\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck91.html; classtype:attempted-
user; sid:2626; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.repcat_import_check buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.repcat_import_check"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|(\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]
{1024,}\x27|\x22[^\x22]{1024,}\x22)[\r\n\s]*\x3b.*gowner[\r\n\s]*=>[\r\n\s]*\2|
gowner\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(true|
false)\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset
community; reference:url,www.appsecinc.com/Policy/PolicyCheck90.html;
classtype:attempted-user; sid:2627; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_admin.register_user_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat_admin.register_user_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]
{1024,}\x22)[\r\n\s]*\x3b.*privilege_type[\r\n\s]*=>[\r\n\s]*\2|
privilege_type\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck94.html; classtype:attempted-
user; sid:2629; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_rectifier_diff.rectify buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_rectifier_diff.rectify"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*sname1[\r\n\s]*=>[\r\n\s]*\2|sname1\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck97.html; classtype:attempted-
user; sid:2633; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_master_repobject buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_master_repobject"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*type[\r\n\s]*=>[\r\n\s]*\2|type\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s
*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck634.html; classtype:attempted-
user; sid:2637; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_mview_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_mview_repgroup"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*gowner[\r\n\s]*=>[\r\n\s]*\2|gowner\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(true|
false)\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset
community; reference:url,www.appsecinc.com/Policy/PolicyCheck90.html;
classtype:attempted-user; sid:2639; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_instantiate.drop_site_instantiation buffer overflow attempt";
flow:to_server,established;
content:"dbms_repcat_instantiate.drop_site_instantiation"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*refresh_template_name[\r\n\s]*=>[\r\n\s]*\2|
refresh_template_name\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community;
classtype:attempted-user; sid:2641; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla.ensure_not_published buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_fla.ensure_not_published";
nocase; pcre:"/\(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck96.html; classtype:attempted-
user; sid:2643; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
from_tz buffer overflow attempt"; flow:to_server,established; content:"FROM_TZ";
nocase; pcre:"/\
(\s*TIMESTAMP\s*(\s*(\x27[^\x27]+'|\x22[^\x22]+\x22)\s*,)\s*((\x27[^\x27]{1000,})|
(\x22[^\x22]{1000,}))/Rmsi"; metadata:ruleset community;
reference:url,www.nextgenss.com/advisories/ora_from_tz.txt; classtype:attempted-
user; sid:2644; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_instantiate.instantiate_offline buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat_instantiate.instantiate_offline";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]
{1024,}\x22)[\r\n\s]*\x3b.*refresh_template_name[\r\n\s]*=>[\r\n\s]*\2|
refresh_template_name\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community;
classtype:attempted-user; sid:2645; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $ORACLE_PORTS (msg:"SERVER-ORACLE Oracle
9i TNS Listener SERVICE_NAME Remote Buffer Overflow attempt";
flow:to_server,established; content:"connect_data"; nocase; content:"|28|
service_name="; nocase; isdataat:1000,relative; content:!"|29|"; within:1000;
metadata:ruleset community; reference:cve,2002-0965; classtype:attempted-user;
sid:2649; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
user name buffer overflow attempt"; flow:to_server,established;
content:"connect_data"; nocase; content:"|28|user="; nocase;
isdataat:1000,relative; content:!"|29|"; within:1000; metadata:ruleset community;
reference:bugtraq,6849; reference:cve,2003-0095;
reference:url,otn.oracle.com/deploy/security/pdf/2003alert51.pdf;
reference:url,www.appsecinc.com/Policy/PolicyCheck62.html; classtype:attempted-
user; sid:2650; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
NUMTODSINTERVAL/NUMTOYMINTERVAL buffer overflow attempt";
flow:to_server,established; content:"NUMTO"; nocase; content:"INTERVAL";
distance:2; nocase; pcre:"/NUMTO(DS|YM)INTERVAL\s*\(\s*\d+\s*,\s*((\x27[^\x27]
{1000,})|(\x22[^\x22]{1000,}))/msi"; metadata:ruleset community;
reference:bugtraq,9587; reference:cve,2003-1208;
reference:url,www.nextgenss.com/advisories/ora_numtodsinterval.txt;
reference:url,www.nextgenss.com/advisories/ora_numtoyminterval.txt;
classtype:attempted-user; sid:2651; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_offline_og.begin_load buffer overflow attempt"; flow:to_server,established;
content:"dbms_offline_og.begin_load"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck632.html;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2652; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP PHPNuke
Forum viewtopic SQL insertion attempt"; flow:to_server,established;
content:"/modules.php"; nocase; http_uri; content:"name=Forums";
content:"file=viewtopic"; fast_pattern:only; pcre:"/forum=.*'/"; metadata:ruleset
community, service http; reference:bugtraq,7193; classtype:web-application-attack;
sid:2654; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"SERVER-OTHER HP Web JetAdmin
ExecuteFile admin access"; flow:to_server,established;
content:"/plugins/framework/script/content.hts"; fast_pattern:only;
content:"ExecuteFile"; nocase; metadata:ruleset community; reference:bugtraq,10224;
classtype:attempted-admin; sid:2655; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 443 (msg:"SERVER-WEBAPP SSLv2
Client_Hello Challenge Length overflow attempt"; flow:to_server,established;
ssl_version:sslv2; ssl_state:client_hello; content:"|01 00 02|"; depth:3; offset:2;
byte_test:1,>,127,0; byte_test:2,>,32,9; metadata:ruleset community, service ssl;
reference:bugtraq,11015; reference:cve,2004-0826; classtype:attempted-admin;
sid:2656; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 443 (msg:"SERVER-WEBAPP SSLv2
Client_Hello with pad Challenge Length overflow attempt";
flow:to_server,established; ssl_version:sslv2; ssl_state:client_hello; content:"|01
00 02|"; depth:3; offset:2; byte_test:2,>,32,9; metadata:ruleset community, service
ssl; classtype:attempted-admin; sid:2657; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Ipswitch WhatsUpGold instancename overflow attempt"; flow:to_server,established;
content:"/_maincfgret.cgi"; fast_pattern:only; http_uri; content:"instancename=";
nocase; http_uri; isdataat:513,relative; pcre:"/instancename=[^&\x3b\r\n]
{513}/Usmi"; metadata:ruleset community, service http; reference:bugtraq,11043;
reference:cve,2004-0798; classtype:web-application-attack; sid:2663; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP login format
string attempt"; flow:established,to_server; content:"LOGIN"; fast_pattern:only;
pcre:"/\sLOGIN\s[^\n]*?%/smi"; metadata:ruleset community, service imap;
reference:bugtraq,10976; reference:cve,2004-0777; classtype:attempted-admin;
sid:2664; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP login literal
format string attempt"; flow:established,to_server; content:"LOGIN";
fast_pattern:only; pcre:"/\sLOGIN\s\w+\s\{\d+\}[\r]?\n[^\n]*?%/smi";
metadata:policy max-detect-ips drop, ruleset community, service imap;
reference:bugtraq,10976; reference:cve,2007-0221;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-026;
classtype:attempted-admin; sid:2665; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 110 (msg:"PROTOCOL-POP PASS format
string attempt"; flow:to_server,established; content:"PASS"; fast_pattern:only;
pcre:"/^PASS\s+[^\n]*?%/smi"; metadata:ruleset community, service pop3;
reference:bugtraq,10976; reference:cve,2004-0777; classtype:attempted-admin;
sid:2666; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS
ping.asp access"; flow:to_server,established; content:"/ping.asp"; nocase;
http_uri; metadata:ruleset community, service http; reference:nessus,10968;
classtype:web-application-activity; sid:2667; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
processit access"; flow:to_server,established; content:"/processit.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:nessus,10649; classtype:web-application-activity; sid:2668; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
ibillpm.pl access"; flow:to_server,established; content:"/ibillpm.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3476; reference:cve,2001-0839; reference:nessus,11083;
classtype:web-application-activity; sid:2669; rev:15;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
pgpmail.pl access"; flow:to_server,established; content:"/pgpmail.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,3605; reference:cve,2001-0937; reference:nessus,11070;
classtype:web-application-activity; sid:2670; rev:10;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"BROWSER-IE
Microsoft Internet Explorer bitmap BitmapOffset integer overflow attempt";
flow:to_client,established; flowbits:isset,file.bmp; file_data; content:"BM";
byte_test:4,>,2147480000,8,relative,little; metadata:ruleset community, service
ftp-data, service http, service imap, service pop3; reference:bugtraq,9663;
reference:cve,2004-0566; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms04-025; classtype:attempted-user; sid:2671; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
sresult.exe access"; flow:to_server,established; content:"/sresult.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,10837; reference:cve,2004-2528; reference:nessus,14186;
classtype:web-application-activity; sid:2672; rev:10;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IMAGE libpng
tRNS overflow attempt"; flow:to_client,established; flowbits:isset,file.png;
file_data; content:"|89|PNG|0D 0A 1A 0A|"; content:"IHDR"; within:4; distance:4;
content:"tRNS"; distance:0; byte_test:4,>,256,-8,relative,big; pcre:"/IHDR(?!.*?
PLTE).*?tRNS/s"; metadata:ruleset community, service ftp-data, service http,
service imap, service pop3; reference:bugtraq,10872; reference:cve,2004-0597;
classtype:attempted-user; sid:2673; rev:12;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_delete_resolution buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_delete_resolution"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*sname[\r\n\s]*=>[\r\n\s]*\2|sname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|(\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]
{1024,}\x27|\x22[^\x22]{1024,}\x22)[\r\n\s]*\x3b.*oname[\r\n\s]*=>[\r\n\s]*\2|
oname\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,}))/si"; metadata:ruleset community; classtype:attempted-user; sid:2674;
rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_rgt.instantiate_offline buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat_rgt.instantiate_offline"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*privilege_type[\r\n\s]*=>[\r\n\s]*\2|
privilege_type\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community; classtype:attempted-
user; sid:2675; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_rgt.instantiate_online buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat_rgt.instantiate_online"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*refresh_template_name[\r\n\s]*=>[\r\n\s]*\2|
refresh_template_name\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,}))/si"; metadata:ruleset community; classtype:attempted-user; sid:2677;
rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
ctx_output.start_log buffer overflow attempt"; flow:to_server,established;
content:"ctx_output.start_log"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*logfile[\r\n\s]*=>[\r\n\s]*\2|logfile\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2678; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_system.ksdwrt buffer overflow attempt"; flow:to_server,established;
content:"sys.dbms_system.ksdwrt"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*tst[\r\n\s]*=>[\r\n\s]*\2|tst\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,})|\(\s*\d+\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2679; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
ctxsys.driddlr.subindexpopulate buffer overflow attempt";
flow:to_server,established; content:"ctxsys.driddlr.subindexpopulate"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*logfile[\r\n\s]*=>[\r\n\s]*\2|logfile\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\d+\s*,\s*){3}(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,}))/si"; metadata:ruleset community; classtype:attempted-user; sid:2680;
rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
mdsys.sdo_admin.sdo_code_size buffer overflow attempt"; flow:to_server,established;
content:"mdsys.sdo_admin.sdo_code_size"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*layer[\r\n\s]*=>[\r\n\s]*\2|layer\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2681; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
mdsys.md2.validate_geom buffer overflow attempt"; flow:to_server,established;
content:"mdsys.md2.validate_geom"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{128,}\x27|\x22[^\x22]{128,}\x22)
[\r\n\s]*\x3b.*layer[\r\n\s]*=>[\r\n\s]*\2|layer\s*=>\s*(\x27[^\x27]
{128,}|\x22[^\x22]{128,})|\(\s*(\x27[^\x27]{128,}|\x22[^\x22]{128,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2682; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
mdsys.md2.sdo_code_size buffer overflow attempt"; flow:to_server,established;
content:"mdsys.md2.sdo_code_size"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{512,}\x27|\x22[^\x22]{512,}\x22)
[\r\n\s]*\x3b.*layer[\r\n\s]*=>[\r\n\s]*\2|layer\s*=>\s*(\x27[^\x27]
{512,}|\x22[^\x22]{512,})|\(\s*(\x27[^\x27]{512,}|\x22[^\x22]{512,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2683; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.ltutil.pushdeferredtxns buffer overflow attempt"; flow:to_server,established;
content:"sys.ltutil.pushdeferredtxns"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{512,}\x27|\x22[^\x22]{512,}\x22)
[\r\n\s]*\x3b.*repgrpname[\r\n\s]*=>[\r\n\s]*\2|repgrpname\s*=>\s*(\x27[^\x27]
{512,}|\x22[^\x22]{512,})|\(\s*(\x27[^\x27]{512,}|\x22[^\x22]{512,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2684; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_rq.add_column buffer overflow attempt"; flow:to_server,established;
content:"sys.dbms_repcat_rq.add_column"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*SCHEMA_NAME[\r\n\s]*=>[\r\n\s]*\2|SCHEMA_NAME\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2685; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_rectifier_diff.differences buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_rectifier_diff.differences"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*sname1[\r\n\s]*=>[\r\n\s]*\2|sname1\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]*\x22)\s*,\s*){9}
(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community;
reference:bugtraq,10871; reference:cve,2004-1362; reference:cve,2004-1363;
reference:cve,2004-1364; reference:cve,2004-1365; reference:cve,2004-1366;
reference:cve,2004-1368; reference:cve,2004-1369; reference:cve,2004-1370;
reference:cve,2004-1371; reference:url,www.appsecinc.com/Policy/PolicyCheck97.html;
classtype:attempted-user; sid:2686; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_internal_repcat.validate buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_internal_repcat.validate"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2687; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_internal_repcat.enable_receiver_trace buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_internal_repcat.enable_receiver_trace"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2688; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_internal_repcat.disable_receiver_trace buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_internal_repcat.disable_receiver_trace"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2689; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_defer_repcat.enable_propagation_to_dblink buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_defer_repcat.enable_propagation_to_dblink"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*dblink[\r\n\s]*=>[\r\n\s]*\2|dblink\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2690; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_defer_internal_sys.parallel_push_recovery buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_defer_internal_sys.parallel_push_recovery"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*destination[\r\n\s]*=>[\r\n\s]*\2|destination\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,}))/si";
metadata:ruleset community; classtype:attempted-user; sid:2691; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_aqadm_sys.verify_queue_types buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_aqadm_sys.verify_queue_types";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]
{1024,}\x22)[\r\n\s]*\x3b.*src_queue_name[\r\n\s]*=>[\r\n\s]*\2|
src_queue_name\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community; classtype:attempted-
user; sid:2692; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_aqadm.verify_queue_types_no_queue buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_aqadm.verify_queue_types_no_queue";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]
{1024,}\x22)[\r\n\s]*\x3b.*src_queue_name[\r\n\s]*=>[\r\n\s]*\2|
src_queue_name\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community; classtype:attempted-
user; sid:2693; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_aqadm.verify_queue_types_get_nrp buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_aqadm.verify_queue_types_get_nrp";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]
{1024,}\x22)[\r\n\s]*\x3b.*src_queue_name[\r\n\s]*=>[\r\n\s]*\2|
src_queue_name\s*=>\s*(\x27[^\x27]{1024,}|\x22[^\x22]{1024,})|\(\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community; classtype:attempted-
user; sid:2694; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_aq_import_internal.aq_table_defn_update buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_aq_import_internal.aq_table_defn_update"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*qt_name[\r\n\s]*=>[\r\n\s]*\2|qt_name\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1024,}|\x22[^\x22]
{1024,}))/si"; metadata:ruleset community; classtype:attempted-user; sid:2695;
rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_utl.is_master buffer overflow attempt"; flow:to_server,established;
content:"sys.dbms_repcat_utl.is_master"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1024,}\x27|\x22[^\x22]{1024,}\x22)
[\r\n\s]*\x3b.*CANON_GNAME[\r\n\s]*=>[\r\n\s]*\2|CANON_GNAME\s*=>\s*(\x27[^\x27]
{1024,}|\x22[^\x22]{1024,}))/si"; metadata:ruleset community; classtype:attempted-
user; sid:2696; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
alter file buffer overflow attempt"; flow:to_server,established; content:"alter";
nocase; pcre:"/ALTER\s.*?FILE\s+((AS|MEMBER|TO)\s+)?(\x27[^\x27]{512}|\x22[^\x22]
{512})/smi"; metadata:ruleset community; classtype:attempted-user; sid:2697;
rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
create file buffer overflow attempt"; flow:to_server,established; content:"create";
nocase; pcre:"/CREATE\s.*?FILE\s+((AS|MEMBER|TO)\s+)?(\x27[^\x27]{512}|\x22[^\x22]
{512})/smi"; metadata:ruleset community; classtype:attempted-user; sid:2698;
rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
TO_CHAR buffer overflow attempt"; flow:to_server,established; content:"TO_CHAR";
nocase; pcre:"/TO_CHAR\s*\(\s*SYSTIMESTAMP\s*,\s*(\x27[^\x27]{256}|\x22[^\x22]
{256})/smi"; metadata:ruleset community; reference:bugtraq,10871;
reference:cve,2004-1364; classtype:attempted-user; sid:2699; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oracle iSQLPlus sid overflow attempt"; flow:to_server,established;
content:"/isqlplus"; nocase; http_uri; pcre:"/sid=[^&\x3b\r\n]{255}/si";
metadata:ruleset community, service http; reference:bugtraq,10871;
reference:cve,2004-1362; reference:cve,2004-1363; reference:cve,2004-1364;
reference:cve,2004-1365; reference:cve,2004-1366; reference:cve,2004-1368;
reference:cve,2004-1369; reference:cve,2004-1370; reference:cve,2004-1371;
reference:url,www.nextgenss.com/advisories/ora-isqlplus.txt; classtype:web-
application-attack; sid:2701; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oracle iSQLPlus username overflow attempt"; flow:to_server,established;
content:"/isqlplus"; nocase; http_uri; pcre:"/username=[^&\x3b\r\n]{255}/si";
metadata:ruleset community, service http; reference:bugtraq,10871;
reference:cve,2004-1362; reference:cve,2004-1363; reference:cve,2004-1364;
reference:cve,2004-1365; reference:cve,2004-1366; reference:cve,2004-1368;
reference:cve,2004-1369; reference:cve,2004-1370; reference:cve,2004-1371;
reference:url,www.nextgenss.com/advisories/ora-isqlplus.txt; classtype:web-
application-attack; sid:2702; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oracle iSQLPlus login.uix username overflow attempt"; flow:to_server,established;
content:"/login.uix"; nocase; http_uri; pcre:"/username=[^&\x3b\r\n]{250}/smi";
metadata:ruleset community, service http; reference:bugtraq,10871;
reference:cve,2004-1362; reference:cve,2004-1363; reference:cve,2004-1364;
reference:cve,2004-1365; reference:cve,2004-1366; reference:cve,2004-1368;
reference:cve,2004-1369; reference:cve,2004-1370; reference:cve,2004-1371;
reference:url,www.nextgenss.com/advisories/ora-isqlplus.txt; classtype:web-
application-attack; sid:2703; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oracle 10g iSQLPlus login.unix connectID overflow attempt";
flow:to_server,established; content:"/login.uix"; nocase; http_uri;
content:"connectID="; nocase; isdataat:255,relative; pcre:"/connectID=[^&\x3b\r\n]
{255}/smi"; metadata:ruleset community, service http; reference:bugtraq,10871;
reference:cve,2004-1362; reference:cve,2004-1363; reference:cve,2004-1364;
reference:cve,2004-1365; reference:cve,2004-1366; reference:cve,2004-1368;
reference:cve,2004-1369; reference:cve,2004-1370; reference:cve,2004-1371;
reference:url,www.nextgenss.com/advisories/ora-isqlplus.txt; classtype:web-
application-attack; sid:2704; rev:12;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-IMAGE Microsoft
Multiple Products JPEG parser heap overflow attempt"; flow:to_client,established;
content:"Content-Type"; nocase; http_header; content:"image/"; nocase; http_header;
pcre:"/^Content-Type\x3A\s*image\x2F/smiH"; file_data; content:"|FF D8|"; within:2;
fast_pattern; pcre:"/^.{0,100}\xFF[\xE1\xE2\xED\xFE]\x00[\x00\x01]/sR";
metadata:ruleset community, service http; reference:bugtraq,11173;
reference:cve,2004-0200;
reference:url,www.microsoft.com/security/bulletins/200409_jpeg.mspx;
classtype:attempted-user; sid:2705; rev:18;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IMAGE JPEG
parser multipacket heap overflow attempt"; flow:to_client,established;
flowbits:isset,file.jpeg; file_data; content:"|00 48 00 00 FF|"; fast_pattern:only;
pcre:"/\x00\x48\x00\x00\xFF[\xE1\xE2\xED\xFE]\x00[\x00\x01]/"; metadata:ruleset
community, service ftp-data, service http, service imap, service pop3;
reference:bugtraq,11173; reference:cve,2004-0200; reference:cve,2017-16392;
reference:url,helpx.adobe.com/security/products/acrobat/apsb17-36.html;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-028;
classtype:attempted-admin; sid:2707; rev:14;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_offline_og.begin_flavor_change buffer overflow attempt";
flow:to_server,established; content:"dbms_offline_og.begin_flavor_change"; nocase;
pcre:"/\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset
community; reference:url,www.appsecinc.com/resources/alerts/oracle/2004-
0001/25.html; classtype:attempted-user; sid:2708; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_offline_og.begin_instantiation buffer overflow attempt";
flow:to_server,established; content:"dbms_offline_og.begin_instantiation"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2709; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_offline_og.end_flavor_change buffer overflow attempt";
flow:to_server,established; content:"dbms_offline_og.end_flavor_change"; nocase;
pcre:"/\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset
community; reference:url,www.appsecinc.com/resources/alerts/oracle/2004-
0001/25.html; classtype:attempted-user; sid:2711; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_offline_og.end_instantiation buffer overflow attempt";
flow:to_server,established; content:"dbms_offline_og.end_instantiation"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2712; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_offline_og.end_load buffer overflow attempt"; flow:to_server,established;
content:"dbms_offline_og.end_load"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2713; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_offline_og.resume_subset_of_masters buffer overflow attempt";
flow:to_server,established; content:"dbms_offline_og.resume_subset_of_masters";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2714; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_offline_snapshot.begin_load buffer overflow attempt";
flow:to_server,established; content:"dbms_offline_snapshot.begin_load"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2715; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_offline_snapshot.end_load buffer overflow attempt";
flow:to_server,established; content:"dbms_offline_snapshot.end_load"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck632.html;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2716; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_rectifier_diff.differences buffer overflow attempt";
flow:to_server,established; content:"dbms_rectifier_diff.differences"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(missing_rows_oname1|missing_rows_oname2)[\r\n\s]*=>[\r\n\s]*\2|
(missing_rows_oname1|missing_rows_oname2)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){9}(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){10}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck97.html;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2717; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_rectifier_diff.rectify buffer overflow attempt"; flow:to_server,established;
content:"dbms_rectifier_diff.rectify"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(missing_rows_oname1|missing_rows_oname2)[\r\n\s]*=>[\r\n\s]*\2|
(missing_rows_oname1|missing_rows_oname2)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){8}(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){9}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2718; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.abort_flavor_definition buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.abort_flavor_definition"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2719; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_column_group_to_flavor buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_column_group_to_flavor";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2720; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_columns_to_flavor buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_columns_to_flavor"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2721; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_object_to_flavor buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_object_to_flavor"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2722; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_priority_char buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.add_priority_char"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2723; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_priority_date buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.add_priority_date"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2724; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_priority_nchar buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_priority_nchar"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2725; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_priority_number buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_priority_number"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2726; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_priority_nvarchar2 buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_priority_nvarchar2"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2727; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_priority_raw buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.add_priority_raw"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2728; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_priority_varchar2 buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_priority_varchar2"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2729; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_site_priority_site buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_site_priority_site"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2730; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_unique_resolution buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_unique_resolution"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2731; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.add_update_resolution buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.add_update_resolution"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2732; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_master_propagation buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_master_propagation"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2733; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_mview_propagation buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_mview_propagation"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){3}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2734; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_priority_char buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_priority_char"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2735; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_priority_date buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_priority_date"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2736; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_priority_nchar buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_priority_nchar"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2737; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_priority_number buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_priority_number"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2738; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_priority_nvarchar2 buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_priority_nvarchar2"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2739; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_priority_raw buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_priority_raw"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2740; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_priority buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.alter_priority"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2741; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_priority_varchar2 buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_priority_varchar2"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2742; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_site_priority_site buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_site_priority_site"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2743; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_site_priority buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_site_priority"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2744; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.alter_snapshot_propagation buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.alter_snapshot_propagation";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2745; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_auth.revoke_surrogate_repcat buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat_auth.revoke_surrogate_repcat";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*userid[\r\n\s]*=>[\r\n\s]*\2|userid\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2746; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.begin_flavor_definition buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.begin_flavor_definition"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2747; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.comment_on_column_group buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.comment_on_column_group"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2748; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.comment_on_delete_resolution buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.comment_on_delete_resolution";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2749; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.comment_on_mview_repsites buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.comment_on_mview_repsites";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(gowner|gname)[\r\n\s]*=>[\r\n\s]*\2|(gowner|
gname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2750; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.comment_on_priority_group buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.comment_on_priority_group";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2751; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.comment_on_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.comment_on_repgroup"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2752; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.comment_on_repsites buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.comment_on_repsites"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2753; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.comment_on_site_priority buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.comment_on_site_priority"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2754; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.comment_on_unique_resolution buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.comment_on_unique_resolution";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2755; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.comment_on_update_resolution buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.comment_on_update_resolution";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2756; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.create_master_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.create_master_repgroup"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2757; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.create_master_repobject buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.create_master_repobject"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){5}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2758; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.create_snapshot_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.create_snapshot_repgroup"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|fname)[\r\n\s]*=>[\r\n\s]*\2|(gname|
fname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){4}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2759; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.define_column_group buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.define_column_group"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2760; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.define_priority_group buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.define_priority_group"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2761; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.define_site_priority buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.define_site_priority"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2762; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.do_deferred_repcat_admin buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.do_deferred_repcat_admin"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2763; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_column_group_from_flavor buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_column_group_from_flavor";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2764; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_column_group buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.drop_column_group"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2765; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_columns_from_flavor buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_columns_from_flavor"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2766; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_delete_resolution buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_delete_resolution"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2767; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_grouped_column buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_grouped_column"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2768; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_mview_repobject buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_mview_repobject"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname|type)[\r\n\s]*=>[\r\n\s]*\2|(sname|oname|
type)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2769; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_object_from_flavor buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_object_from_flavor"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2770; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_priority_char buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_priority_char"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2771; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_priority_date buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_priority_date"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2772; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_priority_nchar buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_priority_nchar"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2773; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_priority_number buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_priority_number"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2774; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_priority_nvarchar2 buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_priority_nvarchar2"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2775; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_priority_raw buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.drop_priority_raw"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2776; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_priority buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.drop_priority"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2777; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_priority_varchar2 buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_priority_varchar2"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2778; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_site_priority_site buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_site_priority_site"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2779; rev:6;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_site_priority buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_site_priority"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2780; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_snapshot_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_snapshot_repgroup"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2781; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_snapshot_repobject buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_snapshot_repobject"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname|type)[\r\n\s]*=>[\r\n\s]*\2|(sname|oname|
type)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2782; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_unique_resolution buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_unique_resolution"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2783; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.drop_update_resolution buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.drop_update_resolution"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2784; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.execute_ddl buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.execute_ddl"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2785; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.generate_replication_package buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.generate_replication_package";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2786; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_instantiate.instantiate_online buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat_instantiate.instantiate_online";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*refresh_template_name[\r\n\s]*=>[\r\n\s]*\2|
refresh_template_name\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2787; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.make_column_group buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.make_column_group"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2788; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.obsolete_flavor_definition buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.obsolete_flavor_definition";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2789; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.publish_flavor_definition buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.publish_flavor_definition";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2790; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.purge_flavor_definition buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.purge_flavor_definition"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2791; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.purge_master_log buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.purge_master_log"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2792; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.purge_statistics buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.purge_statistics"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2793; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.refresh_mview_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.refresh_mview_repgroup"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck90.html;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2794; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.refresh_snapshot_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.refresh_snapshot_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2795; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.register_mview_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.register_mview_repgroup"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){4}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2796; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.register_snapshot_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.register_snapshot_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2797; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.register_statistics buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.register_statistics"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2798; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.relocate_masterdef buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.relocate_masterdef"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2799; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.rename_shadow_column_group buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.rename_shadow_column_group";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2800; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.resume_master_activity buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.resume_master_activity"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2801; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_rgt.check_ddl_text buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat_rgt.check_ddl_text"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(object_type|user_name)[\r\n\s]*=>[\r\n\s]*\2|(object_type|
user_name)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2802; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat_rgt.drop_site_instantiation buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat_rgt.drop_site_instantiation";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(refresh_template_name|user_name)[\r\n\s]*=>[\r\n\s]*\2|
(refresh_template_name|user_name)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2803; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.send_and_compare_old_values buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.send_and_compare_old_values";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2804; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.set_columns buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.set_columns"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2805; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.set_local_flavor buffer overflow attempt"; flow:to_server,established;
content:"dbms_repcat.set_local_flavor"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|fname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|fname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2806; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.specify_new_masters buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.specify_new_masters"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2807; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.suspend_master_activity buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.suspend_master_activity"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2808; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.unregister_mview_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.unregister_mview_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2809; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.unregister_snapshot_repgroup buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.unregister_snapshot_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2810; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.validate_flavor_definition buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.validate_flavor_definition";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2811; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.validate_for_local_flavor buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.validate_for_local_flavor";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2812; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla.abort_flavor_definition buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_fla.abort_flavor_definition";
nocase; pcre:"/\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset
community; reference:url,www.appsecinc.com/resources/alerts/oracle/2004-
0001/25.html; classtype:attempted-user; sid:2813; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla.add_object_to_flavor buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_fla.add_object_to_flavor";
nocase; pcre:"/\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset
community; reference:url,www.appsecinc.com/resources/alerts/oracle/2004-
0001/25.html; classtype:attempted-user; sid:2814; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla.begin_flavor_definition buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_fla.begin_flavor_definition";
nocase; pcre:"/\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset
community; reference:url,www.appsecinc.com/resources/alerts/oracle/2004-
0001/25.html; classtype:attempted-user; sid:2815; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla.drop_object_from_flavor buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_fla.drop_object_from_flavor";
nocase; pcre:"/\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset
community; reference:url,www.appsecinc.com/resources/alerts/oracle/2004-
0001/25.html; classtype:attempted-user; sid:2816; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla_mas.add_column_group_to_flavor buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_fla_mas.add_column_group_to_flavor"; nocase; pcre:"/\
(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2817; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla_mas.add_columns_to_flavor buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_fla_mas.add_columns_to_flavor"; nocase; pcre:"/\
(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2818; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla_mas.drop_column_group_from_flavor buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_fla_mas.drop_column_group_from_flavor"; nocase; pcre:"/\
(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2819; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla_mas.drop_columns_from_flavor buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_fla_mas.drop_columns_from_flavor"; nocase; pcre:"/\
(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2820; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla_mas.obsolete_flavor_definition buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_fla_mas.obsolete_flavor_definition"; nocase; pcre:"/\
(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2821; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla_mas.publish_flavor_definition buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_fla_mas.publish_flavor_definition"; nocase; pcre:"/\
(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2822; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla_mas.purge_flavor_definition buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_fla_mas.purge_flavor_definition"; nocase; pcre:"/\
(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2823; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla.set_local_flavor buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_fla.set_local_flavor"; nocase;
pcre:"/(\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2824; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla.validate_flavor_definition buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_fla.validate_flavor_definition"; nocase; pcre:"/\
(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2825; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_fla.validate_for_local_flavor buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_fla.validate_for_local_flavor"; nocase; pcre:"/(\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2826; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.alter_master_repobject buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.alter_master_repobject";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*type[\r\n\s]*=>[\r\n\s]*\2|type\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2827; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.comment_on_repgroup buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.comment_on_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2828; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.comment_on_repobject buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.comment_on_repobject";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*type[\r\n\s]*=>[\r\n\s]*\2|type\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2829; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.create_master_repgroup buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.create_master_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2830; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.create_master_repobject buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.create_master_repobject";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){5}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2831; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.do_deferred_repcat_admin buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.do_deferred_repcat_admin";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2832; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.drop_master_repgroup buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.drop_master_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2833; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.generate_replication_package buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_mas.generate_replication_package"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2834; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.purge_master_log buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.purge_master_log"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2835; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.relocate_masterdef buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.relocate_masterdef";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2836; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.rename_shadow_column_group buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_mas.rename_shadow_column_group"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2837; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.resume_master_activity buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.resume_master_activity";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2838; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_mas.suspend_master_activity buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_mas.suspend_master_activity";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2839; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna_utl.alter_snapshot_propagation buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna_utl.alter_snapshot_propagation"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){3}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2840; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna_utl.create_snapshot_repgroup buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna_utl.create_snapshot_repgroup"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|fname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|fname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){5}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){4}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck97.html;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2841; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna_utl.drop_snapshot_repgroup buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna_utl.drop_snapshot_repgroup"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2842; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna_utl.drop_snapshot_repobject buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna_utl.drop_snapshot_repobject"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname|type)[\r\n\s]*=>[\r\n\s]*\2|(sname|oname|
type)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2843; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna_utl.refresh_snapshot_repgroup buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna_utl.refresh_snapshot_repgroup"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2844; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna_utl.register_snapshot_repgroup buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna_utl.register_snapshot_repgroup"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){4}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2845; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna_utl.repcat_import_check buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_sna_utl.repcat_import_check";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2846; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna_utl.unregister_snapshot_repgroup buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna_utl.unregister_snapshot_repgroup"; nocase; pcre:"/
((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2847; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_utl4.drop_master_repobject buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_utl4.drop_master_repobject";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*type[\r\n\s]*=>[\r\n\s]*\2|type\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2848; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_utl.drop_an_object buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_utl.drop_an_object"; nocase;
pcre:"/(\(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/Policy/PolicyCheck97.html;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2849; rev:5;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.create_mview_repobject buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.create_mview_repobject"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname|type|gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(sname|oname|
type|gname|gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){7}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){5}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2850; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.create_snapshot_repobject buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.create_snapshot_repobject";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname|type|gname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname|type|gname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){5}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2851; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.generate_mview_support buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.generate_mview_support"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname|type)[\r\n\s]*=>[\r\n\s]*\2|(sname|oname|
type)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2852; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.generate_replication_trigger buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.generate_replication_trigger";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname|gname)[\r\n\s]*=>[\r\n\s]*\2|(sname|oname|
gname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2853; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.generate_snapshot_support buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.generate_snapshot_support";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname|type)[\r\n\s]*=>[\r\n\s]*\2|(sname|oname|
type)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2854; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.remove_master_databases buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.remove_master_databases"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2855; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.switch_mview_master buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.switch_mview_master"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2856; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
dbms_repcat.switch_snapshot_master buffer overflow attempt";
flow:to_server,established; content:"dbms_repcat.switch_snapshot_master"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1073,}\x27|\x22[^\x22]{1073,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1073,}|\x22[^\x22]{1073,})|\(\s*(\x27[^\x27]{1073,}|\x22[^\x22]{1073,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2857; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_delete_resolution buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_delete_resolution";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2858; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_priority_char buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_priority_char";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2859; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_priority_date buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_priority_date";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2860; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_priority_nchar buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_priority_nchar";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2861; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_priority_number buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_priority_number";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2862; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_priority_nvarchar2 buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_priority_nvarchar2";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2863; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_priority_raw buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_priority_raw";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2864; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_priority_varchar2 buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_priority_varchar2";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2865; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_site_priority_site buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_site_priority_site";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2866; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_unique_resolution buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_unique_resolution";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2867; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.add_update_resolution buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.add_update_resolution";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2868; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.alter_priority_char buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.alter_priority_char";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2869; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.alter_priority_date buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.alter_priority_date";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2870; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.alter_priority_nchar buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.alter_priority_nchar";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2871; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.alter_priority_number buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.alter_priority_number";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2872; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.alter_priority_nvarchar2 buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_conf.alter_priority_nvarchar2"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2873; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.alter_priority_raw buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.alter_priority_raw";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2874; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.alter_priority buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.alter_priority"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2875; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.alter_priority_varchar2 buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.alter_priority_varchar2";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2876; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.alter_site_priority_site buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_conf.alter_site_priority_site"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2877; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.alter_site_priority buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.alter_site_priority";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2878; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.cancel_statistics buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.cancel_statistics";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2879; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.comment_on_delete_resolution buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_conf.comment_on_delete_resolution"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2880; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.comment_on_priority_group buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_conf.comment_on_priority_group"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2881; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.comment_on_site_priority buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_conf.comment_on_site_priority"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2882; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.comment_on_unique_resolution buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_conf.comment_on_unique_resolution"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2883; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.comment_on_update_resolution buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_conf.comment_on_update_resolution"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2884; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.define_priority_group buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.define_priority_group";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2885; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.define_site_priority buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.define_site_priority";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2886; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_delete_resolution buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_delete_resolution";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2887; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_priority_char buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_priority_char";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2888; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_priority_date buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_priority_date";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2889; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_priority_nchar buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_priority_nchar";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2890; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_priority_number buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_priority_number";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2891; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_priority_nvarchar2 buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_priority_nvarchar2";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2892; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_priority_raw buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_priority_raw";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2893; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_priority buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_priority"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2894; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_priority_varchar2 buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_priority_varchar2";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2895; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_site_priority_site buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_site_priority_site";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2896; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_site_priority buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_site_priority";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2897; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_unique_resolution buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_unique_resolution";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2898; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.drop_update_resolution buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.drop_update_resolution";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2899; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.purge_statistics buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.purge_statistics";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2900; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_conf.register_statistics buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_conf.register_statistics";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname)[\r\n\s]*=>[\r\n\s]*\2|(sname|
oname)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2901; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.alter_snapshot_propagation buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna.alter_snapshot_propagation"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){3}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2902; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.create_snapshot_repgroup buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_sna.create_snapshot_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(gname|fname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|fname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){5}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){4}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2903; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.create_snapshot_repobject buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna.create_snapshot_repobject"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname|type|gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(sname|oname|
type|gname|gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){7}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){5}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2904; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.create_snapshot_repschema buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna.create_snapshot_repschema"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*sname[\r\n\s]*=>[\r\n\s]*\2|sname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2905; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.drop_snapshot_repgroup buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_sna.drop_snapshot_repgroup";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2906; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.drop_snapshot_repobject buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_sna.drop_snapshot_repobject";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(sname|oname|type)[\r\n\s]*=>[\r\n\s]*\2|(sname|oname|
type)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2907; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.drop_snapshot_repschema buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_sna.drop_snapshot_repschema";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*sname[\r\n\s]*=>[\r\n\s]*\2|sname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2908; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.generate_snapshot_support buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna.generate_snapshot_support"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(sname|oname|type)[\r\n\s]*=>[\r\n\s]*\2|(sname|oname|
type)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2909; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.refresh_snapshot_repgroup buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna.refresh_snapshot_repgroup"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2910; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.refresh_snapshot_repschema buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna.refresh_snapshot_repschema"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*sname[\r\n\s]*=>[\r\n\s]*\2|sname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2911; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.register_snapshot_repgroup buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna.register_snapshot_repgroup"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){4}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2912; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.repcat_import_check buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_sna.repcat_import_check";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2913; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.set_local_flavor buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_sna.set_local_flavor"; nocase;
pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|fname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|fname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\
(\s*(\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*(\x27[^\x27]{1075,}|\x22[^\x22]
{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2914; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.switch_snapshot_master buffer overflow attempt";
flow:to_server,established; content:"sys.dbms_repcat_sna.switch_snapshot_master";
nocase; pcre:"/((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]
{1075,}\x22)[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2915; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.unregister_snapshot_repgroup buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna.unregister_snapshot_repgroup"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2916; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna_utl.switch_snapshot_master buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna_utl.switch_snapshot_master"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2917; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_sna.validate_for_local_flavor buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_sna.validate_for_local_flavor"; nocase; pcre:"/((\w+)
[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*(gname|gowner)[\r\n\s]*=>[\r\n\s]*\2|(gname|
gowner)\s*=>\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*((\x27[^\x27]*\x27|\x22[^\x22]+\x22)\s*,\s*){2}
(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si"; metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2918; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"SERVER-ORACLE
sys.dbms_repcat_untrusted.register_snapshot_repgroup buffer overflow attempt";
flow:to_server,established;
content:"sys.dbms_repcat_untrusted.register_snapshot_repgroup"; nocase; pcre:"/
((\w+)[\r\n\s]*\x3a=[\r\n\s]*(\x27[^\x27]{1075,}\x27|\x22[^\x22]{1075,}\x22)
[\r\n\s]*\x3b.*gname[\r\n\s]*=>[\r\n\s]*\2|gname\s*=>\s*(\x27[^\x27]
{1075,}|\x22[^\x22]{1075,})|\(\s*(\x27[^\x27]{1075,}|\x22[^\x22]{1075,}))/si";
metadata:ruleset community;
reference:url,www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html;
classtype:attempted-user; sid:2919; rev:4;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS UDP inverse
query"; flow:to_server; byte_test:1,<,16,2; byte_test:1,&,8,2; metadata:ruleset
community, service dns; reference:bugtraq,2321; reference:cve,2001-0012;
reference:nessus,10605; classtype:attempted-recon; sid:2921; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS TCP inverse
query"; flow:to_server,established; byte_test:1,<,16,4; byte_test:1,&,8,4;
metadata:ruleset community, service dns; reference:bugtraq,2321;
reference:cve,2001-0012; reference:nessus,10605; classtype:attempted-recon;
sid:2922; rev:11;)
# alert tcp $HOME_NET 139 -> $EXTERNAL_NET any (msg:"NETBIOS SMB repeated logon
failure"; flow:to_client,established,no_stream; content:"|FF|SMBs"; depth:5;
offset:4; content:"m|00 00 C0|"; within:4; detection_filter:track by_dst,count
10,seconds 60; metadata:ruleset community; classtype:unsuccessful-user; sid:2923;
rev:14;)
# alert tcp $HOME_NET 445 -> $EXTERNAL_NET any (msg:"NETBIOS SMB-DS repeated logon
failure"; flow:to_client,established,no_stream; content:"|FF|SMBs"; depth:5;
offset:4; content:"m|00 00 C0|"; within:4; detection_filter:track by_dst,count
10,seconds 60; metadata:ruleset community, service netbios-ssn;
classtype:unsuccessful-user; sid:2924; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
PhpGedView PGV base directory manipulation"; flow:to_server,established;
content:"_conf.php"; nocase; http_uri; content:"PGV_BASE_DIRECTORY";
fast_pattern:only; metadata:ruleset community, service http;
reference:bugtraq,9368; reference:cve,2004-0030; classtype:web-application-attack;
sid:2926; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"OS-WINDOWS Microsoft Windows
XPAT pattern overflow attempt"; flow:to_server,established; content:"PAT|20|";
depth:5; nocase; isdataat:160,relative; pcre:"/^X?PAT\s+[^\n]{160}/i";
metadata:ruleset community; reference:cve,2004-0574;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-036;
classtype:attempted-admin; sid:2927; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [139,445] (msg:"OS-WINDOWS DCERPC NCACN-
IP-TCP nddeapi NDdeSetTrustedShareW overflow attempt"; flow:to_server,established;
dce_iface:2f5f3220-c126-1076-b549-074d078619da; dce_opnum:12; dce_stub_data;
isdataat:256; content:!"|00|"; depth:256; offset:12; metadata:ruleset community,
service netbios-ssn; reference:bugtraq,11372; reference:cve,2004-0206;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms04-031;
classtype:attempted-admin; sid:2936; rev:18;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [139,445] (msg:"NETBIOS DCERPC NCACN-IP-
TCP winreg InitiateSystemShutdown attempt"; flow:established,to_server;
dce_iface:338cd001-2244-31f1-aaaa-900038001003; dce_opnum:24; metadata:ruleset
community, service netbios-ssn;
reference:url,msdn.microsoft.com/library/default.asp?url=/library/en-
us/shutdown/base/initiatesystemshutdown.asp; classtype:protocol-command-decode;
sid:2942; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"OS-WINDOWS Microsoft Windows
SMB Session Setup NTLMSSP unicode asn1 overflow attempt";
flow:to_server,established; content:"|00|"; depth:1; content:"|FF|SMBs"; within:5;
distance:3; byte_test:1,&,128,6,relative; pcre:"/^.{27}/R";
byte_test:4,&,2147483648,21,relative,little; content:!"NTLMSSP"; within:7;
distance:27; asn1:double_overflow, bitstring_overflow, relative_offset 27,
oversize_length 2048; metadata:ruleset community; reference:bugtraq,9633;
reference:bugtraq,9635; reference:cve,2003-0818; reference:nessus,12052;
reference:nessus,12065; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS04-007; classtype:protocol-command-decode; sid:3000;
rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"OS-WINDOWS Microsoft Windows
SMB Session Setup NTLMSSP andx asn1 overflow attempt"; flow:to_server,established;
content:"|00|"; depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!&,128,6,relative;
content:"s"; depth:1; offset:39; byte_jump:2,0,little,relative;
byte_test:4,&,2147483648,21,relative,little; content:!"NTLMSSP"; within:7;
distance:27; asn1:double_overflow, bitstring_overflow, relative_offset 27,
oversize_length 2048; metadata:ruleset community; reference:bugtraq,9633;
reference:bugtraq,9635; reference:cve,2003-0818; reference:nessus,12052;
reference:nessus,12065; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS04-007; classtype:protocol-command-decode; sid:3001;
rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"OS-WINDOWS Microsoft Windows
SMB Session Setup NTLMSSP unicode andx asn1 overflow attempt";
flow:to_server,established; content:"|00|"; depth:1; content:"|FF|SMB"; within:4;
distance:3; pcre:"/^(\x75|\x2d|\x2f|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"s"; depth:1; offset:39;
byte_jump:2,0,little,relative; byte_test:4,&,2147483648,21,relative,little;
content:!"NTLMSSP"; within:7; distance:27; asn1:double_overflow,
bitstring_overflow, relative_offset 27, oversize_length 2048; metadata:ruleset
community; reference:bugtraq,9633; reference:bugtraq,9635; reference:cve,2003-0818;
reference:nessus,12052; reference:nessus,12065;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-007;
classtype:protocol-command-decode; sid:3002; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows
SMB-DS Session Setup NTLMSSP unicode asn1 overflow attempt";
flow:to_server,established; content:"|00|"; depth:1; content:"|FF|SMBs"; within:5;
distance:3; byte_test:1,&,128,6,relative; pcre:"/^.{27}/R";
byte_test:4,&,2147483648,21,relative,little; content:!"NTLMSSP"; within:7;
distance:27; asn1:double_overflow, bitstring_overflow, relative_offset 27,
oversize_length 2048; metadata:ruleset community, service netbios-ssn;
reference:bugtraq,9633; reference:bugtraq,9635; reference:cve,2003-0818;
reference:nessus,12052; reference:nessus,12065;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-007;
classtype:protocol-command-decode; sid:3003; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows
SMB-DS Session Setup NTLMSSP andx asn1 overflow attempt";
flow:to_server,established; content:"|00|"; depth:1; content:"|FF|SMB"; within:4;
distance:3; pcre:"/^(\x75|\x2d|\x2f|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"s"; depth:1; offset:39; byte_jump:2,0,little,relative;
byte_test:4,&,2147483648,21,relative,little; content:!"NTLMSSP"; within:7;
distance:27; asn1:double_overflow, bitstring_overflow, relative_offset 27,
oversize_length 2048; metadata:ruleset community, service netbios-ssn;
reference:bugtraq,9633; reference:bugtraq,9635; reference:cve,2003-0818;
reference:nessus,12052; reference:nessus,12065;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-007;
classtype:protocol-command-decode; sid:3004; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows
SMB-DS Session Setup NTLMSSP unicode andx asn1 overflow attempt";
flow:to_server,established; content:"|00|"; depth:1; content:"|FF|SMB"; within:4;
distance:3; pcre:"/^(\x75|\x2d|\x2f|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"s"; depth:1; offset:39;
byte_jump:2,0,little,relative; byte_test:4,&,2147483648,21,relative,little;
content:!"NTLMSSP"; within:7; distance:27; asn1:double_overflow,
bitstring_overflow, relative_offset 27, oversize_length 2048; metadata:ruleset
community, service netbios-ssn; reference:bugtraq,9633; reference:bugtraq,9635;
reference:cve,2003-0818; reference:nessus,12052; reference:nessus,12065;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-007;
classtype:protocol-command-decode; sid:3005; rev:12;)
# alert udp $EXTERNAL_NET 7808 -> $HOME_NET any (msg:"SERVER-OTHER Volition
Freespace 2 buffer overflow attempt"; flow:to_client; content:"|00 E1|..|B4 00 00
00|"; depth:8; isdataat:160,relative; metadata:ruleset community;
reference:bugtraq,9785; classtype:misc-attack; sid:3006; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP command overflow
attempt"; flow:established,to_server; content:"LOGIN"; isdataat:100,relative;
pcre:"/\s(APPEND|CHECK|CLOSE|CREATE|DELETE|EXAMINE|EXPUNGE|FETCH|LIST|RENAME|
SEARCH|SELECT|STATUS|SUBSCRIBE|UNSUBSCRIBE)\s[^\n]{100}/smi"; metadata:policy max-
detect-ips drop, ruleset community, service imap; reference:bugtraq,11675;
reference:bugtraq,11775; reference:bugtraq,15006; reference:bugtraq,15753;
reference:cve,2004-1211; reference:cve,2005-0707; reference:cve,2005-1520;
reference:cve,2005-2923; reference:cve,2005-3155; reference:nessus,15771;
classtype:misc-attack; sid:3007; rev:21;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP delete literal
overflow attempt"; flow:established,to_server; content:"DELETE"; fast_pattern:only;
pcre:"/\sDELETE\s[^\n]*?\{/smi"; byte_test:5,>,100,0,string,dec,relative;
metadata:ruleset community, service imap; reference:bugtraq,11675;
reference:cve,2005-1520; reference:nessus,15771; classtype:misc-attack; sid:3008;
rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 20034 (msg:"MALWARE-BACKDOOR NetBus Pro
2.0 connection request"; flow:to_server,established; content:"BN |00 02 00|";
depth:6; content:"|05 00|"; depth:2; offset:8;
flowbits:set,backdoor.netbus_2.connect; flowbits:noalert; metadata:ruleset
community; classtype:misc-activity; sid:3009; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 22222 (msg:"MALWARE-CNC RUX the Tick get
windows directory"; flow:to_server,established; content:"WINDIR"; depth:6;
metadata:ruleset community; classtype:misc-activity; sid:3010; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 22222 (msg:"MALWARE-CNC RUX the Tick get
system directory"; flow:to_server,established; content:"SYSDIR"; depth:6;
metadata:ruleset community; classtype:misc-activity; sid:3011; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 22222 (msg:"MALWARE-CNC RUX the Tick
upload/execute arbitrary file"; flow:to_server,established; content:"ABCJZDATEIV";
depth:11; metadata:ruleset community; classtype:misc-activity; sid:3012; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 23432 (msg:"MALWARE-CNC Asylum 0.1
connection request"; flow:to_server,established; content:"RQS"; depth:3;
flowbits:set,backdoor.asylum.connect; flowbits:noalert; metadata:ruleset community;
classtype:misc-activity; sid:3013; rev:8;)
# alert tcp $HOME_NET 23432 -> $EXTERNAL_NET any (msg:"MALWARE-CNC Asylum 0.1
connection"; flow:to_client,established; flowbits:isset,backdoor.asylum.connect;
content:"GNT"; depth:3; metadata:ruleset community; classtype:misc-activity;
sid:3014; rev:10;)
# alert tcp $HOME_NET 2000 -> $EXTERNAL_NET any (msg:"MALWARE-CNC Insane Network
4.0 connection"; flow:to_client,established; content:"Insane Network vs 4.0 by Suid
Flow|0A 0D|www.blackcode.com|0A 0D|[r00t]|23|"; depth:62; metadata:ruleset
community; classtype:misc-activity; sid:3015; rev:10;)
# alert tcp $HOME_NET 63536 -> $EXTERNAL_NET any (msg:"MALWARE-CNC Insane Network
4.0 connection port 63536"; flow:to_client,established; content:"Insane Network vs
4.0 by Suid Flow|0A 0D|www.blackcode.com|0A 0D|[r00t]|23|"; depth:62;
metadata:ruleset community; classtype:misc-activity; sid:3016; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 42 (msg:"OS-WINDOWS Microsoft Windows
WINS overflow attempt"; flow:to_server,established; byte_test:1,&,64,6;
byte_test:1,&,32,6; byte_test:1,&,16,6; byte_test:1,&,8,6; pcre:!"/^.{8}
(\x05\x37(\x1E[\x90-\xFF]|
[\x1F-\x2F].|\x30[\x00-\x70])|\x00\x00\x00[\x00-\x65]|\x02\x68\x05\xC0)/s";
metadata:ruleset community, service wins; reference:bugtraq,11763;
reference:cve,2004-0567; reference:cve,2004-1080;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-045;
reference:url,www.immunitysec.com/downloads/instantanea.pdf; classtype:misc-attack;
sid:3017; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
oversized Security Descriptor attempt"; flow:established,to_server; content:"|00|";
depth:1; content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,!
&,128,6,relative; pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-15,little,relative,from_beginning; pcre:"/^.{4}/R";
byte_test:4,>,1024,36,relative,little; metadata:ruleset community;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3018; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
andx oversized Security Descriptor attempt"; flow:established,to_server; content:"|
00|"; depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-15,little,relative,from_beginning; pcre:"/^.{4}/R";
byte_test:4,>,1024,36,relative,little; metadata:ruleset community;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3019; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
unicode oversized Security Descriptor attempt"; flow:established,to_server;
content:"|00|"; depth:1; content:"|FF|SMB|A0|"; within:5; distance:3;
byte_test:1,&,128,6,relative; pcre:"/^.{27}/R"; content:"|01 00|"; within:2;
distance:37; byte_jump:4,-15,little,relative,from_beginning; pcre:"/^.{4}/R";
byte_test:4,>,1024,36,relative,little; metadata:ruleset community;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3020; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
unicode andx oversized Security Descriptor attempt"; flow:established,to_server;
content:"|00|"; depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-15,little,relative,from_beginning; pcre:"/^.{4}/R";
byte_test:4,>,1024,36,relative,little; metadata:ruleset community;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3021; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE oversized Security Descriptor attempt"; flow:established,to_server;
content:"|00|"; depth:1; content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,!
&,128,6,relative; pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-15,little,relative,from_beginning; pcre:"/^.{4}/R";
byte_test:4,>,1024,36,relative,little; metadata:ruleset community, service netbios-
ssn; reference:cve,2004-1154; classtype:protocol-command-decode; sid:3022; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE andx oversized Security Descriptor attempt"; flow:established,to_server;
content:"|00|"; depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-15,little,relative,from_beginning; pcre:"/^.{4}/R";
byte_test:4,>,1024,36,relative,little; metadata:ruleset community, service netbios-
ssn; reference:cve,2004-1154; classtype:protocol-command-decode; sid:3023; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE unicode oversized Security Descriptor attempt"; flow:established,to_server;
content:"|00|"; depth:1; content:"|FF|SMB|A0|"; within:5; distance:3;
byte_test:1,&,128,6,relative; pcre:"/^.{27}/R"; content:"|01 00|"; within:2;
distance:37; byte_jump:4,-15,little,relative,from_beginning; pcre:"/^.{4}/R";
byte_test:4,>,1024,36,relative,little; metadata:ruleset community, service netbios-
ssn; reference:cve,2004-1154; classtype:protocol-command-decode; sid:3024; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE unicode andx oversized Security Descriptor attempt";
flow:established,to_server; content:"|00|"; depth:1; content:"|FF|SMB"; within:4;
distance:3; pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-15,little,relative,from_beginning; pcre:"/^.{4}/R";
byte_test:4,>,1024,36,relative,little; metadata:ruleset community, service netbios-
ssn; reference:cve,2004-1154; classtype:protocol-command-decode; sid:3025; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
SACL overflow attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,!&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:12; byte_jump:4,12,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community; reference:cve,2004-1154;
classtype:protocol-command-decode; sid:3026; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
andx SACL overflow attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:12; byte_jump:4,12,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community; reference:cve,2004-1154;
classtype:protocol-command-decode; sid:3027; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
unicode SACL overflow attempt"; flow:established,to_server; content:"|00|";
depth:1; content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:12; byte_jump:4,12,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community; reference:cve,2004-1154;
classtype:protocol-command-decode; sid:3028; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
unicode andx SACL overflow attempt"; flow:established,to_server; content:"|00|";
depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:12; byte_jump:4,12,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community; reference:cve,2004-1154;
classtype:protocol-command-decode; sid:3029; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE SACL overflow attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,!&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:12; byte_jump:4,12,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community, service netbios-ssn;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3030; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE andx SACL overflow attempt"; flow:established,to_server; content:"|00|";
depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:12; byte_jump:4,12,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community, service netbios-ssn;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3031; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE unicode SACL overflow attempt"; flow:established,to_server; content:"|00|";
depth:1; content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:12; byte_jump:4,12,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community, service netbios-ssn;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3032; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE unicode andx SACL overflow attempt"; flow:established,to_server; content:"|
00|"; depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:12; byte_jump:4,12,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community, service netbios-ssn;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3033; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
DACL overflow attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,!&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:16; byte_jump:4,16,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community; reference:cve,2004-1154;
classtype:protocol-command-decode; sid:3034; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
andx DACL overflow attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:16; byte_jump:4,16,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community; reference:cve,2004-1154;
classtype:protocol-command-decode; sid:3035; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
unicode DACL overflow attempt"; flow:established,to_server; content:"|00|";
depth:1; content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:16; byte_jump:4,16,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community; reference:cve,2004-1154;
classtype:protocol-command-decode; sid:3036; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
unicode andx DACL overflow attempt"; flow:established,to_server; content:"|00|";
depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:16; byte_jump:4,16,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community; reference:cve,2004-1154;
classtype:protocol-command-decode; sid:3037; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE DACL overflow attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,!&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:16; byte_jump:4,16,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community, service netbios-ssn;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3038; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE andx DACL overflow attempt"; flow:established,to_server; content:"|00|";
depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:16; byte_jump:4,16,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community, service netbios-ssn;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3039; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE unicode DACL overflow attempt"; flow:established,to_server; content:"|00|";
depth:1; content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:16; byte_jump:4,16,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community, service netbios-ssn;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3040; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE unicode andx DACL overflow attempt"; flow:established,to_server; content:"|
00|"; depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:16; byte_jump:4,16,relative,little; byte_test:4,>,32,-
16,relative,little; metadata:ruleset community, service netbios-ssn;
reference:cve,2004-1154; classtype:protocol-command-decode; sid:3041; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
invalid SACL ace size dos attempt"; flow:stateless; content:"|00|"; depth:1;
content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,!&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:12; byte_jump:4,12,relative,little; content:"|00 00|"; within:2;
distance:-10; metadata:ruleset community; classtype:protocol-command-decode;
sid:3042; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
andx invalid SACL ace size dos attempt"; flow:stateless; content:"|00|"; depth:1;
content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:12; byte_jump:4,12,relative,little; content:"|00 00|";
within:2; distance:-10; metadata:ruleset community; classtype:protocol-command-
decode; sid:3043; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
unicode invalid SACL ace size dos attempt"; flow:stateless; content:"|00|";
depth:1; content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:12; byte_jump:4,12,relative,little; content:"|00 00|"; within:2;
distance:-10; metadata:ruleset community; classtype:protocol-command-decode;
sid:3044; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
unicode andx invalid SACL ace size dos attempt"; flow:stateless; content:"|00|";
depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:12; byte_jump:4,12,relative,little; content:"|00 00|";
within:2; distance:-10; metadata:ruleset community; classtype:protocol-command-
decode; sid:3045; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE invalid SACL ace size dos attempt"; flow:stateless; content:"|00|"; depth:1;
content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,!&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:12; byte_jump:4,12,relative,little; content:"|00 00|"; within:2;
distance:-10; metadata:ruleset community, service netbios-ssn; classtype:protocol-
command-decode; sid:3046; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE andx invalid SACL ace size dos attempt"; flow:stateless; content:"|00|";
depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:12; byte_jump:4,12,relative,little; content:"|00 00|";
within:2; distance:-10; metadata:ruleset community, service netbios-ssn;
classtype:protocol-command-decode; sid:3047; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE unicode invalid SACL ace size dos attempt"; flow:stateless; content:"|00|";
depth:1; content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:12; byte_jump:4,12,relative,little; content:"|00 00|"; within:2;
distance:-10; metadata:ruleset community, service netbios-ssn; classtype:protocol-
command-decode; sid:3048; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE unicode andx invalid SACL ace size dos attempt"; flow:stateless; content:"|
00|"; depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:12; byte_jump:4,12,relative,little; content:"|00 00|";
within:2; distance:-10; metadata:ruleset community, service netbios-ssn;
classtype:protocol-command-decode; sid:3049; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
invalid SACL ace size dos attempt"; flow:stateless; content:"|00|"; depth:1;
content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,!&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:16; byte_jump:4,16,relative,little; content:"|00 00|"; within:2;
distance:-10; metadata:ruleset community; classtype:protocol-command-decode;
sid:3050; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
andx invalid SACL ace size dos attempt"; flow:stateless; content:"|00|"; depth:1;
content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:16; byte_jump:4,16,relative,little; content:"|00 00|";
within:2; distance:-10; metadata:ruleset community; classtype:protocol-command-
decode; sid:3051; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
unicode invalid SACL ace size dos attempt"; flow:stateless; content:"|00|";
depth:1; content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:16; byte_jump:4,16,relative,little; content:"|00 00|"; within:2;
distance:-10; metadata:ruleset community; classtype:protocol-command-decode;
sid:3052; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB NT Trans NT CREATE
unicode andx invalid SACL ace size dos attempt"; flow:stateless; content:"|00|";
depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:16; byte_jump:4,16,relative,little; content:"|00 00|";
within:2; distance:-10; metadata:ruleset community; classtype:protocol-command-
decode; sid:3053; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE invalid SACL ace size dos attempt"; flow:stateless; content:"|00|"; depth:1;
content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,!&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:16; byte_jump:4,16,relative,little; content:"|00 00|"; within:2;
distance:-10; metadata:ruleset community, service netbios-ssn; classtype:protocol-
command-decode; sid:3054; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE andx invalid SACL ace size dos attempt"; flow:stateless; content:"|00|";
depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; byte_test:1,!
&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:16; byte_jump:4,16,relative,little; content:"|00 00|";
within:2; distance:-10; metadata:ruleset community, service netbios-ssn;
classtype:protocol-command-decode; sid:3055; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE unicode invalid SACL ace size dos attempt"; flow:stateless; content:"|00|";
depth:1; content:"|FF|SMB|A0|"; within:5; distance:3; byte_test:1,&,128,6,relative;
pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:37; byte_jump:4,-
7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00 00|";
within:4; distance:16; byte_jump:4,16,relative,little; content:"|00 00|"; within:2;
distance:-10; metadata:ruleset community, service netbios-ssn; classtype:protocol-
command-decode; sid:3056; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS NT Trans NT
CREATE unicode andx invalid SACL ace size dos attempt"; flow:stateless; content:"|
00|"; depth:1; content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
byte_test:1,&,128,6,relative; content:"|A0|"; depth:1; offset:39;
byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:37;
byte_jump:4,-7,little,relative,from_beginning; pcre:"/^.{4}/R"; content:!"|00 00 00
00|"; within:4; distance:16; byte_jump:4,16,relative,little; content:"|00 00|";
within:2; distance:-10; metadata:ruleset community, service netbios-ssn;
classtype:protocol-command-decode; sid:3057; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP copy literal
overflow attempt"; flow:established,to_server; content:"COPY"; fast_pattern:only;
pcre:"/\sCOPY\s[^\n]*?\{/smi"; byte_test:5,>,1024,0,string,dec,relative;
metadata:ruleset community, service imap; reference:bugtraq,1110;
reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:3058;
rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 3632 (msg:"APP-DETECT distccd remote
command execution attempt"; flow:to_server,established; content:"DIST00000001";
depth:12; nocase; metadata:ruleset community;
reference:url,distcc.samba.org/security.html; classtype:policy-violation; sid:3061;
rev:5;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
NetScreen SA 5000 delhomepage.cgi access"; flow:to_server,established;
content:"/delhomepage.cgi"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:bugtraq,9791; reference:cve,2004-0347;
classtype:web-application-activity; sid:3062; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1020 (msg:"MALWARE-BACKDOOR Vampire 1.2
connection request"; flow:to_server,established; content:"Hello..."; depth:8;
flowbits:set,backdoor.vampire_12.connect; flowbits:noalert; metadata:ruleset
community; classtype:misc-activity; sid:3063; rev:6;)
# alert tcp $HOME_NET 1020 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR Vampire 1.2
connection confirmation"; flow:to_client,established;
flowbits:isset,backdoor.vampire_12.connect; content:"Vampire v1.2 Server On-
Line....."; depth:32; metadata:ruleset community; classtype:misc-activity;
sid:3064; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP append literal
overflow attempt"; flow:established,to_server; content:"APPEND"; fast_pattern:only;
pcre:"/\sAPPEND\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative;
metadata:ruleset community, service imap; reference:bugtraq,11775;
reference:cve,2004-1211; reference:nessus,15867; classtype:misc-attack; sid:3065;
rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP APPEND overflow
attempt"; flow:established,to_server; content:"APPEND"; nocase;
isdataat:256,relative; content:!"|0D 0A|"; within:256; metadata:policy max-detect-
ips drop, ruleset community, service imap; reference:bugtraq,11775;
reference:bugtraq,21729; reference:cve,2004-1211; reference:cve,2006-6425;
reference:nessus,15867; classtype:misc-attack; sid:3066; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP examine literal
overflow attempt"; flow:established,to_server; content:"EXAMINE";
fast_pattern:only; pcre:"/\sEXAMINE\s[^\n]*?\s\{/smi";
byte_test:5,>,256,0,string,dec,relative; metadata:ruleset community, service imap;
reference:bugtraq,11775; reference:cve,2004-1211; reference:nessus,15867;
classtype:misc-attack; sid:3067; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP fetch literal
overflow attempt"; flow:established,to_server; content:"FETCH"; fast_pattern:only;
pcre:"/\sFETCH\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative;
metadata:ruleset community, service imap; reference:bugtraq,11775;
reference:cve,2004-1211; reference:nessus,15867; classtype:misc-attack; sid:3069;
rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP fetch overflow
attempt"; flow:established,to_server; content:"FETCH"; nocase;
isdataat:256,relative; pcre:"/\sFETCH\s[^\n]{256}/smi"; metadata:ruleset community,
service imap; reference:bugtraq,11775; reference:cve,2004-1211;
reference:nessus,15867; classtype:misc-attack; sid:3070; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP status literal
overflow attempt"; flow:established,to_server; content:"STATUS"; fast_pattern:only;
pcre:"/\sSTATUS[^\n]*?\{/smi"; byte_test:5,>,256,0,string,dec,relative;
metadata:ruleset community, service imap; reference:bugtraq,11775;
reference:bugtraq,15491; reference:cve,2004-1211; reference:nessus,15867;
classtype:misc-attack; sid:3071; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP STATUS overflow
attempt"; flow:established,to_server; content:"STATUS"; nocase;
isdataat:100,relative; content:!"|0D 0A|"; within:100; metadata:policy max-detect-
ips drop, ruleset community, service imap; reference:bugtraq,11775;
reference:bugtraq,13727; reference:bugtraq,14243; reference:bugtraq,15491;
reference:cve,2004-1211; reference:cve,2005-1256; reference:cve,2005-2278;
reference:cve,2005-3314; reference:cve,2017-1274; reference:nessus,15867;
classtype:misc-attack; sid:3072; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP SUBSCRIBE
literal overflow attempt"; flow:established,to_server; content:"SUBSCRIBE";
fast_pattern:only; pcre:"/^\w+\s+SUBSCRIBE\s[^\n]*?\{/smi";
byte_test:5,>,256,0,relative,string; metadata:policy max-detect-ips drop, ruleset
community, service imap; reference:bugtraq,11775; reference:bugtraq,15488;
reference:bugtraq,23050; reference:bugtraq,26219; reference:cve,2004-1211;
reference:cve,2005-3189; reference:cve,2007-3510; reference:nessus,15867;
classtype:attempted-admin; sid:3073; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP SUBSCRIBE
overflow attempt"; flow:established,to_server; content:"SUBSCRIBE"; nocase;
isdataat:100; pcre:"/^\w+\s+SUBSCRIBE\s[^\n]{100}/smi"; metadata:policy max-detect-
ips drop, ruleset community, service imap; reference:bugtraq,11775;
reference:bugtraq,15488; reference:bugtraq,23050; reference:bugtraq,26219;
reference:cve,2004-1211; reference:cve,2005-3189; reference:cve,2007-1579;
reference:cve,2007-3510; reference:nessus,15867; classtype:attempted-admin;
sid:3074; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP unsubscribe
literal overflow attempt"; flow:established,to_server; content:"UNSUBSCRIBE";
fast_pattern:only; pcre:"/\sUNSUBSCRIBE\s[^\n]*?\s\{/smi";
byte_test:5,>,256,0,string,dec,relative; metadata:ruleset community, service imap;
reference:bugtraq,11775; reference:cve,2004-1211; reference:nessus,15867;
classtype:misc-attack; sid:3075; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"PROTOCOL-IMAP UNSUBSCRIBE
overflow attempt"; flow:established,to_server; content:"UNSUBSCRIBE"; nocase;
isdataat:100; pcre:"/^\w+\s+UNSUBSCRIBE\s[^\n]{100}/smi"; metadata:ruleset
community, service imap; reference:bugtraq,11775; reference:bugtraq,15488;
reference:cve,2004-1211; reference:cve,2005-3189; reference:nessus,15867;
classtype:attempted-admin; sid:3076; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP RNFR overflow
attempt"; flow:to_server,established; content:"RNFR"; nocase;
isdataat:200,relative; pcre:"/^RNFR\s[^\n]{200}/smi"; metadata:ruleset community,
service ftp; reference:bugtraq,14339; classtype:attempted-admin; sid:3077; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 119 (msg:"PROTOCOL-NNTP Microsoft
Windows SEARCH pattern overflow attempt"; flow:to_server,established;
content:"SEARCH|20|"; depth:7; nocase; isdataat:160,relative; pcre:"/^SEARCH\s+
[^\n]{160}/i"; metadata:ruleset community; reference:cve,2004-0574;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-036;
classtype:attempted-admin; sid:3078; rev:11;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"BROWSER-IE
Microsoft Internet Explorer ANI file parsing buffer overflow attempt";
flow:to_client,established; flowbits:isset,file.ani; file_data; content:"RIFF";
depth:4; content:"ACON"; within:4; distance:4; content:"anih"; distance:0; nocase;
byte_test:4,>,36,0,relative,little; metadata:policy max-detect-ips drop, ruleset
community, service ftp-data, service http, service imap, service pop3;
reference:cve,2004-1049; reference:cve,2007-0038; reference:cve,2007-1765;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-002;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-017;
classtype:attempted-user; sid:3079; rev:25;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 7787 (msg:"SERVER-OTHER Unreal
Tournament secure overflow attempt"; flow:to_server; content:"|5C|secure|5C|";
fast_pattern:only; pcre:"/\x5csecure\x5c[^\x00]{50}/smi"; metadata:ruleset
community; reference:bugtraq,10570; reference:cve,2004-0608; classtype:misc-attack;
sid:3080; rev:8;)
alert tcp $HOME_NET 5880 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR Y3KRAT 1.5
Connect"; flow:to_client,established; content:"connected"; depth:9;
flowbits:set,backdoor.y3krat_15.connect; flowbits:noalert; metadata:ruleset
community; classtype:misc-activity; sid:3081; rev:13;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 5880 (msg:"MALWARE-BACKDOOR Y3KRAT 1.5
Connect Client Response"; flow:to_server,established;
flowbits:isset,backdoor.y3krat_15.connect; content:"getclient"; depth:9;
flowbits:set,backdoor.y3krat_15.client.response; flowbits:noalert; metadata:ruleset
community; classtype:misc-activity; sid:3082; rev:13;)
# alert tcp $HOME_NET 5880 -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR Y3KRAT 1.5
Connection confirmation"; flow:to_client,established;
flowbits:isset,backdoor.y3krat_15.client.response; content:"client"; depth:7;
metadata:ruleset community; classtype:misc-activity; sid:3083; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 6101 (msg:"SERVER-OTHER Veritas backup
overflow attempt"; flow:to_server,established; content:"|02 00|"; depth:2;
content:"|00|"; within:1; distance:1; isdataat:72; content:!"|00|"; depth:66;
offset:6; metadata:policy max-detect-ips drop, ruleset community;
reference:bugtraq,11974; reference:cve,2004-1172; classtype:attempted-admin;
sid:3084; rev:15;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"SERVER-OTHER AOL
Instant Messenger goaway message buffer overflow attempt";
flow:to_client,established; file_data; content:"aim|3A|goaway?message="; nocase;
isdataat:500,relative; pcre:"/\x22aim\x3Agoaway\x3Fmessage\x3D[^\x22]
{500}|\x27aim\x3Agoaway\x3Fmessage\x3D[^\x27]{500}|
aim\x3Agoaway\x3Fmessage\x3D[^\s]{500}/i"; metadata:ruleset community, service
http; reference:bugtraq,10889; reference:cve,2004-0636; classtype:misc-attack;
sid:3085; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP 3Com
3CRADSL72 ADSL 11g Wireless Router app_sta.stm access attempt";
flow:to_server,established; content:"/app_sta.stm"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,11408;
reference:cve,2004-1596; classtype:web-application-activity; sid:3086; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-IIS w3who.dll
buffer overflow attempt"; flow:to_server,established; content:"/w3who.dll?";
nocase; http_uri; pcre:"/w3who\.dll\x3F[^\r\n]{519}/i"; metadata:policy max-detect-
ips drop, ruleset community, service http; reference:bugtraq,11820;
reference:cve,2004-1134; classtype:attempted-admin; sid:3087; rev:19;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-MULTIMEDIA
Nullsoft Winamp cda file name overflow attempt"; flow:to_client,established;
file_data; content:".cda"; nocase; pcre:"/(\x5c[^\x5c]{16,}|\x2f[^\x2f]
{16,})\.cda$/smi"; metadata:ruleset community, service http;
reference:bugtraq,11730; reference:cve,2004-1119; reference:nessus,15817;
classtype:attempted-user; sid:3088; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 2048 (msg:"SERVER-OTHER squid WCCP
I_SEE_YOU message overflow attempt"; flow:to_server; content:"|00 00 00 08|";
depth:4; byte_test:4,>,32,16; metadata:ruleset community; reference:bugtraq,12275;
reference:cve,2005-0095; classtype:attempted-user; sid:3089; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [139,445] (msg:"OS-WINDOWS DCERPC NCACN-
IP-TCP llsrpc LlsrConnect overflow attempt"; flow:to_server,established;
dce_iface:342cfd40-3c6c-11ce-a893-08002b2e9c6d; dce_opnum:0; dce_stub_data;
byte_test:4,>,52,0,dce; metadata:policy max-detect-ips drop, ruleset community,
service netbios-ssn; reference:bugtraq,12481; reference:cve,2005-0050;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms05-010;
classtype:attempted-admin; sid:3114; rev:19;)
# alert tcp $EXTERNAL_NET 1863 -> $HOME_NET any (msg:"PUA-OTHER Microsoft MSN
Messenger png overflow"; flow:to_client,established; content:"application/x-
msnmsgrp2p"; nocase; content:"|89|PNG|0D 0A 1A 0A|"; distance:0; content:"IHDR";
within:4; distance:4; content:"|03|"; within:1; distance:9; content:"tRNS";
distance:0; byte_test:4,>,256,-8,relative,big; metadata:ruleset community;
reference:bugtraq,10872; reference:cve,2004-0957;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-009;
classtype:attempted-user; sid:3130; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
mailman directory traversal attempt"; flow:to_server,established;
content:"/mailman/"; http_uri; content:".../"; http_raw_uri; metadata:ruleset
community, service http; reference:cve,2005-0202; classtype:web-application-attack;
sid:3131; rev:10;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IMAGE
Microsoft and libpng multiple products PNG large image width overflow attempt";
flow:to_client,established; flowbits:isset,file.png; file_data; content:"|89|PNG|0D
0A 1A 0A|"; content:"IHDR"; within:8; byte_test:4,>,32767,0,relative;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; reference:bugtraq,11523; reference:cve,2004-0990; reference:cve,2004-1244;
reference:cve,2007-5503; reference:url,sourceforge.net/p/png-
mng/mailman/message/33173462/; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS05-009; classtype:attempted-user; sid:3132; rev:15;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IMAGE
Microsoft Multiple Products PNG large image height download attempt";
flow:to_client,established; flowbits:isset,file.png; file_data; content:"|89|PNG|0D
0A 1A 0A|"; content:"IHDR"; within:8; byte_test:4,>,32767,4,relative;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; reference:bugtraq,11481; reference:bugtraq,11523; reference:cve,2004-0599;
reference:cve,2004-0990; reference:cve,2004-1244; reference:cve,2007-5503;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-009;
classtype:attempted-user; sid:3133; rev:15;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IMAGE
Microsoft PNG large colour depth download attempt"; flow:to_client,established;
flowbits:isset,file.png; file_data; content:"|89|PNG|0D 0A 1A 0A|"; content:"IHDR";
within:8; byte_test:1,>,16,8,relative; metadata:ruleset community, service ftp-
data, service http, service imap, service pop3; reference:bugtraq,11523;
reference:cve,2004-0990; reference:cve,2004-1244;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-009;
classtype:attempted-user; sid:3134; rev:14;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB Trans2
QUERY_FILE_INFO attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB2"; within:5; distance:3; pcre:"/^.{27}/R"; content:"|07 00|";
within:2; distance:29; flowbits:set,smb.trans2; flowbits:noalert; metadata:ruleset
community, service netbios-ssn; classtype:protocol-command-decode; sid:3135;
rev:10;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB Trans2
QUERY_FILE_INFO andx attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; content:"2"; depth:1;
offset:39; byte_jump:2,0,little,relative; content:"|07 00|"; within:2; distance:29;
flowbits:set,smb.trans2; flowbits:noalert; metadata:ruleset community, service
netbios-ssn; classtype:protocol-command-decode; sid:3136; rev:10;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS Trans2
QUERY_FILE_INFO attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB2"; within:5; distance:3; pcre:"/^.{27}/R"; content:"|07 00|";
within:2; distance:29; flowbits:set,smb.trans2; flowbits:noalert; metadata:ruleset
community, service netbios-ssn; classtype:protocol-command-decode; sid:3137;
rev:10;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS Trans2
QUERY_FILE_INFO andx attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; content:"2"; depth:1;
offset:39; byte_jump:2,0,little,relative; content:"|07 00|"; within:2; distance:29;
flowbits:set,smb.trans2; flowbits:noalert; metadata:ruleset community, service
netbios-ssn; classtype:protocol-command-decode; sid:3138; rev:10;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB Trans2 FIND_FIRST2
attempt"; flow:established,to_server; content:"|00|"; depth:1; content:"|FF|SMB2";
within:5; distance:3; pcre:"/^.{27}/R"; content:"|01 00|"; within:2; distance:29;
flowbits:set,smb.trans2; flowbits:noalert; metadata:ruleset community, service
netbios-ssn; classtype:protocol-command-decode; sid:3139; rev:10;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"NETBIOS SMB Trans2 FIND_FIRST2
andx attempt"; flow:established,to_server; content:"|00|"; depth:1; content:"|FF|
SMB"; within:4; distance:3; pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR";
content:"2"; depth:1; offset:39; byte_jump:2,0,little,relative; content:"|01 00|";
within:2; distance:29; flowbits:set,smb.trans2; flowbits:noalert; metadata:ruleset
community, service netbios-ssn; classtype:protocol-command-decode; sid:3140;
rev:10;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS Trans2
FIND_FIRST2 attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB2"; within:5; distance:3; pcre:"/^.{27}/R"; content:"|01 00|";
within:2; distance:29; flowbits:set,smb.trans2; flowbits:noalert; metadata:ruleset
community, service netbios-ssn; classtype:protocol-command-decode; sid:3141;
rev:10;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB-DS Trans2
FIND_FIRST2 andx attempt"; flow:established,to_server; content:"|00|"; depth:1;
content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; content:"2"; depth:1;
offset:39; byte_jump:2,0,little,relative; content:"|01 00|"; within:2; distance:29;
flowbits:set,smb.trans2; flowbits:noalert; metadata:ruleset community, service
netbios-ssn; classtype:protocol-command-decode; sid:3142; rev:10;)
# alert tcp $HOME_NET 139 -> $EXTERNAL_NET any (msg:"OS-WINDOWS Microsoft Windows
SMB Trans2 FIND_FIRST2 command response overflow attempt";
flow:to_client,established; flowbits:isset,smb.trans2; content:"|00|"; depth:1;
content:"|FF|SMB2"; within:5; distance:3; pcre:"/^.{27}/R";
flowbits:unset,smb.trans2; byte_test:2,>,15,7,relative,little; metadata:policy max-
detect-ips drop, ruleset community; reference:bugtraq,12484; reference:cve,2005-
0045; reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-011;
classtype:protocol-command-decode; sid:3143; rev:17;)
# alert tcp $HOME_NET 139 -> $EXTERNAL_NET any (msg:"OS-WINDOWS Microsoft Windows
SMB Trans2 FIND_FIRST2 response andx overflow attempt"; flow:to_client,established;
flowbits:isset,smb.trans2; content:"|00|"; depth:1; content:"|FF|SMB"; within:4;
distance:3; pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; content:"2";
depth:1; offset:39; byte_jump:2,0,little,relative; flowbits:unset,smb.trans2;
byte_test:2,>,15,7,relative,little; metadata:policy max-detect-ips drop, ruleset
community; reference:bugtraq,12484; reference:cve,2005-0045;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-011;
classtype:protocol-command-decode; sid:3144; rev:17;)
# alert tcp $HOME_NET 445 -> $EXTERNAL_NET any (msg:"OS-WINDOWS Microsoft Windows
SMB-DS Trans2 FIND_FIRST2 response overflow attempt"; flow:to_client,established;
flowbits:isset,smb.trans2; content:"|00|"; depth:1; content:"|FF|SMB2"; within:5;
distance:3; pcre:"/^.{27}/R"; flowbits:unset,smb.trans2;
byte_test:2,>,15,7,relative,little; metadata:policy max-detect-ips drop, ruleset
community, service netbios-ssn; reference:bugtraq,12484; reference:cve,2005-0045;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-011;
classtype:protocol-command-decode; sid:3145; rev:16;)
# alert tcp $HOME_NET 445 -> $EXTERNAL_NET any (msg:"OS-WINDOWS Microsoft Windows
SMB-DS Trans2 FIND_FIRST2 response andx overflow attempt";
flow:to_client,established; flowbits:isset,smb.trans2; content:"|00|"; depth:1;
content:"|FF|SMB"; within:4; distance:3;
pcre:"/^(\x75|\x2d|\x2f|\x73|\xa2|\x2e|\x24|\x74)/sR"; content:"2"; depth:1;
offset:39; byte_jump:2,0,little,relative; flowbits:unset,smb.trans2;
byte_test:2,>,15,7,relative,little; metadata:policy max-detect-ips drop, ruleset
community, service netbios-ssn; reference:bugtraq,12484; reference:cve,2005-0045;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-011;
classtype:protocol-command-decode; sid:3146; rev:18;)
alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"PROTOCOL-TELNET login
buffer overflow attempt"; flow:to_server,established; content:"|FF FA|'|00 00|
TTYPROMPT|01|"; fast_pattern:only; rawbytes; flowbits:set,ttyprompt;
metadata:ruleset community, service telnet; reference:bugtraq,3681;
reference:cve,2001-0797; reference:nessus,10827; classtype:attempted-admin;
sid:3147; rev:14;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"OS-WINDOWS Microsoft
Windows HTML Help hhctrl.ocx clsid access attempt"; flow:to_client,established;
file_data; content:"clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11"; fast_pattern:only;
metadata:ruleset community, service http; reference:bugtraq,11467;
reference:bugtraq,4857; reference:bugtraq,5874; reference:cve,2002-0693;
reference:cve,2002-0823; reference:cve,2004-1043;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS02-055;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-001;
reference:url,www.ngssoftware.com/advisories/ms-winhlp.txt; classtype:attempted-
user; sid:3148; rev:20;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"BROWSER-IE Microsoft
Internet Explorer 5/6 object type overflow attempt"; flow:to_client,established;
file_data; content:"<OBJECT"; nocase; pcre:"/<OBJECT\s+
[^>]*type\s*=[\x22\x27]\x2f{32}/smi"; metadata:ruleset community, service http;
reference:cve,2003-0344; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS03-020; classtype:attempted-user; sid:3149; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-IIS SQLXML
content type overflow"; flow:to_server,established; pcre:"/\.x[sm]l/Ui";
content:"contenttype="; http_uri; pcre:"/contenttype=[^\r\n\x3b\x38]{100}/smiU";
metadata:ruleset community, service http; reference:bugtraq,5004;
reference:cve,2002-0186; reference:nessus,11304;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS02-030;
reference:url,www.westpoint.ltd.uk/advisories/wp-02-0007.txt; classtype:attempted-
admin; sid:3150; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 79 (msg:"PROTOCOL-FINGER / execution
attempt"; flow:to_server,established; content:"/"; pcre:"/^\x2f/smi";
metadata:ruleset community; reference:cve,1999-0612; reference:cve,2000-0915;
classtype:attempted-recon; sid:3151; rev:8;)
# alert tcp $SQL_SERVERS 1433 -> $EXTERNAL_NET any (msg:"SQL sa brute force failed
login attempt"; flow:to_client,established,no_stream; content:"Login failed for
user 'sa'"; fast_pattern:only; detection_filter:track by_src, count 5, seconds 2;
metadata:ruleset community; reference:bugtraq,4797; reference:cve,2000-1209;
reference:nessus,10673; classtype:unsuccessful-user; sid:3152; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS TCP inverse query
overflow"; flow:to_server,established; byte_test:1,<,16,4; byte_test:1,&,8,4;
isdataat:400; metadata:ruleset community, service dns; reference:bugtraq,134;
reference:cve,1999-0009; classtype:attempted-admin; sid:3153; rev:9;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS UDP inverse query
overflow"; flow:to_server; isdataat:400; byte_test:1,<,16,2; byte_test:1,&,8,2;
metadata:ruleset community, service dns; reference:bugtraq,134; reference:cve,1999-
0009; classtype:attempted-admin; sid:3154; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 31337 (msg:"MALWARE-BACKDOOR BackOrifice
2000 Inbound Traffic"; flow:to_server,established; content:"1j|D0 D9|";
metadata:ruleset community; classtype:trojan-activity; sid:3155; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [135,139,445,593,1024:] (msg:"OS-WINDOWS
DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile attempt";
flow:to_server,established; dce_iface:000001a0-0000-0000-c000-000000000046;
dce_opnum:1; dce_stub_data; content:"|01 10 08 00 CC CC CC CC|"; content:"|5C 00 5C
00|"; distance:0; byte_test:4,>,256,-8,relative,dce; metadata:ruleset community,
service netbios-ssn; reference:cve,2003-0715;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms03-039;
classtype:protocol-command-decode; sid:3158; rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET [135,1024:] (msg:"OS-WINDOWS DCERPC
NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile attempt"; dce_iface:000001a0-
0000-0000-c000-000000000046; dce_opnum:1; dce_stub_data; content:"|01 10 08 00 CC
CC CC CC|"; content:"|5C 00 5C 00|"; distance:0; byte_test:4,>,256,-8,relative,dce;
metadata:ruleset community, service dcerpc; reference:cve,2003-0715;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms03-039;
classtype:protocol-command-decode; sid:3159; rev:16;)
# alert udp $EXTERNAL_NET any -> $HOME_NET [135,1024:] (msg:"OS-WINDOWS DCERPC
NCADG-IP-UDP msqueue function 4 overflow attempt"; dce_iface:975201B0-59CA-11D0-
A8D5-00A0C90D8051; dce_opnum:4; dce_stub_data; byte_test:4,>,128,8,dce;
metadata:policy max-detect-ips drop, ruleset community, service dcerpc;
reference:cve,2005-0059; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS05-017; classtype:attempted-admin; sid:3171; rev:15;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"OS-WINDOWS Microsoft
Windows Media Player directory traversal via Content-Disposition attempt";
flow:to_client,established; content:".wmz"; fast_pattern; nocase; http_header;
content:"Content-Disposition|3A|"; nocase; http_header; content:"filename=";
nocase; http_header;
pcre:"/filename=[^\x3b\x3a\r\n]*(\x25\x2e\x25\x2e\x25\x5c|\x25\x32\x65\x25\x35\x63|
\x2e\x2e\x5c)[^\x3b\x3a\r\n]*\x2ewmz/smiH"; metadata:ruleset community, service
http; reference:bugtraq,7517; reference:cve,2003-0228; reference:nessus,11595;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-017;
classtype:attempted-user; sid:3192; rev:19;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS .cmd
executable file parsing attack"; flow:to_server,established; content:".cmd|22|";
nocase; http_uri; pcre:"/\x2ecmd\x22.*?\x26/smUi"; metadata:ruleset community,
service http; reference:bugtraq,1912; reference:cve,2000-0886; classtype:web-
application-attack; sid:3193; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-IIS .bat
executable file parsing attack"; flow:to_server,established; content:".bat|22|";
nocase; http_uri; pcre:"/\x2ebat\x22.*?\x26/Usmi"; metadata:ruleset community,
service http; reference:bugtraq,1912; reference:cve,2000-0886; classtype:web-
application-attack; sid:3194; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 137 (msg:"OS-WINDOWS name query overflow
attempt TCP"; flow:to_server,established; byte_test:1,&,64,2; content:" ";
offset:12; isdataat:56,relative; metadata:ruleset community, service netbios-ns;
reference:bugtraq,9624; reference:cve,2003-0825; reference:nessus,15912;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms04-006;
classtype:attempted-admin; sid:3195; rev:10;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 137 (msg:"OS-WINDOWS name query overflow
attempt UDP"; byte_test:1,&,64,2; content:" "; offset:12; isdataat:56,relative;
metadata:ruleset community, service netbios-ns; reference:bugtraq,9624;
reference:cve,2003-0825; reference:nessus,15912;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms04-006;
classtype:attempted-admin; sid:3196; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 42 (msg:"OS-WINDOWS Microsoft Windows
WINS name query overflow attempt TCP"; flow:established; byte_test:1,&,64,2;
content:" "; offset:12; isdataat:56,relative; metadata:ruleset community;
reference:bugtraq,9624; reference:cve,2003-0825; reference:nessus,15912;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-006;
classtype:attempted-admin; sid:3199; rev:11;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 42 (msg:"OS-WINDOWS Microsoft Windows
WINS name query overflow attempt UDP"; flow:to_server; byte_test:1,&,64,2;
content:" "; offset:12; isdataat:56,relative; metadata:ruleset community;
reference:bugtraq,9624; reference:cve,2003-0825; reference:nessus,15912;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-006;
classtype:attempted-admin; sid:3200; rev:12;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-IIS
httpodbc.dll access - nimda"; flow:to_server,established; content:"/httpodbc.dll";
nocase; http_uri; metadata:ruleset community, service http; reference:bugtraq,2708;
reference:cve,2001-0333; classtype:web-application-activity; sid:3201; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [139,445] (msg:"OS-WINDOWS DCERPC NCACN-
IP-TCP winreg OpenKey overflow attempt"; flow:to_server,established;
dce_iface:338cd001-2244-31f1-aaaa-900038001003; dce_opnum:15; dce_stub_data;
byte_test:2,>,1024,20,dce; metadata:ruleset community, service netbios-ssn;
reference:bugtraq,1331; reference:cve,2000-0377;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms00-040;
classtype:attempted-admin; sid:3218; rev:23;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 135 (msg:"OS-WINDOWS Messenger message
little endian overflow attempt"; content:"|04 00|"; depth:2;
byte_test:1,&,16,2,relative; content:"|F8 91|{Z|00 FF D0 11 A9 B2 00 C0|O|B6 E6
FC|"; within:16; distance:22; content:"|00 00|"; within:2; distance:28;
byte_jump:4,18,little,align,relative; byte_jump:4,8,little,align,relative;
byte_test:4,>,1024,8,little,relative; metadata:ruleset community;
reference:bugtraq,8826; reference:cve,2003-0717; classtype:attempted-admin;
sid:3234; rev:5;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 135 (msg:"OS-WINDOWS Messenger message
overflow attempt"; content:"|04 00|"; depth:2; byte_test:1,!&,16,2,relative;
content:"|F8 91|{Z|00 FF D0 11 A9 B2 00 C0|O|B6 E6 FC|"; within:16; distance:22;
content:"|00 00|"; within:2; distance:28; byte_jump:4,18,align,relative;
byte_jump:4,8,align,relative; byte_test:4,>,1024,8,relative; metadata:ruleset
community; reference:bugtraq,8826; reference:cve,2003-0717; classtype:attempted-
admin; sid:3235; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [135,593,1024:] (msg:"OS-WINDOWS DCERPC
NCACN-IP-TCP irot IrotIsRunning/Revoke overflow attempt";
flow:to_server,established; dce_iface:b9e79e60-3d52-11ce-aaa1-00006901293f;
dce_opnum:1,2; dce_stub_data; pcre:"/^(\x00\x00\x00\x00|.{12})/s"; byte_jump:4,-
4,relative,align,dce; byte_test:4,>,1024,0,relative,dce; metadata:ruleset
community; reference:bugtraq,6005; reference:cve,2002-1561;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms03-010;
classtype:attempted-admin; sid:3238; rev:15;)
# alert udp $EXTERNAL_NET any -> $HOME_NET [135,1024:] (msg:"OS-WINDOWS DCERPC
NCADG-IP-UDP irot IrotIsRunning/Revoke overflow attempt"; dce_iface:b9e79e60-3d52-
11ce-aaa1-00006901293f; dce_opnum:1,2; dce_stub_data; pcre:"/^(\x00\x00\x00\x00|.
{12})/s"; byte_jump:4,-4,relative,align,dce; byte_test:4,>,1024,0,relative,dce;
metadata:ruleset community; reference:bugtraq,6005; reference:cve,2002-1561;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms03-010;
classtype:attempted-admin; sid:3239; rev:14;)
# alert tcp $SQL_SERVERS 1433 -> $EXTERNAL_NET any (msg:"SQL sa brute force failed
login unicode attempt"; flow:to_client,established,no_stream; content:"L|00|o|00|g|
00|i|00|n|00| |00|f|00|a|00|i|00|l|00|e|00|d|00| |00|f|00|o|00|r|00| |00|u|00|s|00|
e|00|r|00| |00|'|00|s|00|a|00|'|00|"; detection_filter:track by_src, count 5,
seconds 2; metadata:ruleset community; reference:bugtraq,4797; reference:cve,2000-
1209; reference:nessus,10673; classtype:unsuccessful-user; sid:3273; rev:9;)
alert tcp $EXTERNAL_NET any -> $TELNET_SERVERS 23 (msg:"PROTOCOL-TELNET login
buffer non-evasive overflow attempt"; flow:to_server,established; content:"|FF
FA|'|00 00|"; rawbytes; pcre:"/T.*?T.*?Y.*?P.*?R.*?O.*?M.*?P.*?T/RBi";
flowbits:set,ttyprompt; metadata:ruleset community, service telnet;
reference:bugtraq,3681; reference:cve,2001-0797; reference:nessus,10827;
classtype:attempted-admin; sid:3274; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [135,139,445,593,1024:] (msg:"OS-WINDOWS
DCERPC NCACN-IP-TCP ISystemActivator RemoteCreateInstance attempt";
flow:to_server,established; dce_iface:000001a0-0000-0000-c000-000000000046;
dce_opnum:4; dce_stub_data; content:"|01 10 08 00 CC CC CC CC|"; content:"|5C 00 5C
00|"; distance:0; byte_test:4,>,256,-8,relative,dce; metadata:ruleset community,
service netbios-ssn; reference:bugtraq,8205; reference:cve,2003-0352;
reference:cve,2003-0715; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS03-026; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS03-039; classtype:protocol-command-decode; sid:3397;
rev:17;)
# alert udp $EXTERNAL_NET any -> $HOME_NET [135,1024:] (msg:"OS-WINDOWS DCERPC
NCADG-IP-UDP ISystemActivator RemoteCreateInstance attempt"; dce_iface:000001a0-
0000-0000-c000-000000000046; dce_opnum:4; dce_stub_data; content:"|01 10 08 00 CC
CC CC CC|"; content:"|5C 00 5C 00|"; distance:0; byte_test:4,>,256,-8,relative,dce;
metadata:ruleset community, service dcerpc; reference:bugtraq,8205;
reference:cve,2003-0352; reference:cve,2003-0715;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-026;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-039;
classtype:protocol-command-decode; sid:3398; rev:16;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [135,139,445,593,1024:] (msg:"OS-WINDOWS
DCERPC NCACN-IP-TCP IActivation remoteactivation overflow attempt";
flow:to_server,established; dce_iface:4d9f4ab8-7d1c-11cf-861e-0020af6e7c57;
dce_opnum:0; dce_stub_data; byte_test:4,>,256,52,dce; metadata:ruleset community,
service dcerpc, service netbios-ssn; reference:bugtraq,8205; reference:cve,2003-
0352; reference:cve,2003-0528; reference:cve,2003-0715;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-026;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-039;
classtype:attempted-admin; sid:3409; rev:17;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP PORT bounce
attempt"; flow:to_server,established; content:"PORT"; nocase; ftpbounce;
pcre:"/^PORT/smi"; metadata:policy max-detect-ips drop, ruleset community, service
ftp; reference:bugtraq,126; reference:cve,1999-0017; reference:nessus,10081;
classtype:misc-attack; sid:3441; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 515 (msg:"OS-WINDOWS Microsoft Windows
TCP print service overflow attempt"; flow:to_server,established;
pcre:"/^(\x03|\x04|\x05)/s"; content:"|00|"; within:497; content:"|0A|";
within:497; metadata:ruleset community; reference:bugtraq,1082; reference:cve,2000-
0232; reference:url,technet.microsoft.com/en-us/security/bulletin/MS00-021;
classtype:attempted-dos; sid:3442; rev:11;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 617 (msg:"SERVER-OTHER Arkeia client
backup system info probe"; flow:to_server,established; content:"ARKADMIN_GET_";
pcre:"/^(CLIENT|MACHINE)_INFO/Ri"; metadata:policy max-detect-ips drop, ruleset
community; reference:bugtraq,12594; reference:cve,2005-0491; classtype:attempted-
recon; sid:3453; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 617 (msg:"SERVER-OTHER Arkeia client
backup generic info probe"; flow:to_server,established; content:"ARKFS|00|root|00|
root"; fast_pattern:only; metadata:policy max-detect-ips drop, ruleset community;
reference:bugtraq,12594; reference:cve,2005-0491; classtype:attempted-recon;
sid:3454; rev:8;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 5001 (msg:"SERVER-OTHER Bontago Game
Server Nickname buffer overflow"; flow:to_server,established; content:"|FF 01 00 00
00 00 01|"; isdataat:512,relative; metadata:ruleset community;
reference:bugtraq,12603; reference:cve,2005-0501;
reference:url,aluigi.altervista.org/adv/bontagobof-adv.txt; classtype:attempted-
user; sid:3455; rev:7;)
# alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"SERVER-MYSQL 4.0 root
login attempt"; flow:to_server,established; content:"|01|"; depth:1; offset:3;
content:"root|00|"; within:5; distance:5; nocase; metadata:ruleset community,
service mysql; classtype:protocol-command-decode; sid:3456; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 617 (msg:"SERVER-OTHER Arkeia backup
client type 77 overflow attempt"; flow:to_server,established; content:"|00|M";
depth:2; byte_test:2,>,23,6; metadata:policy max-detect-ips drop, ruleset
community; reference:bugtraq,12594; reference:cve,2005-0491;
reference:nessus,17158; classtype:attempted-user; sid:3457; rev:13;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 617 (msg:"SERVER-OTHER Arkeia backup
client type 84 overflow attempt"; flow:to_server,established; content:"|00|T";
depth:2; byte_test:2,>,255,6; isdataat:263; content:!"|00|"; depth:255; offset:8;
metadata:policy max-detect-ips drop, ruleset community; reference:bugtraq,12594;
reference:cve,2005-0491; classtype:attempted-user; sid:3458; rev:8;)
# alert udp $HOME_NET any -> $EXTERNAL_NET 41170 (msg:"PUA-P2P Manolito Search
Query"; flow:to_server; content:"|01 02 00 14|"; depth:4; offset:16;
metadata:ruleset community; reference:url,openlito.sourceforge.net;
reference:url,www.blubster.com; classtype:policy-violation; sid:3459; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP REST with numeric
argument"; flow:to_server,established; content:"REST"; fast_pattern:only;
pcre:"/REST\s+[0-9]+\n/i"; metadata:ruleset community, service ftp;
reference:bugtraq,7825; classtype:attempted-recon; sid:3460; rev:9;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-MAIL Content-Type
overflow attempt"; flow:to_server,established; content:"Content-Type"; nocase;
content:"|3A|"; distance:0; pcre:"/^\s*Content-Type\s*\x3A\s*[^\r\n]{300}/mi";
metadata:policy max-detect-ips drop, ruleset community, service smtp;
reference:bugtraq,44732; reference:bugtraq,7419; reference:cve,2003-0113;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-015;
classtype:attempted-admin; sid:3461; rev:18;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"BROWSER-IE Microsoft
Internet Explorer Content-Encoding overflow attempt"; flow:to_server,established;
content:"Content-Encoding"; nocase; content:"|3A|"; distance:0; pcre:"/^\s*Content-
Encoding\s*\x3A\s*[^\r\n]{300}/mi"; metadata:ruleset community, service smtp;
reference:bugtraq,7419; reference:cve,2003-0113;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS03-015;
classtype:attempted-admin; sid:3462; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
awstats access"; flow:to_server,established; content:"/awstats.pl";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,12572; reference:nessus,16456; classtype:web-application-
activity; sid:3463; rev:14;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
awstats.pl command execution attempt"; flow:to_server,established;
content:"/awstats.pl?"; fast_pattern; nocase; http_uri; content:"update=";
http_uri; pcre:"/update=[^\r\n\x26]+/Ui"; content:"logfile="; nocase; http_uri;
pcre:"/awstats.pl?[^\r\n]*logfile=\x7C/Ui"; metadata:ruleset community, service
http; reference:bugtraq,12572; reference:nessus,16456; classtype:web-application-
attack; sid:3464; rev:12;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE
Microsoft Windows RTF file with embedded object package download attempt";
flow:to_client,established; file_data; content:"{|5C|rt"; nocase; content:"{|5C|
object|5C|objemb{|5C|*|5C|objclass Package}"; distance:0; nocase;
flowbits:set,file.rtf.embed; metadata:policy max-detect-ips alert, ruleset
community, service ftp-data, service http, service imap, service pop3;
reference:cve,2006-4692; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms06-065; classtype:misc-activity; sid:8445; rev:16;)
# alert udp $EXTERNAL_NET any -> $SIP_SERVERS $SIP_PORTS (msg:"PROTOCOL-VOIP
inbound INVITE message"; flow:to_server; content:"INVITE"; fast_pattern:only;
sip_method:invite; metadata:ruleset community, service sip;
reference:url,www.ietf.org/rfc/rfc3261.txt; classtype:protocol-command-decode;
sid:11968; rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY RTF file
download request"; flow:to_server,established; content:".rtf"; fast_pattern:only;
http_uri; pcre:"/\x2ertf([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.rtf;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/Rich_Text_Format; classtype:misc-activity;
sid:13801; rev:23;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY PDF file
download request"; flow:to_server,established; content:".pdf"; fast_pattern:only;
http_uri; pcre:"/\x2epdf([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.pdf;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/Pdf; classtype:misc-activity; sid:15013;
rev:20;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY Microsoft
Office Word file download request"; flow:to_server,established; content:".doc";
fast_pattern:only; http_uri; pcre:"/\x2edoc([\?\x5c\x2f]|$)/smiU";
flowbits:set,file.doc; flowbits:set,file.rtf; flowbits:noalert; metadata:ruleset
community, service http; reference:url,en.wikipedia.org/wiki/Microsoft_word;
classtype:misc-activity; sid:15587; rev:22;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY BMP file
download request"; flow:to_server,established; content:".bmp"; fast_pattern:only;
http_uri; pcre:"/\x2ebmp([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.bmp;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/BMP_file_format; classtype:misc-activity;
sid:16205; rev:20;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.Hydraq
variant outbound connection"; flow:to_server,established; content:"|FF FF FF FF FF
FF 00 00 FE FF FF FF FF FF FF FF FF FF 88 FF|"; depth:20; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service ssl;
reference:url,www.virustotal.com/#/file/9051f618a5a8253a003167e65ce1311fa91a8b70d43
8a384be48b02e73ba855c/detection; classtype:trojan-activity; sid:16368; rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY JPEG file
download request"; flow:to_server,established; content:".jpg"; fast_pattern:only;
http_uri; pcre:"/\x2ejpg([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.jpeg;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/Jpg; classtype:misc-activity; sid:16406;
rev:17;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY JPEG file
download request"; flow:to_server,established; content:".jpeg"; fast_pattern:only;
http_uri; pcre:"/\x2ejpeg([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.jpeg;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/Jpg; classtype:misc-activity; sid:16407;
rev:17;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY Portable
Executable binary file download request"; flow:to_server,established;
content:".exe"; fast_pattern:only; http_uri; pcre:"/\x2eexe([\?\x5c\x2f]|$)/smiU";
flowbits:set,file.exe; flowbits:noalert; metadata:policy max-detect-ips alert,
ruleset community, service http; reference:url,en.wikipedia.org/wiki/.exe;
classtype:misc-activity; sid:16425; rev:24;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
Microsoft Compound File Binary v3 file magic detected"; flow:to_client,established;
file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; content:">|00 03 00|"; within:4;
distance:16; flowbits:set,file.ole; flowbits:noalert; metadata:ruleset community,
service ftp-data, service http, service imap, service pop3; classtype:misc-
activity; sid:16474; rev:24;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
Microsoft Compound File Binary v4 file magic detected"; flow:to_client,established;
file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; content:">|00 04 00|"; within:4;
distance:16; flowbits:set,file.oless.v4; flowbits:noalert; metadata:policy max-
detect-ips alert, ruleset community, service ftp-data, service http, service imap,
service pop3; classtype:misc-activity; sid:16475; rev:18;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY JPEG file
download request"; flow:to_server,established; content:".pjpeg"; fast_pattern:only;
http_uri; pcre:"/\x2epjpeg([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.jpeg;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/Jpg; classtype:misc-activity; sid:16529;
rev:17;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY OLE
document file magic detected"; flow:to_client,established; file_data; content:"|D0
CF 11 E0 A1 B1 1A E1|"; depth:8; flowbits:set,file.ole; flowbits:set,file.fpx;
flowbits:noalert; metadata:ruleset community, service ftp-data, service http,
service imap, service pop3; classtype:misc-activity; sid:17314; rev:24;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY PNG file
download request"; flow:to_server,established; content:".png"; fast_pattern:only;
http_uri; pcre:"/\x2epng([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.png;
flowbits:noalert; metadata:ruleset community, service http; classtype:misc-
activity; sid:17380; rev:20;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY XML file
download request"; flow:to_server,established; content:".xml"; fast_pattern:only;
http_uri; pcre:"/\x2exml([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.xml;
flowbits:noalert; metadata:ruleset community, service http; classtype:misc-
activity; sid:17733; rev:15;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 445 (msg:"NETBIOS SMB TRANS2 Find_First2
request attempt"; flow:to_server,established; content:"|FF|SMB2|00 00 00 00|";
depth:9; offset:4; content:"|00 00|"; within:2; distance:13; content:"|00|";
within:1; distance:18; content:"|00 00|"; within:2; distance:6; content:"|01 00|";
within:2; distance:10; flowbits:set,smb.trans2.findfirst2; flowbits:noalert;
metadata:ruleset community, service netbios-ssn; classtype:protocol-command-decode;
sid:17745; rev:8;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 445 (msg:"NETBIOS SMB-DS Trans2
Distributed File System GET_DFS_REFERRAL request"; flow:established,to_server;
content:"|00|"; offset:1; content:"|FF|SMB2"; depth:5; offset:4; content:"|00 00 00
00|"; within:4; content:"|10 00|"; depth:2; offset:65;
flowbits:set,smb.trans2.get_dfs_referral; flowbits:noalert; metadata:ruleset
community, service netbios-ssn; classtype:protocol-command-decode; sid:19190;
rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY ZIP
archive file download request"; flow:to_server,established; content:".zip";
fast_pattern:only; http_uri; pcre:"/\x2ezip([\?\x5c\x2f]|$)/smiU";
flowbits:set,file.zip; flowbits:noalert; metadata:ruleset community, service http;
classtype:misc-activity; sid:19211; rev:20;)
# alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"SERVER-OTHER multiple
products blacknurse ICMP denial of service attempt"; icode:3; itype:3;
detection_filter:track by_src,count 250,seconds 1; metadata:ruleset community;
reference:cve,2011-1871; reference:url,soc.tdc.dk/blacknurse/blacknurse.pdf;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-064;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-083;
classtype:attempted-dos; sid:19678; rev:9;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 12080 (msg:"MALWARE-CNC
Win.Trojan.Derusbi.A variant outbound connection"; flow:to_server,established;
content:"|00 00 00 01 00 00 00|"; depth:7; offset:1; content:"|01 00 00 00 68 01 00
00|"; within:8; distance:8; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/6fecd042c3c0b54e7354cd8dfb1975c626acd8df55
f88c4149462e15e77918b0/analysis/;
reference:url,www.virustotal.com/en/file/705404d6bbf6dae254e2d3bc44eca239976be7f0dc
4d49fe93b0fb1d1c2704fe/analysis/; classtype:trojan-activity; sid:20080; rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Injector variant outbound connection"; flow:to_server,established;
content:"User-Agent|3A| Opera|5C|9.64|0A|"; fast_pattern:only; http_header;
content:"bb.php?v="; http_uri; content:"id="; distance:0; http_uri; content:"b=";
distance:0; http_uri; content:"tm="; distance:0; http_uri; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/2afb098dfea7d2acd73da520fe26d09acee1449c79
d2c8753f3008a2a8f648b2/analysis/; classtype:trojan-activity; sid:20221; rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY SMI file
download request"; flow:to_server,established; content:".smi"; fast_pattern:only;
http_uri; pcre:"/\x2esmi([\?\x5c\x2f]|$)/smiU";
flowbits:set,file.realplayer.playlist; flowbits:set,file.smi;
flowbits:set,file.dmg; flowbits:noalert; metadata:ruleset community, service http;
reference:bugtraq,49149; reference:url,en.wikipedia.org/wiki/SAMI; classtype:misc-
activity; sid:20223; rev:22;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY Microsoft
Client Agent Helper JAR file download request"; flow:to_server,established;
content:"_helper.jar"; fast_pattern:only; pcre:"/agent_(win|lin|
mac)_helper\.jar$/siU"; flowbits:set,file.jar.agent_helper; flowbits:noalert;
metadata:ruleset community, service http; reference:cve,2011-1969;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-079;
classtype:misc-activity; sid:20260; rev:17;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
JAR/ZIP file magic detected"; flow:to_client,established; file_data; content:"PK|03
04|"; content:!"|14 00 06 00|"; within:4; flowbits:set,file.zip;
flowbits:set,file.jar; flowbits:noalert; metadata:ruleset community, service ftp-
data, service http, service imap, service pop3; classtype:misc-activity; sid:20463;
rev:23;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
JAR/ZIP file magic detected"; flow:to_client,established; file_data;
content:"PK00PK|03 04|"; flowbits:set,file.zip; flowbits:set,file.jar;
flowbits:noalert; metadata:ruleset community, service ftp-data, service http,
service imap, service pop3; classtype:misc-activity; sid:20464; rev:22;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
JAR/ZIP file magic detected"; flow:to_client,established; file_data; content:"PK|01
02|"; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; classtype:misc-activity; sid:20465; rev:22;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
JAR/ZIP file magic detected"; flow:to_client,established; file_data; content:"PK|05
06|"; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; classtype:misc-activity; sid:20466; rev:22;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
JAR/ZIP file magic detected"; flow:to_client,established; file_data; content:"PK|06
08|"; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; classtype:misc-activity; sid:20467; rev:22;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
JAR/ZIP file magic detected"; flow:to_client,established; file_data; content:"PK|06
07|"; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; classtype:misc-activity; sid:20468; rev:22;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
JAR/ZIP file magic detected"; flow:to_client,established; file_data; content:"PK|06
06|"; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; classtype:misc-activity; sid:20469; rev:22;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY PNG
file magic detected"; flow:to_client,established; file_data; content:"|89|PNG|0D 0A
1A 0A|"; depth:8; flowbits:set,file.png; flowbits:noalert; metadata:ruleset
community, service ftp-data, service http, service imap, service pop3;
classtype:misc-activity; sid:20478; rev:19;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY JPEG
file magic detection"; flow:to_client,established; file_data; content:"|FF D8 FF|";
depth:3; flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community,
service ftp-data, service http, service imap, service pop3; classtype:misc-
activity; sid:20480; rev:18;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY JPEG
file magic detected"; flow:to_client,established; file_data; content:"|FF D8 FF
E0|"; depth:4; flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset
community, service ftp-data, service http, service imap, service pop3;
classtype:misc-activity; sid:20483; rev:19;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY RTF
file magic detected"; flow:to_client,established; file_data; content:"{|5C|rt";
fast_pattern:only; flowbits:set,file.rtf; flowbits:noalert; metadata:ruleset
community, service ftp-data, service http, service imap, service pop3;
classtype:misc-activity; sid:20486; rev:20;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY PDF
file magic detected"; flow:to_client,established; file_data; content:"%PDF-";
nocase; flowbits:set,file.pdf; flowbits:noalert; metadata:ruleset community,
service ftp-data, service http, service imap, service pop3; classtype:misc-
activity; sid:20494; rev:16;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY JAR file
download request"; flow:to_server,established; content:".jar"; fast_pattern:only;
http_uri; pcre:"/\x2ejar([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.jar;
flowbits:noalert; metadata:ruleset community, service http; classtype:misc-
activity; sid:20621; rev:15;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY Microsoft
Windows EMF metafile file attachment detected"; flow:to_client,established;
content:".emf"; fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2eemf/i";
flowbits:set,file.emf; flowbits:noalert; metadata:policy max-detect-ips alert,
ruleset community, service imap, service pop3; classtype:misc-activity; sid:20850;
rev:17;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY Microsoft
Windows EMF metafile file attachment detected"; flow:to_server,established;
content:".emf"; fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2eemf/i";
flowbits:set,file.emf; flowbits:noalert; metadata:policy max-detect-ips alert,
ruleset community, service smtp; classtype:misc-activity; sid:20851; rev:18;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY DIB file
download request"; flow:to_server,established; content:".dib"; fast_pattern:only;
http_uri; pcre:"/\x2edib([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.bmp;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/BMP_file_format; classtype:misc-activity;
sid:20963; rev:13;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY SAMI file
download request"; flow:to_server,established; content:".sami"; fast_pattern:only;
http_uri; pcre:"/\x2esami([\?\x5c\x2f]|$)/smiU";
flowbits:set,file.realplayer.playlist; flowbits:set,file.smi; flowbits:noalert;
metadata:ruleset community, service http; reference:url,en.wikipedia.org/wiki/SAMI;
classtype:misc-activity; sid:20964; rev:13;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY JPEG file
download request"; flow:to_server,established; content:".jpe"; fast_pattern:only;
http_uri; pcre:"/\x2ejpe([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.jpeg;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/Jpg; classtype:misc-activity; sid:20965;
rev:11;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY JPEG file
download request"; flow:to_server,established; content:".jif"; fast_pattern:only;
http_uri; pcre:"/\x2ejif([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.jpeg;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/Jpg; classtype:misc-activity; sid:20966;
rev:11;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY JPEG file
download request"; flow:to_server,established; content:".jfi"; fast_pattern:only;
http_uri; pcre:"/\x2ejfif?([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.jpeg;
flowbits:noalert; metadata:ruleset community, service http;
reference:url,en.wikipedia.org/wiki/Jpg; classtype:misc-activity; sid:20967;
rev:11;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY PDF file
attachment detected"; flow:to_client,established; content:".pdf";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2epdf/i";
flowbits:set,file.pdf; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21035; rev:14;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY PDF file
attachment detected"; flow:to_server,established; content:".pdf";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2epdf/i";
flowbits:set,file.pdf; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21036; rev:15;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Betad variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/login.php"; nocase; http_uri; content:"|C9
97 A2 F3 7E 37 CB 7E 27|"; fast_pattern:only; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/46a87d0818ffd828df5c8fca63b1628f068e50cf3d
20ec0e4e009e1dd547b9e9/analysis/; classtype:trojan-activity; sid:21230; rev:9;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user-agent string DataCha0s"; flow:to_server, established;
content:"User-Agent|3A 20|DataCha0s"; fast_pattern:only; http_header;
metadata:ruleset community, service http;
reference:url,www.internetofficer.com/web-robot/datacha0s/; classtype:network-scan;
sid:21246; rev:6;)
alert tcp $EXTERNAL_NET 21 -> $HOME_NET any (msg:"MALWARE-OTHER known malicious FTP
login banner - 0wns j0"; flow:established,to_client; content:"220|20|"; depth:4;
content:"0wns j0"; distance:0; nocase; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service ftp;
reference:url,seclists.org/fulldisclosure/2004/Sep/895; reference:url,www.cyber-
ta.org/releases/malware-analysis/public/SOURCES/CLUSTERS-NEW/behavior-summary.html;
classtype:trojan-activity; sid:21255; rev:5;)
alert tcp $EXTERNAL_NET 21 -> $HOME_NET any (msg:"MALWARE-OTHER known malicious FTP
quit banner - Goodbye happy r00ting"; flow:established,to_client; content:"221
Goodbye happy r00ting"; fast_pattern:only; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service ftp;
reference:url,taosecurity.blogspot.com/2006/01/nepenthes-discoveries-earlier-today-
i.html; classtype:trojan-activity; sid:21256; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC URI -
known scanner tool muieblackcat"; flow:to_server, established;
content:"/muieblackcat"; nocase; http_uri; pcre:"/\/muieblackcat$/Ui";
metadata:policy security-ips drop, ruleset community, service http;
reference:url,serverfault.com/questions/309309/what-is-muieblackcat;
classtype:network-scan; sid:21257; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user-agent string Morfeus Scanner"; flow:to_server, established;
content:"User|2D|Agent|3A 20|Morfeus|20|Fucking|20|Scanner"; fast_pattern:only;
http_header; metadata:ruleset community, service http; classtype:network-scan;
sid:21266; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"POLICY-OTHER TRENDnet
IP Camera anonymous access attempt"; flow:to_server,established; content:"/anony/";
fast_pattern:only; http_uri; pcre:"/\/anony\/(jpgview\.htm|mjpeg\.cgi|view2\.cgi|
mjpg\.cgi)/Ui"; metadata:ruleset community, service http; reference:url,console-
cowboys.blogspot.com/2012/01/trendnet-cameras-i-always-feel-like.html;
reference:url,www.trendnet.com/press/view.asp?id=1958;
reference:url,www.wired.com/threatlevel/2012/02/home-cameras-exposed/;
classtype:policy-violation; sid:21267; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY XSL file
download request"; flow:to_server,established; content:".xsl"; fast_pattern:only;
http_uri; pcre:"/\x2exsl([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.xml;
flowbits:noalert; metadata:ruleset community, service http; classtype:misc-
activity; sid:21282; rev:8;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY XSL file
attachment detected"; flow:to_client,established; content:".xsl";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2exsl/i";
flowbits:set,file.xml; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21283; rev:9;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY XSL file
attachment detected"; flow:to_server,established; content:".xsl";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2exsl/i";
flowbits:set,file.xml; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21284; rev:10;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY XSLT file
download request"; flow:to_server,established; content:".xslt"; fast_pattern:only;
http_uri; pcre:"/\x2exslt([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.xml;
flowbits:noalert; metadata:ruleset community, service http; classtype:misc-
activity; sid:21285; rev:8;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY XSLT file
attachment detected"; flow:to_client,established; content:".xslt";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2exslt/i";
flowbits:set,file.xml; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21286; rev:9;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY XSLT file
attachment detected"; flow:to_server,established; content:".xslt";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2exslt/i";
flowbits:set,file.xml; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21287; rev:10;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY XML
download detected"; flow:to_client,established; content:"Content-Type|3A|"; nocase;
http_header; content:"text/xml"; within:20; fast_pattern; nocase; http_header;
flowbits:set,file.xml; flowbits:noalert; metadata:ruleset community, service http;
classtype:misc-activity; sid:21288; rev:11;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
ASafaWeb Scan"; flow:to_server,established; content:"User-Agent|3A| asafaweb.com";
fast_pattern:only; http_header; metadata:policy balanced-ips alert, policy
security-ips drop, ruleset community, service http; reference:url,asafaweb.com;
classtype:network-scan; sid:21327; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Remote
Execution Backdoor Attempt Against Horde"; flow:to_server,established;
content:"/services/javascript.php"; fast_pattern:only; http_uri; content:"href=";
http_cookie; content:"file=open_calendar.js"; http_client_body; metadata:ruleset
community, service http; reference:cve,2012-0209;
reference:url,dev.horde.org/h/jonah/stories/view.php?channel_id=1&id=155;
reference:url,eromang.zataz.com/2012/02/15/cve-2012-0209-horde-backdoor-analysis/;
reference:url,pastebin.com/U3ADiWrP; classtype:web-application-attack; sid:21375;
rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY paq8o file
download request"; flow:to_server,established; content:".paq8o"; fast_pattern:only;
http_uri; pcre:"/\x2epaq8o([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.zip;
flowbits:noalert; metadata:ruleset community, service http; classtype:misc-
activity; sid:21410; rev:12;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY paq8o file
attachment detected"; flow:to_client,established; content:".paq8o";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2epaq8o/i";
flowbits:set,file.zip; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21411; rev:13;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY paq8o file
attachment detected"; flow:to_server,established; content:".paq8o";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2epaq8o/i";
flowbits:set,file.zip; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21412; rev:14;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-PDF hostile
PDF associated with Laik exploit kit"; flow:to_client,established;
flowbits:isset,file.pdf; file_data; content:"%PDF-1."; content:") /CreationDate
(D:20110405234628)>>"; fast_pattern:only; metadata:ruleset community, service ftp-
data, service http, service imap, service pop3; classtype:trojan-activity;
sid:21417; rev:9;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT Blackhole
exploit kit JavaScript carat string splitting with hostile applet";
flow:to_client,established; content:"<html><body><applet|20|code="; nocase;
content:"|20|archive="; distance:0; nocase; content:"display|3A|none|3B|";
distance:0; nocase; pcre:"/([@\x2da-z0-9]+?\x5e){10}/smi"; metadata:impact_flag
red, policy max-detect-ips drop, ruleset community, service http;
reference:cve,2006-0003; reference:cve,2007-5659; reference:cve,2008-0655;
reference:cve,2008-2992; reference:cve,2009-0927; reference:cve,2010-1885;
reference:cve,2011-0559; reference:cve,2011-2110; reference:cve,2011-3544;
reference:cve,2012-0188; reference:cve,2012-0507; reference:cve,2012-1723;
reference:cve,2012-1889; reference:cve,2012-4681;
reference:url,community.websense.com/blogs/securitylabs/pages/black-hole-exploit-
kit.aspx; classtype:trojan-activity; sid:21438; rev:7;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC URI
request for known malicious URI - base64 encoded"; flow:to_server,established;
content:"GET http|3A 2F 2F|"; depth:11; base64_decode:relative; base64_data;
content:"clk="; content:"&bid="; distance:0; content:"&aid="; within:5;
distance:40; content:"&sid="; distance:0; content:"&rd="; distance:0;
content:"&x86="; distance:0; metadata:impact_flag red, ruleset community, service
http; reference:url,www.damballa.com/tdl4/; classtype:trojan-activity; sid:21442;
rev:5;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.TDSS variant outbound connection"; flow:to_server,established;
content:"User-Agent|3A| Mozilla/4.0 (compatible|3B 20|)"; fast_pattern:only;
http_header; content:"HOST|3A|"; http_header; content:!"X-BlueCoat-Via"; nocase;
http_header; metadata:impact_flag red, ruleset community, service http;
reference:url,about-threats.trendmicro.com/Malware.aspx?language=apac&name=TDSS;
reference:url,www.virustotal.com/file/75e8b49e1d316f28363cccb697cfd2ebca3122dba3dba
321dba6391b49fc757e/analysis/; classtype:trojan-activity; sid:21444; rev:13;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user-agent string core-project"; flow:to_server, established;
content:"User-Agent|3A 20|core-project"; fast_pattern:only; http_header;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http; classtype:misc-activity; sid:21475; rev:4;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY XML
file magic detected"; flow:to_client,established; file_data; content:"<xml>";
depth:50; nocase; flowbits:set,file.xml; flowbits:set,file.xul; flowbits:noalert;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; classtype:misc-activity; sid:21480; rev:13;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT
Blackhole exploit kit landing page with specific structure - prototype catch";
flow:to_client,established; content:"try"; content:"prototype"; within:30;
content:"}catch("; within:30; pcre:"/prototype([^\x7d]{1,3})?\x7dcatch\x28/smi";
metadata:policy max-detect-ips drop, ruleset community, service ftp-data, service
http, service imap, service pop3; reference:cve,2006-0003; reference:cve,2007-5659;
reference:cve,2008-0655; reference:cve,2008-2992; reference:cve,2009-0927;
reference:cve,2010-1885; reference:cve,2011-0559; reference:cve,2011-2110;
reference:cve,2011-3544; reference:cve,2012-0188; reference:cve,2012-0507;
reference:cve,2012-1723; reference:cve,2012-1889; reference:cve,2012-4681;
reference:url,community.websense.com/blogs/securitylabs/pages/black-hole-exploit-
kit.aspx; classtype:attempted-user; sid:21492; rev:22;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY XML
file magic detected"; flow:to_client,established; file_data; content:"<?xml";
depth:50; nocase; flowbits:set,file.xml; flowbits:set,file.xul; flowbits:noalert;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; classtype:misc-activity; sid:21498; rev:13;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY XML file
attachment detected"; flow:to_client,established; content:".xml";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2exml/i";
flowbits:set,file.xml; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21499; rev:8;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY XML file
attachment detected"; flow:to_server,established; content:".xml";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2exml/i";
flowbits:set,file.xml; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21500; rev:9;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bredolab variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"User-Agent|3A 20|Mozilla/4.0|0D 0A|";
http_header; content:"smk="; depth:4; http_client_body; metadata:policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/file/9384733182a6cbe5236b9b253d1f070570b7f6b6ff31a
a86be253421f4c5c645/analysis/; classtype:trojan-activity; sid:21562; rev:5;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY PNG file
attachment detected"; flow:to_client,established; content:".png";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2epng/i";
flowbits:set,file.png; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21613; rev:13;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY PNG file
attachment detected"; flow:to_server,established; content:".png";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2epng/i";
flowbits:set,file.png; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21614; rev:14;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT
Blackhole exploit kit landing page with specific structure - prototype catch";
flow:to_client,established; file_data; content:"prototype"; content:"}catch(";
distance:0; pcre:"/prototype([^\x7d]{1,3})?\x7dcatch\(\w{3}\)/smi"; metadata:policy
max-detect-ips drop, ruleset community, service ftp-data, service http, service
imap, service pop3; reference:cve,2006-0003; reference:cve,2007-5659;
reference:cve,2008-0655; reference:cve,2008-2992; reference:cve,2009-0927;
reference:cve,2010-1885; reference:cve,2011-0559; reference:cve,2011-2110;
reference:cve,2011-3544; reference:cve,2012-0188; reference:cve,2012-0507;
reference:cve,2012-1723; reference:cve,2012-1889; reference:cve,2012-4681;
reference:url,community.websense.com/blogs/securitylabs/pages/black-hole-exploit-
kit.aspx; classtype:attempted-user; sid:21646; rev:16;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY SMI file
attachment detected"; flow:to_client,established; content:".smi";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2esmi/i";
flowbits:set,file.realplayer.playlist; flowbits:set,file.dmg;
flowbits:set,file.smi; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21695; rev:10;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY SMI file
attachment detected"; flow:to_server,established; content:".smi";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2esmi/i";
flowbits:set,file.realplayer.playlist; flowbits:set,file.dmg;
flowbits:set,file.smi; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21696; rev:11;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY SAMI file
attachment detected"; flow:to_client,established; content:".sami";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2esami/i";
flowbits:set,file.realplayer.playlist; flowbits:set,file.smi; flowbits:noalert;
metadata:ruleset community, service imap, service pop3; classtype:misc-activity;
sid:21697; rev:10;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY SAMI file
attachment detected"; flow:to_server,established; content:".sami";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2esami/i";
flowbits:set,file.realplayer.playlist; flowbits:set,file.smi; flowbits:noalert;
metadata:ruleset community, service smtp; classtype:misc-activity; sid:21698;
rev:11;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY ANI file
download request"; flow:to_server,established; content:".ani"; fast_pattern:only;
http_uri; pcre:"/\x2eani([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.ani;
flowbits:noalert; metadata:ruleset community, service http; classtype:misc-
activity; sid:21724; rev:10;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY ANI file
attachment detected"; flow:to_client,established; content:".ani";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2eani/i";
flowbits:set,file.ani; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21725; rev:10;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY ANI file
attachment detected"; flow:to_server,established; content:".ani";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2eani/i";
flowbits:set,file.ani; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21726; rev:11;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY ANI
file magic detection"; flow:to_client,established; file_data; content:"RIFF";
depth:4; content:"ACON"; within:4; distance:4; flowbits:set,file.ani;
flowbits:noalert; metadata:ruleset community, service ftp-data, service http,
service imap, service pop3; classtype:misc-activity; sid:21727; rev:10;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_client,established; content:".jpg";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ejpg/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21728; rev:9;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_server,established; content:".jpg";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ejpg/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21729; rev:10;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_client,established; content:".jpeg";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ejpeg/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21730; rev:9;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_server,established; content:".jpeg";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ejpeg/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21731; rev:10;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_client,established; content:".pjpeg";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2epjpeg/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21732; rev:9;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_server,established; content:".pjpeg";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2epjpeg/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21733; rev:10;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_client,established; content:".jpe";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ejpe/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21734; rev:9;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_server,established; content:".jpe";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ejpe/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21735; rev:10;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_client,established; content:".jif";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ejif/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21736; rev:9;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_server,established; content:".jif";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ejif/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21737; rev:10;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_client,established; content:".jfi";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ejfi/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21738; rev:10;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JPG file
attachment detected"; flow:to_server,established; content:".jfi";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ejfi/i";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21739; rev:11;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY RTF file
attachment detected"; flow:to_client,established; content:".rtf";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ertf/i";
flowbits:set,file.rtf; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21746; rev:9;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY RTF file
attachment detected"; flow:to_server,established; content:".rtf";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ertf/i";
flowbits:set,file.rtf; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21747; rev:10;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %ALLUSERSPROFILE%";
flow:to_server,established; content:"%ALLUSERSPROFILE%"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:attempted-recon;
sid:21818; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %PROGRAMDATA%"; flow:to_server,established;
content:"%PROGRAMDATA%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21819; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %APPDATA%"; flow:to_server,established;
content:"%APPDATA%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21820; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %COMMONPROGRAMFILES%";
flow:to_server,established; content:"%COMMONPROGRAMFILES%"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:attempted-recon;
sid:21821; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %COMMONPROGRAMFILES - x86%";
flow:to_server,established; content:"%COMMONPROGRAMFILES|40|x86|41|%";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:21822; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %COMSPEC%"; flow:to_server,established;
content:"%COMSPEC%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21823; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %HOMEDRIVE%"; flow:to_server,established;
content:"%HOMEDRIVE%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21824; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %HOMEPATH%"; flow:to_server,established;
content:"%HOMEPATH%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21825; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %LOCALAPPDATA%"; flow:to_server,established;
content:"%LOCALAPPDATA%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21826; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %PROGRAMFILES%"; flow:to_server,established;
content:"%PROGRAMFILES%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21827; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %PROGRAMFILES - X86%";
flow:to_server,established; content:"%PROGRAMFILES|40|X86|41|%"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; classtype:attempted-recon;
sid:21828; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %SystemDrive%"; flow:to_server,established;
content:"%SystemDrive%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21829; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %SystemRoot%"; flow:to_server,established;
content:"%SystemRoot%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21830; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %TEMP%"; flow:to_server,established;
content:"%TEMP%"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; classtype:attempted-recon; sid:21831; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %TMP%"; flow:to_server,established;
content:"%TMP%"; fast_pattern:only; http_uri; metadata:ruleset community, service
http; classtype:attempted-recon; sid:21832; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %USERDATA%"; flow:to_server,established;
content:"%USERDATA%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21833; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %USERNAME%"; flow:to_server,established;
content:"%USERNAME%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21834; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %USERPROFILE%"; flow:to_server,established;
content:"%USERPROFILE%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21835; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %WINDIR%"; flow:to_server,established;
content:"%WINDIR%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21836; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %PUBLIC%"; flow:to_server,established;
content:"%PUBLIC%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21837; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable directory traversal attempt - %PSModulePath%"; flow:to_server,established;
content:"%PSModulePath%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21838; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable in URI attempt - %COMPUTERNAME%"; flow:to_server,established;
content:"%COMPUTERNAME%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21839; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable in URI attempt - %LOGONSERVER%"; flow:to_server,established;
content:"%LOGONSERVER%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21840; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable in URI attempt - %PATH%"; flow:to_server,established; content:"%PATH%";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:21841; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable in URI attempt - %PATHEXT%"; flow:to_server,established; content:"%PATHEXT
%"; fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:21842; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable in URI attempt - %PROMPT%"; flow:to_server,established; content:"%PROMPT
%"; fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:21843; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP System
variable in URI attempt - %USERDOMAIN%"; flow:to_server,established;
content:"%USERDOMAIN%"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:21844; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER TDS Sutra
- redirect received"; flow:to_client,established; content:"_0000="; fast_pattern;
content:"SL_"; http_cookie; content:"_0000="; within:8; http_cookie;
metadata:impact_flag red, policy security-ips drop, ruleset community, service
http; reference:url,wepawet.iseclab.org/view.php?
hash=822b95927fd4d8bb6eb2e62f4e1ef645&t=1243359208&type=js;
reference:url,www.nartv.org/tag/tds/;
reference:url,xylibox.blogspot.com/2011/12/sutra-tds-v34.html; classtype:trojan-
activity; sid:21845; rev:8;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC TDS Sutra
- request in.cgi"; flow:to_server,established; content:"/in.cgi?"; http_uri;
pcre:"/\x2Fin\.cgi\?(\d{1,2}|default)$/Ui"; metadata:impact_flag red, ruleset
community, service http; reference:url,wepawet.iseclab.org/view.php?
hash=822b95927fd4d8bb6eb2e62f4e1ef645&t=1243359208&type=js;
reference:url,www.nartv.org/tag/tds/;
reference:url,xylibox.blogspot.com/2011/12/sutra-tds-v34.html; classtype:trojan-
activity; sid:21846; rev:9;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER TDS
Sutra - page redirecting to a SutraTDS"; flow:to_client,established; file_data;
content:"/in.cgi?"; isdataat:15,relative; content:!"id="; within:3; nocase;
content:!"&"; within:6; content:!"="; within:6; pcre:"/\x2Fin\.cgi\?(\w{1,6}|
default)\b/smi"; metadata:impact_flag red, ruleset community, service http;
reference:url,wepawet.iseclab.org/view.php?
hash=822b95927fd4d8bb6eb2e62f4e1ef645&t=1243359208&type=js;
reference:url,www.nartv.org/tag/tds/;
reference:url,xylibox.blogspot.com/2011/12/sutra-tds-v34.html; classtype:trojan-
activity; sid:21848; rev:14;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER TDS
Sutra - HTTP header redirecting to a SutraTDS"; flow:to_client,established;
content:"/in.cgi"; http_header; pcre:"/\x2Fin\.cgi\?(\d{1,2}|default)$/Hsmi";
metadata:impact_flag red, ruleset community, service http;
reference:url,wepawet.iseclab.org/view.php?
hash=822b95927fd4d8bb6eb2e62f4e1ef645&t=1243359208&type=js;
reference:url,www.nartv.org/tag/tds/;
reference:url,xylibox.blogspot.com/2011/12/sutra-tds-v34.html; classtype:trojan-
activity; sid:21849; rev:9;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER TDS Sutra
- request hi.cgi"; flow:to_server,established; content:"/hi.cgi"; http_uri;
metadata:impact_flag red, policy security-ips drop, ruleset community, service
http; reference:url,wepawet.iseclab.org/view.php?
hash=822b95927fd4d8bb6eb2e62f4e1ef645&t=1243359208&type=js;
reference:url,www.nartv.org/tag/tds/;
reference:url,xylibox.blogspot.com/2011/12/sutra-tds-v34.html; classtype:trojan-
activity; sid:21850; rev:6;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER TDS Sutra
- redirect received"; flow:to_client,established; content:"302"; http_stat_code;
content:"=_"; content:"_|5C 3B| domain="; within:11; distance:1; pcre:"/^[a-z]
{5}\d=_\d_/C"; metadata:impact_flag red, policy security-ips drop, ruleset
community, service http; reference:url,wepawet.iseclab.org/view.php?
hash=822b95927fd4d8bb6eb2e62f4e1ef645&t=1243359208&type=js;
reference:url,www.nartv.org/tag/tds/;
reference:url,xylibox.blogspot.com/2011/12/sutra-tds-v34.html; classtype:trojan-
activity; sid:21851; rev:6;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY ZIP file
attachment detected"; flow:to_client,established; content:".zip";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ezip/i";
flowbits:set,file.zip; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:21856; rev:10;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY ZIP file
attachment detected"; flow:to_server,established; content:".zip";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2ezip/i";
flowbits:set,file.zip; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:21857; rev:11;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY Portable
Executable file attachment detected"; flow:to_client,established; content:".exe";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2eexe/i";
flowbits:set,file.exe; flowbits:noalert; metadata:policy max-detect-ips alert,
ruleset community, service imap, service pop3; classtype:misc-activity; sid:21908;
rev:11;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY Portable
Executable file attachment detected"; flow:to_server,established; content:".exe";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2eexe/i";
flowbits:set,file.exe; flowbits:noalert; metadata:policy max-detect-ips alert,
ruleset community, service smtp; classtype:misc-activity; sid:21909; rev:12;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY EMF
file magic detected"; flow:to_client,established; file_data; content:"|01 00 00
00|"; depth:4; content:"|20|EMF"; within:4; distance:36; fast_pattern;
flowbits:set,file.emf; flowbits:noalert; metadata:policy max-detect-ips alert,
ruleset community, service ftp-data, service http, service imap, service pop3;
classtype:misc-activity; sid:21940; rev:13;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY XM file
download request"; flow:to_server,established; content:".xm"; fast_pattern:only;
http_uri; pcre:"/\x2exm([\?\x5c\x2f]|$)/smiU"; flowbits:set,file.xm;
flowbits:noalert; metadata:ruleset community, service http; classtype:misc-
activity; sid:22043; rev:6;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY XM file
attachment detected"; flow:to_client,established; content:".xm"; fast_pattern:only;
content:"Content-Disposition: attachment|3B|"; content:"filename="; nocase;
pcre:"/filename=[^\n]*\x2exm/i"; flowbits:set,file.xm; flowbits:noalert;
metadata:ruleset community, service imap, service pop3; classtype:misc-activity;
sid:22044; rev:7;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY XM file
attachment detected"; flow:to_server,established; content:".xm"; fast_pattern:only;
content:"Content-Disposition: attachment|3B|"; content:"filename="; nocase;
pcre:"/filename=[^\n]*\x2exm/i"; flowbits:set,file.xm; flowbits:noalert;
metadata:ruleset community, service smtp; classtype:misc-activity; sid:22045;
rev:8;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY XM
file magic detected"; flow:to_client,established; file_data; content:"Extended
Module:"; fast_pattern:only; flowbits:set,file.xm; flowbits:noalert;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; classtype:misc-activity; sid:22046; rev:7;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER Alureon -
Malicious IFRAME load attempt"; flow:to_client,established; file_data;
content:"name=|5C 22|Twitter|5C 22| scrolling=|5C 22|auto|5C 22| frameborder=|5C
22|no|5C 22| align=|5C 22|center|5C 22| height = |5C 22|1px|5C 22| width = |5C 22|
1px|5C 22|>"; fast_pattern:only; metadata:policy balanced-ips alert, policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:22061; rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP PHP-CGI
remote file include attempt"; flow:to_server,established;
content:"auto_prepend_file"; http_uri; metadata:ruleset community, service http;
reference:cve,2012-1823; reference:cve,2012-2311; reference:cve,2012-2335;
reference:cve,2012-2336; classtype:attempted-admin; sid:22063; rev:10;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
script before DOCTYPE possible malicious redirect attempt";
flow:to_client,established; file_data; content:"</script><!DOCTYPE";
fast_pattern:only; metadata:ruleset community, service http; classtype:web-
application-attack; sid:23179; rev:4;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"INDICATOR-
OBFUSCATION hex escaped characters in setTimeout call"; flow:established,to_client;
file_data; content:"setTimeout|28|"; nocase; content:"|5C|x"; within:10; nocase;
content:"|5C|x"; within:10; nocase; pcre:"/setTimeout\x28[\x22\x27]
[^\x2C]*?\x5cx[\da-f]{2}[^\x2C]*?[\da-f]{2,}\x5cx[\da-f]{2}/smi"; metadata:ruleset
community, service ftp-data, service http, service imap, service pop3;
classtype:bad-unknown; sid:23481; rev:4;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"INDICATOR-
OBFUSCATION hex escaped characters in addEventListener call";
flow:established,to_client; file_data; content:"addEventListener|28|"; nocase;
content:"|5C|x"; within:10; nocase; content:"|5C|x"; within:10; nocase;
pcre:"/addEventListener\x28[\x22\x27][^\x2C]*?\x5cx[\da-f]{2}[^\x2C]*?[\da-f]
{2,}\x5cx[\da-f]{2}/smi"; metadata:ruleset community, service ftp-data, service
http, service imap, service pop3; classtype:bad-unknown; sid:23482; rev:4;)
alert udp $HOME_NET any -> $EXTERNAL_NET 53 (msg:"MALWARE-CNC Win.Trojan.ZeroAccess
outbound connection"; flow:to_server; dsize:20; content:"|9E 98|"; depth:2;
offset:6; metadata:policy balanced-ips drop, policy security-ips drop, ruleset
community;
reference:url,www.virustotal.com/file/50cdd9f6c5629630c8d8a3a4fe7d929d3c6463b2f9407
d9a90703047e7db7ff9/analysis/; classtype:trojan-activity; sid:23492; rev:5;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"INDICATOR-
OBFUSCATION known packer routine with secondary obfuscation";
flow:to_client,established; file_data; content:"eval(function(p,a,c,k,e,r)";
fast_pattern:only; metadata:ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,dean.edwards.name/packer/;
classtype:misc-activity; sid:23621; rev:7;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"INDICATOR-
OBFUSCATION JavaScript built-in function parseInt appears obfuscated - likely
packer or encoder"; flow:to_client,established; file_data; content:"|5B 27|parse|27
2B 27|Int|27 5D 28|"; fast_pattern:only; metadata:ruleset community, service ftp-
data, service http, service imap, service pop3;
reference:url,snort.org/rule_docs/1-23636; classtype:trojan-activity; sid:23636;
rev:9;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JAR/ZIP file
magic detected"; flow:to_server,established; file_data; content:"PK|03 04|";
depth:4; content:!"|14 00 06 00|"; within:4; flowbits:set,file.zip;
flowbits:set,file.jar; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:23651; rev:12;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JAR/ZIP file
magic detected"; flow:to_server,established; file_data; content:"PK00PK|03 04|";
depth:8; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service smtp; classtype:misc-activity; sid:23652;
rev:13;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JAR/ZIP file
magic detected"; flow:to_server,established; file_data; content:"PK|01 02|";
depth:4; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service smtp; classtype:misc-activity; sid:23653;
rev:13;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JAR/ZIP file
magic detected"; flow:to_server,established; file_data; content:"PK|05 06|";
depth:4; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service smtp; classtype:misc-activity; sid:23654;
rev:13;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JAR/ZIP file
magic detected"; flow:to_server,established; file_data; content:"PK|06 08|";
depth:4; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service smtp; classtype:misc-activity; sid:23655;
rev:13;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JAR/ZIP file
magic detected"; flow:to_server,established; file_data; content:"PK|06 07|";
depth:4; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service smtp; classtype:misc-activity; sid:23656;
rev:13;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JAR/ZIP file
magic detected"; flow:to_server,established; file_data; content:"PK|06 06|";
depth:4; flowbits:set,file.zip; flowbits:set,file.jar; flowbits:noalert;
metadata:ruleset community, service smtp; classtype:misc-activity; sid:23657;
rev:13;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY PNG file magic
detected"; flow:to_server,established; file_data; content:"|89|PNG|0D 0A 1A 0A|";
depth:8; flowbits:set,file.png; flowbits:noalert; metadata:ruleset community,
service smtp; classtype:misc-activity; sid:23664; rev:14;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JPEG file magic
detected"; flow:to_server,established; file_data; content:"|FF D8 FF E0|"; depth:4;
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:23667; rev:11;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY RTF file magic
detected"; flow:to_server,established; file_data; content:"{|5C|rt";
fast_pattern:only; flowbits:set,file.rtf; flowbits:noalert; metadata:ruleset
community, service smtp; classtype:misc-activity; sid:23670; rev:11;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY PDF file magic
detected"; flow:to_server,established; file_data; content:"%PDF-"; nocase;
flowbits:set,file.pdf; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:23678; rev:11;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY Microsoft
Compound File Binary v3 file magic detected"; flow:to_server,established;
file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; content:">|00 03 00|"; within:4;
distance:16; flowbits:set,file.ole; flowbits:noalert; metadata:ruleset community,
service smtp; classtype:misc-activity; sid:23707; rev:13;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY Microsoft
Compound File Binary v4 file magic detected"; flow:to_server,established;
file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; content:">|00 04 00|"; within:4;
distance:16; flowbits:set,file.oless.v4; flowbits:noalert; metadata:policy max-
detect-ips alert, ruleset community, service smtp; classtype:misc-activity;
sid:23708; rev:7;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY OLE Document
file magic detected"; flow:to_server,established; file_data; content:"|D0 CF 11 E0
A1 B1 1A E1|"; depth:8; flowbits:set,file.ole; flowbits:set,file.fpx;
flowbits:noalert; metadata:ruleset community, service smtp; classtype:misc-
activity; sid:23711; rev:11;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY Portable
Executable binary file magic detected"; flow:to_server,established; file_data;
content:"MZ"; byte_jump:4,58,relative,little; content:"PE|00 00|"; within:4;
distance:-64; flowbits:set,file.exe; metadata:policy balanced-ips alert, policy
connectivity-ips alert, policy max-detect-ips drop, policy security-ips alert,
ruleset community, service smtp; classtype:misc-activity; sid:23725; rev:10;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY XML file magic
detected"; flow:to_server,established; file_data; content:"<xml>"; depth:50;
nocase; flowbits:set,file.xml; flowbits:noalert; metadata:ruleset community,
service smtp; classtype:misc-activity; sid:23758; rev:7;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY XML file magic
detected"; flow:to_server,established; file_data; content:"<?xml"; depth:50;
nocase; flowbits:set,file.xml; flowbits:noalert; metadata:ruleset community,
service smtp; classtype:misc-activity; sid:23759; rev:7;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY EMF file magic
detected"; flow:to_server,established; file_data; content:"|01 00 00 00|"; depth:4;
content:"|20|EMF"; within:4; distance:36; fast_pattern; flowbits:set,file.emf;
flowbits:noalert; metadata:policy max-detect-ips alert, ruleset community, service
smtp; classtype:misc-activity; sid:23766; rev:12;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY XM file magic
detected"; flow:to_server,established; file_data; content:"Extended Module:";
fast_pattern:only; flowbits:set,file.xm; flowbits:noalert; metadata:ruleset
community, service smtp; classtype:misc-activity; sid:23773; rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Magania
variant outbound connection"; flow:to_server,established; content:"User-Agent:
Google page|0D 0A|"; fast_pattern:only; content:".asp?"; content:"mac="; within:4;
content:"&ver="; distance:0; metadata:impact_flag red, policy balanced-ips drop,
policy max-detect-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,www.seculert.com/blog/2013/06/adversary-arsenal-exposed-part-i-
pinkstats.html;
reference:url,www.virustotal.com/file/6a813f96bb65367a8b5c5ba2937c773785a0a0299032a
6c77b9b0862be8bdb71/analysis/; classtype:trojan-activity; sid:24015; rev:8;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER Possible
malicious redirect - rebots.php"; flow:to_server,established;
content:"/rebots.php"; fast_pattern:only; http_uri; metadata:policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,blog.sucuri.net/2012/08/rebots-php-javascript-malware-being-actively-
injected.html; reference:url,labs.sucuri.net/db/malware/mwjs-include-rebots;
classtype:misc-activity; sid:24017; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER malicious
redirection attempt"; flow:to_server,established; content:"a=YWZmaWQ9MDUyODg";
fast_pattern:only; http_uri; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,blog.sucuri.net/2012/09/compromised-websites-hosting-calls-to-java-
exploit.html; classtype:bad-unknown; sid:24225; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"OS-MOBILE
Android/Fakelash.A!tr.spy trojan command and control channel traffic";
flow:to_server,established; content:"/data.php?action="; nocase; http_uri;
content:"&m="; distance:0; nocase; http_uri; content:"&p="; distance:0; nocase;
http_uri; content:"&n="; distance:0; nocase; http_uri; metadata:ruleset community,
service http; reference:url,blog.fortiguard.com/android-malware-distributed-by-
malicious-sms-in-france/; classtype:trojan-activity; sid:24251; rev:4;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
IP only webpage redirect attempt"; flow:to_client,established; file_data;
content:"<html><head><meta http-equiv=|22|refresh";
pcre:"/^[^>]*\x2f\x2f\d{1,3}\x2e\d{1,3}\x2e\d{1,3}\x2e\d{1,3}/sR"; metadata:ruleset
community, service http; classtype:bad-unknown; sid:24253; rev:6;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
IP only webpage redirect attempt"; flow:to_client,established; file_data;
content:"document.location=";
pcre:"/^[^>]*\x2f\x2f\d{1,3}\x2e\d{1,3}\x2e\d{1,3}\x2e\d{1,3}/sR"; metadata:ruleset
community, service http; classtype:bad-unknown; sid:24254; rev:6;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 84 (msg:"MALWARE-OTHER Malicious UA
detected on non-standard port"; flow:to_server,established,no_stream;
content:"User-Agent|3A| Mozilla/5.0 |28|Windows|3B| U|3B| MSIE 9.0|3B| Windows NT
9.0|3B| en-US|29|"; detection_filter:track by_src, count 1, seconds 120;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,anubis.iseclab.org/?
action=result&task_id=1691c3b8835221fa4692960681f39c736&format=html;
classtype:trojan-activity; sid:24265; rev:5;)
alert tcp $EXTERNAL_NET any -> $HOME_NET [139,445] (msg:"OS-WINDOWS Microsoft
Windows SMB NTLM NULL session attempt"; flow:to_server,established; content:"|FF|
SMB|73 00 00 00 00|"; depth:9; offset:4; content:"|00 00|"; within:2; distance:13;
content:"|FF|"; within:1; distance:9; content:"NTLMSSP|00 03 00 00 00|";
within:100; content:"|00 00 00 00 48 00 00 00|"; within:8; distance:24;
fast_pattern; flowbits:set,smb.null_session; flowbits:noalert; metadata:ruleset
community, service netbios-ssn; reference:bugtraq,1163; reference:cve,2000-0347;
classtype:attempted-recon; sid:24359; rev:6;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY JPEG
file magic detected"; flow:to_client,established; file_data; content:"|FF D8 FF
E1|"; depth:4; flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset
community, service ftp-data, service http, service imap, service pop3;
classtype:misc-activity; sid:24455; rev:9;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY JPEG
file magic detected"; flow:to_client,established; file_data; content:"|FF D8 FF
EE|"; depth:4; flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset
community, service ftp-data, service http, service imap, service pop3;
classtype:misc-activity; sid:24456; rev:9;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JPEG file magic
detected"; flow:to_server,established; file_data; content:"|FF D8 FF E1|"; depth:4;
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:24457; rev:8;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JPEG file magic
detected"; flow:to_server,established; file_data; content:"|FF D8 FF EE|"; depth:4;
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:24458; rev:8;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"POLICY-SPAM 1.usa.gov URL
in email, possible spam redirect"; flow:to_server, established; file_data;
content:"http|3A 2F 2F|1.usa.gov"; pcre:"/http\x3A\x2f\x2f1\.usa\.gov\x2f[a-f0-9]
{6,8}/smi"; metadata:ruleset community, service smtp;
reference:url,www.symantec.com/connect/blogs/spam-gov-urls; classtype:bad-unknown;
sid:24598; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Potential
Banking Trojan Config File Download"; flow:to_server,established; urilen:11;
content:"|2F|Config|2E|txt"; fast_pattern:only; http_uri; content:"Mozilla|2F|3|2E|
0|20 28|compatible|3B 20|Indy|20|Library|29 0D 0A|"; http_header; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/file/2418469245edf860633f791b972e1a8a11e5744c6deb0
cc1a55531cba3d0bd7f/analysis/; classtype:trojan-activity; sid:24885; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Dorkbot variant outbound connection"; flow:to_server,established;
content:".php?ip="; http_uri; content:"&os="; distance:0; http_uri;
content:"&name="; distance:0; http_uri; content:"&id="; distance:0; http_uri;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/file/c425af6875dff2c0627421086f66b7e058f51d2293947
8529702d193837c6cfe/analysis/; classtype:trojan-activity; sid:24886; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [139,445] (msg:"NETBIOS SMB Trans2
FIND_FIRST2 find file and directory info request"; flow:established,to_server;
content:"|FF|SMB2|00 00 00 00|"; depth:9; offset:4; byte_test:1,!&,128,0,relative;
content:"|01 00|"; within:2; distance:52; content:"|04 01|"; within:2; distance:11;
flowbits:set,smb.trans2.fileinfo; flowbits:noalert; metadata:ruleset community,
service netbios-ssn; classtype:protocol-command-decode; sid:24972; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established;
urilen:11<>20; content:"POST"; http_method; content:".php"; http_uri; content:"|3B
20|MSIE|20|"; http_header; content:!"|0D 0A|Accept|2D|Language|3A|"; http_header;
content:!"|0D 0A|Referer|3A|"; http_header; content:!"|0D 0A|Cookie|3A|";
http_header; content:!"Content-Disposition"; http_client_body; content:"Content-
Length: "; nocase; byte_test:8,<,369,0,string,relative; pcre:"/[^\x20-\x7e\x0d\x0a]
{4}/P"; metadata:impact_flag red, policy security-ips drop, ruleset community,
service http; classtype:trojan-activity; sid:25050; rev:8;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC ZeroAccess
Clickserver callback"; flow:to_server,established; urilen:95; content:" HTTP/1.0|0D
0A|Host:"; fast_pattern:only; pcre:"/^\x2f[A-Z\d]{83}\x3d[A-Z\d]{10}$/Ui";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:25054; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user agent - NewBrandTest"; flow:to_server,established;
content:"User-Agent|3A 20|NewBrandTest|0D 0A|"; fast_pattern:only; http_header;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/file/02b18d0aa415e299515891b56424751e846ca917d3bb5
5b82f07cfb97f62c4e1/analysis/; classtype:trojan-activity; sid:25119; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ZeroAccess URI and Referer"; flow:to_server,established; urilen:52;
content:"/s/?k="; fast_pattern:only; http_header; pcre:"/^\x2f[a-z0-9]{51}$/Ui";
pcre:"/Referer\x3a\s*?http\x3a\x2f{2}[a-z0-9\x2e\x2d]+\x2fs\x2f\x3fk\x3d/Hi";
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http; classtype:trojan-activity; sid:25224; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Worm.Gamarue variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; urilen:12; content:"/a/image.php"; fast_pattern:only;
http_uri; content:"User-Agent|3A 20|Mozilla/4.0|0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:25256; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Skintrim variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/bin/check.php?cv="; http_uri;
content:"ThIs_Is_tHe_bouNdaRY_$"; fast_pattern; http_header; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/file/80e67695fa394f56fd6ddae74b72e9050f651244aad52
ad48ebe6304edff95e2/analysis/1357239259/; classtype:trojan-activity; sid:25257;
rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Rombrast variant outbound connection"; flow:to_server,established;
content:"/file.aspx?file="; fast_pattern:only; http_uri; content:"ksp/WS";
http_header; metadata:policy balanced-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/file/af1ffe831112cbb34866fe1a65ed18613578039b002ca
221757b791a5006894d/analysis/; classtype:trojan-activity; sid:25258; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.BancosBanload variant outbound connection"; flow:to_server,established;
content:".gif"; http_uri; content:"|0D 0A|Accept|2D|Encoding|3A 20|gzip|2C|
deflateidentity|0D 0A|"; fast_pattern:only; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/file/098fa9dbc519669a50fc6f3cdc8d9e4b05a6f0c32d154
f515e403b54d72efff6/analysis/1357138873/; classtype:trojan-activity; sid:25259;
rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Buterat variant outbound connection"; flow:to_server,established;
content:"From|3A|"; http_header; content:"Via|3A|"; http_header; urilen:13;
pcre:"/^\x2f\d{3}\x2f\d{3}\x2ehtml$/U"; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/file/90fb793d1fd7245b841ca4b195e3944a991d97d854090
729062d700fe74553e5/analysis/; classtype:trojan-activity; sid:25269; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Buzus variant outbound connection"; flow:to_server,established;
content:"/default.aspx?ver="; http_uri; content:"&uid="; distance:0; http_uri;
content:"|3B 20|MRA|20|5.10|20|"; http_header; pcre:"/\x26uid\x3d[a-f0-9]{16}
($|\x26)/U"; metadata:policy balanced-ips drop, policy security-ips drop, ruleset
community, service http; classtype:trojan-activity; sid:25271; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER Request
for a non-legit postal receipt"; flow:to_server,established; content:".php?
php=receipt"; fast_pattern:only; http_uri; pcre:"/\x2f[a-z0-9]+\.php\?
php\x3dreceipt$/Ui"; metadata:policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,urlquery.net/search.php?q=.php%3Fphp
%3Dreceipt&type=string; classtype:misc-activity; sid:25277; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"APP-DETECT Acunetix web
vulnerability scan attempt"; flow:to_server,established; flowbits:set,acunetix-
scan; content:"Acunetix-"; fast_pattern:only; http_header; metadata:ruleset
community, service http; reference:url,www.acunetix.com; classtype:web-application-
attack; sid:25358; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"APP-DETECT Acunetix
web vulnerability scanner probe attempt"; flow:to_server,established;
content:"/acunetix-wvs-test-for-some-inexistent-file"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:url,www.acunetix.com;
classtype:web-application-attack; sid:25359; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"APP-DETECT Acunetix
web vulnerability scanner authentication attempt"; flow:to_server,established;
content:"password=g00dPa$$w0rD"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:url,www.acunetix.com; classtype:web-application-
attack; sid:25360; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"APP-DETECT Acunetix
web vulnerability scanner RFI attempt"; flow:to_server,established;
content:"src=/testasp.vulnweb.com/"; fast_pattern:only; http_uri; metadata:ruleset
community, service http; reference:url,www.acunetix.com; classtype:web-application-
attack; sid:25361; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"APP-DETECT Acunetix
web vulnerability scanner base64 XSS attempt"; flow:to_server,established;
content:"PHNjcmlwdD"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:url,www.acunetix.com; classtype:web-application-attack;
sid:25362; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"APP-DETECT Acunetix
web vulnerability scanner URI injection attempt"; flow:to_server,established;
content:"http:/www.acunetix.com"; fast_pattern:only; http_uri; content:"Acunetix-";
nocase; http_header; metadata:ruleset community, service http;
reference:url,www.acunetix.com; classtype:web-application-attack; sid:25363;
rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"APP-DETECT Acunetix
web vulnerability scanner prompt XSS attempt"; flow:to_server,established;
content:"<ScRiPt>prompt("; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:url,www.acunetix.com; classtype:web-application-attack;
sid:25364; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"APP-DETECT Acunetix
web vulnerability scanner XSS attempt"; flow:to_server,established; content:">=|5C|
xa2"; fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:url,www.acunetix.com; classtype:web-application-attack; sid:25365;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Pushdo
Spiral Traffic"; flow:to_server,established; content:"POST"; http_method;
urilen:39; content:"/?ptrxcz_"; fast_pattern:only; http_uri;
pcre:"/^\x2f\x3fptrxcz\x5f[a-zA-Z0-9]{30}$/Ui"; metadata:policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,updates.atomicorp.com/channels/rules/delayed/modsec/10_asl_antimalwar
e.conf; classtype:trojan-activity; sid:25471; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Necurs
Rootkit sba.cgi"; flow:to_server,established; content:"POST"; http_method;
urilen:16; content:"/cgi-bin/sba.cgi"; fast_pattern:only; http_uri; pcre:"/
[^\x20-\x7e\x0d\x0a]{4}/P"; metadata:policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/file/b1e6f0cad0ae5c60e9e4fa18fd3b4a045d6db172c10a1
c8e054e22d1aff4c673/analysis/; classtype:trojan-activity; sid:25503; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Necurs
Rootkit op.cgi"; flow:to_server,established; content:"POST"; http_method;
urilen:15; content:"/cgi-bin/op.cgi"; fast_pattern:only; http_uri; pcre:"/
[^\x20-\x7e\x0d\x0a]{4}/P"; metadata:policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/file/b1e6f0cad0ae5c60e9e4fa18fd3b4a045d6db172c10a1
c8e054e22d1aff4c673/analysis/; classtype:trojan-activity; sid:25504; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.Symmi
variant outbound connection"; flow:to_server,established; content:"lfstream|26|";
depth:9; offset:8; pcre:"/^POST\x20\x2fg[ao]lfstream\x26/"; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/file/f4c44b5331c30b62beacae5d343d591584715c2d9d6d6
5848216b61efd916ec1/analysis/; classtype:trojan-activity; sid:25511; rev:3;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
Portable Executable download detected"; flow:to_client,established;
content:"application/octet-stream"; fast_pattern:only; http_header;
pcre:"/^Content-Type\x3a[\x20\x09]+application\/octet-stream/smiH"; file_data;
content:"MZ"; within:2; flowbits:set,file.exe; flowbits:noalert; metadata:policy
max-detect-ips alert, ruleset community, service ftp-data, service http, service
imap, service pop3; classtype:misc-activity; sid:25513; rev:12;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
Portable Executable download detected"; flow:to_client,established;
content:"application/x-msdos-program"; fast_pattern:only; http_header;
pcre:"/^Content-Type\x3a[\x20\x09]+application\/x-msdos-program/smiH"; file_data;
content:"MZ"; within:2; flowbits:set,file.exe; flowbits:noalert; metadata:policy
max-detect-ips alert, ruleset community, service ftp-data, service http, service
imap, service pop3; classtype:misc-activity; sid:25514; rev:12;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY
Portable Executable binary file magic detected"; flow:to_client,established;
file_data; content:"MZ"; byte_jump:4,58,relative,little; content:"PE|00 00|";
within:4; distance:-64; flowbits:set,file.exe; flowbits:noalert; metadata:policy
max-detect-ips alert, ruleset community, service ftp-data, service http, service
imap, service pop3; classtype:misc-activity; sid:25515; rev:11;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"OS-MOBILE Apple iPod
User-Agent detected"; flow:established,to_server; content:"User-Agent|3A|";
http_header; content:"iPod"; distance:0; fast_pattern; http_header; pcre:"/^User-
Agent\x3a[^\r\n]*iPod/H"; metadata:ruleset community, service http;
classtype:policy-violation; sid:25518; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"OS-MOBILE Apple iPad
User-Agent detected"; flow:established,to_server; content:"User-Agent|3A|";
http_header; content:"iPad"; distance:0; fast_pattern; http_header; pcre:"/^User-
Agent\x3a[^\r\n]*iPad/H"; metadata:ruleset community, service http;
classtype:policy-violation; sid:25519; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"OS-MOBILE Apple iPhone
User-Agent detected"; flow:established,to_server; content:"User-Agent|3A|";
http_header; content:"iPhone"; distance:0; fast_pattern; http_header; pcre:"/^User-
Agent\x3a[^\r\n]*iPhone/H"; metadata:ruleset community, service http;
classtype:policy-violation; sid:25520; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"OS-MOBILE Android
User-Agent detected"; flow:established,to_server; content:"User-Agent|3A|";
http_header; content:"android"; distance:0; fast_pattern; nocase; http_header;
pcre:"/^User-Agent\x3a[^\r\n]*android/iH"; metadata:ruleset community, service
http; classtype:policy-violation; sid:25521; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"OS-MOBILE Nokia User-
Agent detected"; flow:established,to_server; content:"User-Agent|3A|"; http_header;
content:"nokia"; distance:0; fast_pattern; nocase; http_header; pcre:"/^User-
Agent\x3a[^\r\n]*nokia/iH"; metadata:ruleset community, service http;
classtype:policy-violation; sid:25522; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"OS-MOBILE Samsung
User-Agent detected"; flow:established,to_server; content:"User-Agent|3A|";
http_header; content:"Samsung"; distance:0; fast_pattern; nocase; http_header;
pcre:"/^User-Agent\x3a[^\r\n]*samsung/iH"; metadata:ruleset community, service
http; classtype:policy-violation; sid:25523; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"OS-MOBILE Kindle User-
Agent detected"; flow:established,to_server; content:"User-Agent|3A|"; http_header;
content:"kindle"; distance:0; fast_pattern; nocase; http_header; pcre:"/^User-
Agent\x3a[^\r\n]*kindle/iH"; metadata:ruleset community, service http;
classtype:policy-violation; sid:25524; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"OS-OTHER Nintendo
User-Agent detected"; flow:established,to_server; content:"User-Agent|3A|";
http_header; content:"nintendo"; distance:0; fast_pattern; nocase; http_header;
pcre:"/^User-Agent\x3a[^\r\n]*nintendo/iH"; metadata:ruleset community, service
http; classtype:policy-violation; sid:25525; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Rootkit.Necurs possible URI with encrypted POST"; flow:to_server,established;
content:"POST"; http_method; urilen:15; content:"/admin/host.php";
fast_pattern:only; http_uri; pcre:"/[^\x0d\x0a\x09\x20-\x7e]{4}/P"; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/file/98fb9778208cb74c11a71afd065ae64e562ded1ae477a
d42e392fe3711170319/analysis/; classtype:trojan-activity; sid:25577; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER Fake
postal receipt HTTP Response phishing attack"; flow:to_client,established;
content:"|3B 20|filename=PostalReceipt.zip|0D 0A|"; fast_pattern:only; http_header;
file_data; content:"PostalReceipt.exe"; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.urlquery.net/search.php?q=receipt&type=string&start=2013-01-
03&end=2013-01-18&max=50; classtype:trojan-activity; sid:25578; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER Fake
bookinginfo HTTP Response phishing attack"; flow:to_client,established; content:"|
3B 20|filename=BookingInfo.zip|0D 0A|"; fast_pattern:only; http_header; file_data;
content:"BookingInfo.exe"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.urlquery.net/search.php?q=receipt&type=string&start=2013-01-
03&end=2013-01-18&max=50; classtype:trojan-activity; sid:25579; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER Fake
bookingdetails HTTP Response phishing attack"; flow:to_client,established;
content:"|3B 20|filename=BookingDetails.zip|0D 0A|"; fast_pattern:only;
http_header; file_data; content:"BookingDetails.exe"; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,www.urlquery.net/search.php?q=receipt&type=string&start=2013-
01-03&end=2013-01-18&max=50; classtype:trojan-activity; sid:25580; rev:2;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1900 (msg:"SERVER-OTHER libupnp command
buffer overflow attempt"; flow:to_server; content:"M-SEARCH "; depth:9; content:"|
3A|device|3A|"; isdataat:180,relative; content:!"|3A|"; within:180; metadata:policy
security-ips drop, ruleset community, service ssdp; reference:cve,2012-5958;
reference:cve,2012-5962; classtype:attempted-admin; sid:25589; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [$HTTP_PORTS,443] (msg:"MALWARE-CNC
Win.Trojan.Reventon variant outbound connection"; flow:to_server,established;
dsize:4; content:"|9A 02 00 00|"; fast_pattern:only; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/file/25c690dac0d17f9ba304e5e68c1da2381685b1aa0aa3c
d503589bbc59daf81eb/analysis/; classtype:trojan-activity; sid:25627; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kryptic variant outbound connection"; flow:to_server,established;
content:"Accept-Language: en-us|3B 0D 0A|"; http_header; content:"wok5VLG.6";
fast_pattern:only; http_client_body; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/file/3ff78086c2e0fb839beeea7e4a209850c00f338005872
e845155341cc30a5db5/analysis/; classtype:trojan-activity; sid:25652; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Medfos variant outbound connection"; flow:to_server,established;
content:"/js/disable.js?type="; fast_pattern:only; http_uri; content:"Accept|3A 20|
application/javascript|2C 20 2A 2F 2A 3B|q=0.8"; http_header; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?
Name=Trojan:JS/Medfos.B; classtype:trojan-activity; sid:25660; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 1024:65535 (msg:"MALWARE-CNC
Win.Trojan.Fakeavlock variant outbound connection"; flow:to_server,established;
dsize:267<>276; content:"User-Agent|3A| Mozilla/5.0 (Windows|3B| U|3B| MSIE 9.0|3B|
Windows NT 9.0|3B| en-US)|0D 0A|"; fast_pattern:only; http_header; urilen:159;
pcre:"/\x2f[A-F0-9]{158}/U"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/file/c49f7dbc036ad0a86df02cbbde00cb3b3fbd651d82f6c
9c5a98170644374f64f/analysis/; classtype:trojan-activity; sid:25675; rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Trojan Agent
YEH variant outbound connection"; flow:to_server,established; content:"|29 3B 28|b|
3A|3790|3B|c|3A|INT|2D|6760|3B|l|3A|09|29 0D 0A|"; fast_pattern:only; http_header;
pcre:"/\x2f\?ts\x3d[a-f0-9]{40}\x26/Ui"; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-
spyware/Troj~Agent-YEH/detailed-analysis.aspx; classtype:trojan-activity;
sid:25765; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"/cmd.php?cmd="; http_uri; content:"arq="; distance:0; http_uri;
content:"cmd2="; distance:0; http_uri; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?
Name=Win32%2fBancos; classtype:trojan-activity; sid:25766; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Urausy Botnet variant outbound connection"; flow:to_server,established;
urilen:95<>102; content:"|29 20|Chrome|2F|"; http_header; content:!"|0A|Accept-
Encoding|3A 20|"; http_header; pcre:"/^\x2f[a-z\x2d\x5f]{90,97}\.php$/U";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,www.botnets.fr/index.php/Urausy;
classtype:trojan-activity; sid:25807; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Trojan
Banker FTC variant outbound connection"; flow:to_server,established; urilen:18;
content:"/listas/out/si.php"; fast_pattern:only; http_uri; content:"HTTP/1.0|0D
0A|"; depth:10; offset:24; metadata:policy balanced-ips drop, policy security-ips
drop, ruleset community, service http; reference:url,www.sophos.com/en-us/threat-
center/threat-analyses/viruses-and-spyware/Troj~Banker-FTC/detailed-analysis.aspx;
classtype:trojan-activity; sid:25829; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection - MSIE7 No Referer No Cookie";
flow:to_server,established; urilen:1; content:"|2F|"; http_uri;
pcre:"/\r\nHost\x3A\s+[^\r\n]*?[bcdfghjklmnpqrstvwxyz]{5,}
[^\r\n]*?\x2Einfo\r\n/Hi"; content:!"|0A|Referer|3A|"; http_header; content:!"|0A|
Cookie|3A|"; http_header; content:"|3B 20|MSIE|20|7.0|3B 20|"; http_header;
content:"|2E|info|0D 0A|"; fast_pattern; nocase; http_header; metadata:impact_flag
red, policy security-ips drop, ruleset community, service http;
reference:url,en.wikipedia.org/wiki/Zeus_(Trojan_horse); classtype:trojan-activity;
sid:25854; rev:5;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"APP-DETECT Ammyy remote access
tool"; flow:to_server,established; content:"POST"; http_method; content:"|0A|Host|
3A 20|rl.ammyy.com|0D 0A|"; fast_pattern:only; http_header; metadata:ruleset
community, service http; reference:url,www.ammyy.com; classtype:policy-violation;
sid:25947; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT redirection
to driveby download"; flow:to_client,established; file_data;
content:"/Home/index.php|22| width=1 height=1 scrolling=no></iframe>";
fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:25948; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zebrocy outbound data connection"; flow:to_server,established;
content:"POST"; http_method; content:".php"; http_uri; content:"User|2D|Agent|3A
20|Mozilla|2F|3.0|20 28|compatible|3B 20|Indy Library|29 0D 0A|"; http_header;
content:"form-data|3B| name=|22|userfile|22 3B| filename="; fast_pattern:only;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/979c14f993a1cd91f1b890f93a59ab5b14e059e056b
9cf069222f529e50a4d5f/;
reference:url,www.virustotal.com/#/file/ac9aea57da03206b1df12b5c012537c899bf5d67a5e
b8113b4a4d99e0a0eb893/;
reference:url,www.virustotal.com/en/file/04edf40eaf652dfab4e8dc2ca21fbf2e99d3617469
95767071789cc3fa24d2cc/analysis/1361822708/; classtype:trojan-activity; sid:25949;
rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Sibhost
exploit kit"; flow:to_server,established;
content:"yoO4TAbn2tpl5DltCfASJIZ2spEJPLSn"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.malwaresigs.com/2013/02/26/sport-cd-am-sibhost; classtype:trojan-
activity; sid:26020; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zbot variant in.php outbound connection"; flow:to_server,established;
urilen:7; content:"/in.php"; http_uri; content:".ru|0D 0A|User-Agent|3A 20|
Mozilla/4.0|0D 0A|"; fast_pattern:only; http_header; content:"|0A|Content-Length|3A
20|"; http_header; metadata:policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,zeustracker.abuse.ch/monitor.php?
ipaddress=195.22.26.231; classtype:trojan-activity; sid:26023; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Wecod variant outbound connection"; flow:to_server,established;
urilen:20; content:"/b/n/winrar/tudo.rar"; fast_pattern:only; http_uri;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/22e0300501e6bbb7f46c2fb5aed12e4c0d23385cc6
319d430cd4faed5241f362/analysis/; classtype:trojan-activity; sid:26024; rev:2;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY ZIP
file download detected"; flow:to_client,established; file_data; content:"PK|03 04
14 00 06 00|"; depth:8; flowbits:set,file.zip; flowbits:noalert; metadata:ruleset
community, service ftp-data, service http, service imap, service pop3;
classtype:misc-activity; sid:26057; rev:10;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY ZIP file
attachment detected"; flow:to_server,established; file_data; content:"PK|03 04 14
00 06 00|"; depth:8; flowbits:set,file.zip; flowbits:noalert; metadata:ruleset
community, service smtp; classtype:misc-activity; sid:26058; rev:9;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Bancos
variant outbound connection SQL query POST data"; flow:to_server,established;
content:"a=select CAMPO from PAGINA where CODIGO = "; fast_pattern:only;
http_client_body; metadata:policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/88efcb549a52e3fb6359a3888e72726aac00c730ed
cd5280e0248d11306a645d/analysis/; classtype:trojan-activity; sid:26075; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established;
content:".php"; http_uri; content:"|3B 20|MSIE|20|"; http_header; content:"|0D 0A|
Accept|2D|Encoding|3A 20|identity|0D 0A|"; distance:0; http_header;
pcre:"/\x0d\x0aContent\x2dLength\x3a\x20(124|132)\x0d\x0a/H";
pcre:"/\x3d?\x3d\r\n$/P"; metadata:policy security-ips drop, ruleset community,
service http; classtype:trojan-activity; sid:26106; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gupd variant outbound connection"; flow:to_server,established;
content:"cstype="; depth:7; http_client_body; content:"&authname="; within:48;
distance:1; http_client_body; content:"&authpass="; within:48; distance:1;
http_client_body; content:"&hostname="; within:48; distance:1; http_client_body;
content:"&ostype="; within:256; distance:1; http_client_body; content:"&macaddr=";
within:64; distance:16; http_client_body; content:"&owner="; within:48;
distance:17; http_client_body; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0DD9018A9AF609382FABDA8E4EC86033DA83E42FEC
25499C329DBDCBB00F2AF0/analysis/; classtype:trojan-activity; sid:26203; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Eldorado variant outbound connection"; flow:to_server,established;
urilen:12; content:"/pid/pid.txt"; fast_pattern:only; http_uri;
content:"(compatible|3B 20|Indy Library)|0D 0A 0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/46b01e093493ff14a4f1a43905d4943f5559fb518c
04edde46084d9672d0f20f/analysis/1363359002/; classtype:trojan-activity; sid:26211;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Proxyier variant outbound connection"; flow:to_server,established;
content:"GET /?"; depth:6; content:"HTTP/1.1|0D 0A|Host|3A 20|update|2E|";
distance:0; content:"0b8pre|0D 0A|"; fast_pattern:only; http_header; content:!"|0A|
Referer"; http_header; metadata:ruleset community, service http; classtype:trojan-
activity; sid:26212; rev:2;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY JPEG
file magic detected"; flow:to_client,established; file_data; content:"|00 10|JFIF";
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service ftp-
data, service http, service imap, service pop3; classtype:misc-activity; sid:26251;
rev:9;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER Fake
postal receipt HTTP Response phishing attack"; flow:to_client,established;
content:"|3B 20|filename=Postal-Receipt.zip|0D 0A|"; fast_pattern:only;
http_header; file_data; content:"Postal-Receipt.exe"; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,www.urlquery.net/search.php?q=receipt&type=string&start=2013-
01-03&end=2013-01-18&max=50; classtype:trojan-activity; sid:26261; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Dapato
banking Trojan variant outbound connection"; flow:to_server,established; urilen:21;
content:"/pics/_vti_cnf/00.inf"; fast_pattern:only; http_uri; metadata:impact_flag
red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/ebcff32473d032041bd69e9599fbff4ad295128003
f76d1f452ba7cb6e2d20d4/analysis/1364314446/; classtype:trojan-activity; sid:26264;
rev:6;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP DD-WRT
httpd cgi-bin remote command execution attempt"; flow:to_server,established;
content:"/cgi-bin/"; depth:10; nocase; http_uri; content:"${IFS}";
fast_pattern:only; http_uri; metadata:policy balanced-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:bugtraq,35742; reference:bugtraq,94819; reference:cve,2009-2765;
reference:cve,2016-6277; classtype:attempted-admin; sid:26275; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E1500/E2500 apply.cgi submit_button page redirection attempt";
flow:to_server,established; content:"/apply.cgi"; fast_pattern:only; http_uri;
content:"submit_button"; http_client_body; content:"%0"; distance:0;
http_client_body; pcre:"/(^|&)submit_button=[^&]+%0[^&]/Pim"; metadata:ruleset
community, service http; classtype:attempted-admin; sid:26276; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E1500/E2500 apply.cgi submit_button page redirection attempt";
flow:to_server,established; content:"/apply.cgi"; fast_pattern:only; http_uri;
content:"submit_button"; http_raw_uri; content:"%0"; distance:0; http_raw_uri;
pcre:"/[?&]submit_button=[^&]+%0[^&]/i"; metadata:ruleset community, service http;
classtype:attempted-admin; sid:26277; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E1500/E2500 apply.cgi unauthenticated password reset attempt";
flow:to_server,established; content:"/apply.cgi"; fast_pattern:only; http_uri;
content:!"Authorization:"; nocase; http_header; content:"action=Apply"; nocase;
http_client_body; content:"PasswdModify=1"; nocase; http_client_body;
content:"http_passwd="; nocase; http_client_body; content:"http_passwdConfirm=";
nocase; http_client_body; metadata:ruleset community, service http;
reference:bugtraq,57760; reference:url,www.s3cur1ty.de/m1adv2013-004;
classtype:attempted-admin; sid:26278; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E1500/E2500 apply.cgi unauthenticated password reset attempt";
flow:to_server,established; content:"/apply.cgi"; fast_pattern:only; http_uri;
content:!"Authorization:"; nocase; http_header; content:"action=Apply"; nocase;
http_uri; content:"PasswdModify=1"; nocase; http_uri; content:"http_passwd=";
nocase; http_uri; content:"http_passwdConfirm="; nocase; http_uri; metadata:ruleset
community, service http; reference:bugtraq,57760;
reference:url,www.s3cur1ty.de/m1adv2013-004; classtype:attempted-admin; sid:26279;
rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Absolute
Software Computrace outbound connection - search.dnssearch.org";
flow:to_server,established; content:"Host|3A| search.dnssearch.org|0D 0A|";
fast_pattern:only; http_header; content:"TagId: "; http_header; metadata:policy
security-ips drop, ruleset community, service http;
reference:url,absolute.com/support/consumer/technology_computrace;
reference:url,www.blackhat.com/presentations/bh-usa-09/ORTEGA/BHUSA09-Ortega-
DeactivateRootkit-PAPER.pdf; classtype:misc-activity; sid:26286; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Absolute
Software Computrace outbound connection - search.namequery.com";
flow:to_server,established; content:"Host|3A| search.namequery.com|0D 0A|";
fast_pattern:only; http_header; content:"TagId: "; http_header; metadata:policy
security-ips drop, ruleset community, service http;
reference:url,absolute.com/support/consumer/technology_computrace;
reference:url,www.blackhat.com/presentations/bh-usa-09/ORTEGA/BHUSA09-Ortega-
DeactivateRootkit-PAPER.pdf; classtype:misc-activity; sid:26287; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Brontok Worm
variant outbound connection"; flow:to_server,established; content:"User-Agent|3A|
Brontok.A8 Browser|0D 0A|"; fast_pattern:only; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,www.securelist.com/en/descriptions/10286064/Email-
Worm.Win32.Brontok.rf?print_mode=1; classtype:trojan-activity; sid:26288; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Daws Trojan
Outbound Plaintext over SSL Port"; flow:to_server,established; content:"POST";
depth:4; pcre:"/^POST\x20\x2f[a-z]+\.[a-z]{3}\x20HTTP\x2f1\.1\r\n/"; content:"|0D
0A|Content|2D|Disposition|3A 20|form|2D|data|3B 20|name|3D 22|"; pcre:"/
[^\x0d\x0a\x09\x20-\x7e]{4}/R"; pcre:"/\d+\x2d{2}\r\n$/R"; metadata:impact_flag
red, policy security-ips drop, ruleset community, service ssl;
reference:url,www.virustotal.com/file/f810c56734a686fdf46eb3ff895db6f3dd0cebb45c1e7
4bcc1c43f8050242d53/analysis/1359999907/; classtype:trojan-activity; sid:26289;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC file path
used as User-Agent - potential Trojan"; flow:to_server,established; content:"User-
Agent|3A 20|C:|5C|"; fast_pattern:only; http_header; pcre:"/\.exe$/iU";
pcre:"/^User\x2dAgent\x3a\x20c\x3a\x5c[^\r\n]*?\.exe\r\n/Him"; metadata:impact_flag
red, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/5dd932e083cf9d910bc43bb998983f5ec35691c1b8
4708a355f7c46b358fa375/analysis/; classtype:trojan-activity; sid:26319; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Scar variant outbound connection"; flow:to_server,established;
content:".php?mac="; fast_pattern:only; http_uri; content:"|0D 0A|Accept-Language|
3A 20|ko|0D 0A|"; http_header; pcre:"/\.php\?mac\x3d([a-f0-9]{2}\x3a){5}[a-f0-9]
{2}$/U"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/171a0b12197c1b1b525e2db1a62adb6f6c3f42ccb5
704c8174944ee8b901abec/analysis/; classtype:trojan-activity; sid:26325; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
OSX.Trojan.Flashfake variant outbound connection"; flow:to_server,established;
content:"|3B 20|sv|3A|"; http_header; content:"|3B 20|id|3A|"; within:5;
distance:1; http_header; pcre:"/^User\x2dAgent\x3a\s[^\r\n]*?\x3b\x20id\x3a[A-F0-9]
{8}\x2d([A-F0-9]{4}\x2d){3}[A-F0-9]{12}\)[^\r\n]*?\r\n/Hm"; metadata:policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:26327; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC FBI Ransom
Trojan variant outbound connection"; flow:to_server,established;
content:"/nosignal.jpg?"; fast_pattern:only; http_uri;
pcre:"/^\x2fnosignal\.jpg\?\d\.\d+$/U"; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:26335; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
IP address check to dyndns.org detected"; flow:to_server,established;
content:"Host|3A 20|checkip.dyndns.org"; fast_pattern:only; http_header;
metadata:ruleset community, service http; classtype:misc-activity; sid:26353;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection - ksa.txt";
flow:to_server,established; urilen:8; content:"/ksa.txt"; fast_pattern:only;
http_uri; content:"User-Agent|3A 20|Mozilla/3.0 (compatible|3B| Indy Library)";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/d8870137f7f761055a2ac83b03eb3f8fe26015fa0b
a99f41551ca59374c6a3ec/analysis/1365436849/; classtype:trojan-activity; sid:26370;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection - op POST";
flow:to_server,established; content:"op="; depth:3; http_client_body;
content:"&nmpc="; fast_pattern:only; http_client_body; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/d8870137f7f761055a2ac83b03eb3f8fe26015fa0b
a99f41551ca59374c6a3ec/analysis/1365436849/; classtype:trojan-activity; sid:26371;
rev:1;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"MALWARE-OTHER UTF-8 BOM in
zip file attachment detected"; flow:to_server,established; file_data; content:"|EF
BB BF 50 4B 03 04|"; depth:7; metadata:policy security-ips drop, ruleset community,
service smtp; classtype:trojan-activity; sid:26380; rev:3;)
# alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"MALWARE-OTHER UTF-8 BOM
in zip file attachment detected"; flow:to_client,established; file_data; content:"|
EF BB BF 50 4B 03 04|"; depth:7; metadata:policy security-ips drop, ruleset
community, service ftp-data, service imap, service pop3; classtype:trojan-activity;
sid:26381; rev:4;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER UTF-8
BOM in zip file attachment detected"; flow:to_client,established; file_data;
content:"|EF BB BF 50 4B 03 04|"; depth:7; metadata:policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:26382; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Ufasoft
bitcoin miner possible data upload"; flow:to_server,established; content:"User-
Agent|3A| Ufasoft"; fast_pattern:only; http_header; metadata:ruleset community,
service http; reference:url,ufasoft.com/open/bitcoin/; classtype:policy-violation;
sid:26395; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gamarue variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"panel1/gate.php"; content:" HTTP/1.1|0D 0A|
Cache-Control: no-cache|0D 0A|Connection|3A|"; fast_pattern:only; content:"+";
depth:15; http_client_body; metadata:impact_flag red, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/b34f23afc2f6ca093b2923f0aa12d942a5960cf484
75272df5b60edf556e4299/analysis/; classtype:trojan-activity; sid:26398; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
IP address check to j.maxmind.com detected"; flow:to_server,established;
content:"/app/geoip.js"; http_uri; content:"Host|3A 20|j.maxmind.com";
fast_pattern:only; http_header; metadata:ruleset community, service http;
classtype:misc-activity; sid:26410; rev:4;)
# alert tcp any any -> $HOME_NET 445 (msg:"MALWARE-OTHER Win.Worm.Dorkbot folder
snkb0ptz creation attempt SMB"; flow:to_server,established; content:"|73 00 6E 00
6B 00 62 00 30 00 70 00 74 00 7A 00|"; fast_pattern:only; metadata:ruleset
community, service netbios-ssn; classtype:trojan-activity; sid:26411; rev:2;)
# alert tcp any any -> $HOME_NET 445 (msg:"MALWARE-OTHER Win.Worm.Dorkbot
executable snkb0ptz.exe creation attempt SMB"; flow:to_server,established;
content:"|73 00 6E 00 6B 00 62 00 30 00 70 00 74 00 7A 00|"; fast_pattern:only;
content:".exe"; metadata:ruleset community, service netbios-ssn; classtype:trojan-
activity; sid:26412; rev:2;)
# alert tcp any any -> $HOME_NET 445 (msg:"MALWARE-OTHER Win.Worm.Dorkbot
Desktop.ini snkb0ptz.exe creation attempt SMB"; flow:to_server,established;
content:"|73 00 6E 00 6B 00 62 00 30 00 70 00 74 00 7A 00|"; content:"|5C|";
within:1; content:"|00 44 00 65 00 73 00 6B 00 74 00 6F 00 70 00 2E 00 69 00 6E 00
69 00|"; distance:0; metadata:ruleset community, service netbios-ssn;
classtype:trojan-activity; sid:26413; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Magic variant inbound connection"; flow:to_client,established;
file_data; content:"some_magic_code1"; depth:36; metadata:policy security-ips drop,
ruleset community, service http; reference:url,www.seculert.com/blog/2013/04/magic-
persistent-threat.html; classtype:trojan-activity; sid:26467; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"SERVER-ORACLE Oracle WebCenter
FatWire Satellite Server header injection on blobheadername2 attempt";
flow:to_server,established; content:"blobheadername2=Location"; fast_pattern:only;
content:"blobheadervalue2="; nocase; metadata:ruleset community, service http;
reference:cve,2013-1509;
reference:url,www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html;
classtype:web-application-attack; sid:26468; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"SERVER-ORACLE Oracle WebCenter
FatWire Satellite Server header injection on blobheadername2 attempt";
flow:to_server,established; content:"blobheadername2=Refresh"; fast_pattern:only;
content:"blobheadervalue2="; nocase; metadata:ruleset community, service http;
reference:cve,2013-1509;
reference:url,www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html;
classtype:web-application-attack; sid:26469; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Zeus Spam 2013 dated zip/exe HTTP Response - potential malware
download"; flow:to_client,established; content:"-2013.zip|0D 0A|";
fast_pattern:only; content:"-2013.zip|0D 0A|"; http_header; content:"-"; within:1;
distance:-14; http_header; file_data; content:"-2013.exe"; content:"-"; within:1;
distance:-14; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/2eff3ee6ac7f5bf85e4ebcbe51974d0708cef66658
1ef1385c628233614b22c0/analysis/; classtype:trojan-activity; sid:26470; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zbot fake PNG config file download without User-Agent";
flow:to_server,established; content:"Accept:
application/xml,application/xhtml+xml,text/html|3B|q=0.9,text/plain|3B|
q=0.8,image/png,*/*|3B|q=0.5|0D 0A|"; fast_pattern:only; http_header;
pcre:"/\.png$/Ui"; content:!"User-Agent:"; nocase; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:26480; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Unknown
Thinner Encrypted POST botnet C&C"; flow:to_server,established;
content:"/thinner/thumb?img="; fast_pattern:only; http_uri; pcre:"/
[^\x20-\x7e\x0d\x0a]{4}/P"; metadata:impact_flag red, policy security-ips drop,
ruleset community, service http; reference:url,support.clean-mx.de/clean-
mx/viruses.php?sort=firstseen%20desc&review=95.57.120.111; classtype:trojan-
activity; sid:26482; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
JavaScript tag in User-Agent field possible XSS attempt";
flow:to_server,established; content:"User-Agent|3A| <SCRIPT>"; fast_pattern:only;
http_header; metadata:ruleset community, service http;
reference:url,blog.spiderlabs.com/2012/11/honeypot-alert-referer-field-xss-
attacks.html; classtype:web-application-attack; sid:26483; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC User-Agent known
malicious user agent NOKIAN95/WEB"; flow:to_server,established; content:"User-
Agent|3A| NOKIAN95|2F|WEB"; fast_pattern:only; metadata:policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,blog.trendmicro.com/trendlabs-security-intelligence/targeted-attack-
campaign-hides-behind-ssl-communication/; classtype:trojan-activity; sid:26522;
rev:3;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT
Portable Executable downloaded with bad DOS stub"; flow:to_client,established;
file_data; content:"MZ"; depth:2; content:"|2F 2A 14 20|"; distance:0;
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service ftp-data, service http, service imap, service
pop3; reference:cve,2013-2423; reference:url,www.invincea.com/2013/04/k-i-a-java-
cve-2013-2423-via-new-and-improved-cool-ek/; classtype:trojan-activity; sid:26526;
rev:6;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
Unix.Backdoor.Cdorked redirect attempt"; flow:to_client,established;
content:"0aW1lP"; fast_pattern; http_header; content:"/index.php?"; distance:-50;
http_header; base64_decode:bytes 150, offset 10, relative; base64_data;
content:"time="; content:"&src="; distance:0; content:"&surl="; distance:0;
metadata:impact_flag red, ruleset community, service http;
reference:url,blog.sucuri.net/2013/04/apache-binary-backdoors-on-cpanel-based-
servers.html;
reference:url,virustotal.com/en/file/7b3cd8c1bd0249df458084f28d91648ad14e1baf455fdd
53b174481d540070c6/analysis/; classtype:trojan-activity; sid:26528; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Unknown
malware - Incorrect headers - Referer HTTP/1.0"; flow:to_server,established;
content:"Referer: HTTP/1.0|0D 0A|"; fast_pattern:only; http_header; metadata:policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:26533; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Stamp
exploit kit portable executable download"; flow:to_server,established;
content:"/elections.php?"; fast_pattern:only; http_uri; content:" Java/1.";
http_header; pcre:"/\/elections\.php\?([a-z0-9]+\x3d\d{1,3}\&){9}[a-z0-
9]+\x3d\d{1,3}$/U"; flowbits:set,file.exploit_kit.pe; metadata:policy balanced-ips
alert, policy max-detect-ips alert, policy security-ips drop, ruleset community,
service http; reference:cve,2013-0431; classtype:trojan-activity; sid:26534;
rev:6;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"PUA-ADWARE
Win.Adware.BProtector browser hijacker dll list download attempt";
flow:to_server,established; content:"GET"; http_method; content:"/builds/"; nocase;
http_uri; content:"fflists.txt"; nocase; http_uri; metadata:ruleset community,
service http; classtype:misc-activity; sid:26553; rev:3;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known Malicious user agent Brutus AET"; flow:to_server,established;
content:"Mozilla|2F|3.0 |28|Compatible|29 3B|Brutus|2F|AET"; fast_pattern:only;
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http; reference:url,sectools.org/tool/brutus;
classtype:misc-activity; sid:26558; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection - getcomando POST data";
flow:to_server,established; content:"tipo=getcomando&"; fast_pattern:only;
http_client_body; metadata:impact_flag red, policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/en/file/a8f162a9c7347e485db374664227884b16112e2983
923d0888c8b80661f25e44/analysis/1367267173/; classtype:trojan-activity; sid:26560;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established;
content:"&sk1="; fast_pattern:only; http_client_body; content:"bn1="; depth:4;
http_client_body; metadata:impact_flag red, policy security-ips drop, ruleset
community, service http; classtype:trojan-activity; sid:26561; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Nuclear
exploit kit Spoofed Host Header .com- requests"; flow:to_server,established;
content:".com-"; http_header; pcre:"/\r\nHost\x3a\x20[a-z0-9\x2d\x2e]+\.com\x2d[a-
z0-9\x2d\x2e]+(\x3a\d{1,5})?\r\n/Hi"; content:"|0D 0A|Accept|3A 20|text/html,
image/gif, image/jpeg, *|3B| q=.2, */*|3B| q=.2|0D 0A|"; fast_pattern:only;
http_header; metadata:impact_flag red, ruleset community, service http;
classtype:trojan-activity; sid:26562; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Harakit
botnet traffic"; flow:to_server,established; urilen:10; content:"sousi.extasix.com|
0D 0A|"; fast_pattern:only; http_header; content:"/genst.htm"; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.symantec.com/security_response/attacksignatures/detail.jsp?
asid=23239;
reference:url,www.virustotal.com/en/file/3df72fe102fddc74de2da518ea16948bd2c8c0e910
c28c4358367e10723ba21f/analysis/; classtype:trojan-activity; sid:26563; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Potential
hostile executable served from compromised or malicious WordPress site attempt";
flow:to_server,established; content:"/wp-content"; fast_pattern:only; http_uri;
pcre:"/(exe|dll|scr|rar|ps1|bat)$/Ui"; metadata:impact_flag red, policy security-
ips drop, ruleset community, service http;
reference:url,blog.avast.com/2013/05/03/regents-of-louisiana-spreading-sirefef-
malware; classtype:trojan-activity; sid:26576; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user agent Opera 10"; flow:to_server,established;
content:"Opera/10|20|"; fast_pattern:only; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,blog.avast.com/2013/05/03/regents-of-louisiana-spreading-s
irefef-malware; reference:url,dev.opera.com/articles/view/opera-ua-string-changes;
classtype:trojan-activity; sid:26577; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kazy/FakeAV Checkin with IE6 User-Agent"; flow:to_server,established;
content:"/images/m.php?id="; fast_pattern:only; http_uri; content:"|3B 20|MSIE 6.0|
3B 20|"; http_header; content:!"Referer|3A 20|"; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/b288d6eadc9d4bca710f73e850a0901cf5fe62c775
350c9a30ebaf9a05097a0f/analysis/1367713929/; classtype:trojan-activity; sid:26578;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kazy/FakeAV Checkin with IE6 User-Agent"; flow:to_server,established;
content:"/ccbill/m.php?id="; fast_pattern:only; http_uri; content:"|3B 20|MSIE 6.0|
3B 20|"; http_header; content:!"Referer|3A 20|"; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/b288d6eadc9d4bca710f73e850a0901cf5fe62c775
350c9a30ebaf9a05097a0f/analysis/1367713929/; classtype:trojan-activity; sid:26579;
rev:1;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
config.inc.php in iframe"; flow:to_client,established; file_data;
content:"<iframe"; content:"config.inc.php"; within:100; content:"</iframe>";
distance:0; metadata:ruleset community, service http;
reference:url,blog.sucuri.net/2013/05/auto-generated-iframes-to-blackhole-exploit-
kit-following-the-cookie-trail.html; classtype:trojan-activity; sid:26585; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Medfos
Trojan variant outbound connection"; flow:to_server,established; content:"/feed?
req=http"; fast_pattern:only; http_uri; content:"|3B| MSIE "; http_header;
content:!"|0D 0A|Accept-Language:"; http_header; content:!"|0D 0A|Referer:";
http_header; pcre:"/^Host\x3a\x20\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\r?\n/Hsmi";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/5bad5a2e4497f866291813aed264b5dc3c9fad4e56
796306842c7b50b553ae11/analysis/; classtype:trojan-activity; sid:26613; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR
Win.Backdoor.PCRat data upload"; flow:to_server,established; content:"PCRatd";
depth:6; metadata:policy balanced-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/en/file/669DF9DED24D56997D7B1EA6249BB704226DADA092
30DC285AE66CA0C9B7247B/analysis/; classtype:misc-activity; sid:26655; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Travnet Botnet data upload"; flow:to_server,established;
content:"hostid="; http_uri; content:"|26|hostname="; http_uri; content:"|26|
hostip="; http_uri; metadata:policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/F7E9A1A4FC4766ABD799B517AD70CD5FA234C8ACC1
0D96CA51ECF9CF227B94E8/analysis/; classtype:trojan-activity; sid:26656; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Shiz variant outbound connection"; flow:to_server,established;
content:"GET"; http_method; content:"/login.php"; depth:10; http_uri;
content:"Referer|3A| http://www.google.com"; http_header; content:"User-Agent|3A|
Mozilla/4.0 |28|compatible|3B| MSIE 2.0|3B|"; fast_pattern:only; http_header;
pkt_data; content:"HTTP/1.0|0D 0A|"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,camas.comodo.com/cgi-bin/submit?
file=58963fd6a567513990ec6be52dc036bc5b728bb6528fca61227b22681ac838e6;
reference:url,www.virustotal.com/en/file/58963fd6a567513990ec6be52dc036bc5b728bb652
8fca61227b22681ac838e6/analysis/1368563326/; classtype:trojan-activity; sid:26657;
rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"BROWSER-WEBKIT
Possible Google Chrome Plugin install from non-trusted source";
flow:to_server,established; content:!"googleusercontent"; http_header;
content:!"google.com"; http_header; content:"|2F|crx|2F|blobs"; http_uri;
content:!"gvt1.com"; http_header; metadata:ruleset community, service http;
reference:url,blogs.technet.com/b/mmpc/archive/2013/05/10/browser-extension-
hijacks-facebook-profiles.aspx; classtype:bad-unknown; sid:26658; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"BROWSER-FIREFOX
Possible Mozilla Firefox Plugin install from non-Mozilla source";
flow:to_server,established; content:!"mozilla"; http_header; content:".xpi";
nocase; http_uri; pcre:"/\.xpi$/Ui"; metadata:ruleset community, service http;
reference:url,research.zscaler.com/2012/09/how-to-install-silently-malicious.html;
classtype:bad-unknown; sid:26659; rev:3;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER Fake
delivery information phishing attack"; flow:to_client,established; content:"|3B|
filename="; http_header; content:"Delivery_Information_ID-"; fast_pattern:only;
http_header; file_data; content:"Delivery_Information_ID-"; content:".exe";
within:50; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http; classtype:trojan-activity; sid:26660;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Namihno variant outbound request"; flow:to_server,established;
content:"/windows/update/search?hl="; http_uri; content:"&q="; distance:0;
http_uri; content:"&meta="; distance:0; http_uri; content:"&id="; distance:0;
http_uri; metadata:policy balanced-ips alert, policy security-ips drop, ruleset
community, service http; classtype:trojan-activity; sid:26695; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Cbeplay
Ransomware variant outbound connection - Abnormal HTTP Headers";
flow:to_server,established; content:"POST /index.php HTTP/1.1|0D 0A|Content-Type:
multipart/form-data|3B| boundary="; depth:70; content:"|0D 0A|Connection: close|0D
0A|Cache-Control: no-cache|0D 0A|Content-Length: "; http_header; content:"|3B|
name=|22|data|22 3B| filename=|22|"; fast_pattern:only; http_client_body;
metadata:impact_flag red, policy balanced-ips alert, policy security-ips drop,
ruleset community, service http;
reference:url,malware.dontneedcoffee.com/2013/02/cbeplayp-now-target-australia-and-
moved.html; classtype:trojan-activity; sid:26696; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Cbeplay
Ransomware variant outbound connection - POST Body"; flow:to_server,established;
content:"index.php"; http_uri; content:"|3B| name=|22|data|22 3B| filename=|22|";
fast_pattern:only; http_client_body; content:"--"; depth:2; http_client_body;
pcre:"/filename=\x22\d+\x22\r\n/P"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,malware.dontneedcoffee.com/2013/02/cbeplayp-now-target-australia-and-
moved.html; classtype:trojan-activity; sid:26697; rev:3;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Compromised Website response - leads to Exploit Kit"; flow:to_client,established;
file_data; content:"<!--ded509-->"; content:"<!--/ded509-->"; distance:0;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http; reference:url,www.jsunpack.jeek.org/?
report=c94ca7cda909cf93ae95db22a27bb5d711c2ae8f; classtype:trojan-activity;
sid:26698; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Kazy Trojan
check-in"; flow:to_server,established; content:"User-Agent: Opera/11 |28|Windows NT
5.1|3B 20 3B| x86|29|"; fast_pattern:only; http_header; content:"/count.php?page=";
depth:16; http_uri; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,camas.comodo.com/cgi-bin/submit?
file=6d823488b26533f5151c3bab93c2a8ba832c9320e612d58d1134740abe3ca157;
classtype:trojan-activity; sid:26712; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.BlackRev rev 1 outbound traffic"; flow:to_server,established;
content:"gate.php|3F|reg="; http_uri; content:"User-Agent|3A| Mozilla/4.0
(compatible|3B| Synapse)|0D 0A|"; fast_pattern:only; http_header;
pcre:"/gate\x2ephp\x3freg=[a-z]{10}/U"; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26713; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.BlackRev rev 2 outbound traffic"; flow:to_server,established;
content:"gate.php|3F|reg="; http_uri; pcre:"/gate\x2ephp\x3freg=[a-zA-Z]{15}/U";
content:"User-Agent|3A| Mozilla/4.0 (SEObot)|0D 0A|"; fast_pattern:only;
http_header; metadata:policy balanced-ips drop, policy security-ips drop, ruleset
community, service http; reference:url,ddos.arbornetworks.com/2013/05/the-
revolution-will-be-written-in-delphi; classtype:trojan-activity; sid:26714; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.BlackRev rev 3 outbound traffic"; flow:to_server,established;
content:"gate.php|3F|id="; http_uri; content:"User-Agent|3A| Mozilla/4.0
(compatible|3B| SEObot)|0D 0A|"; fast_pattern:only; http_header;
pcre:"/gate\x2ephp\x3fid=[a-z]{15}/U"; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26715; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kbot variant outbound connection"; flow:to_server,established;
content:"s_alive.php?id="; fast_pattern:only; http_uri; metadata:policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,blog.avast.com/2013/05/22/grum-lives/; classtype:trojan-activity;
sid:26719; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kbot variant outbound connection"; flow:to_server,established;
content:"s_task.php?id="; fast_pattern:only; http_uri; metadata:policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,blog.avast.com/2013/05/22/grum-lives/; classtype:trojan-activity;
sid:26720; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Bancos fake
JPG encrypted config file download"; flow:to_server,established; content:".com.br|
0D 0A 0D 0A|"; fast_pattern:only; content:"/imagens/"; depth:9; http_uri;
content:".jpg"; distance:0; http_uri; pcre:"/\.jpg\x20HTTP\/1\.
[01]\r\nUser\x2dAgent\x3a\x20[a-z]+\r\nHost\x3a\x20[a-z0-9\x2d\x2e]
+\.com\.br\r\n\r\n$/"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:26722; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Trojan
Downloader7"; flow:to_server,established; content:".lavaibrasilok.com|0D 0A 0D
0A|"; fast_pattern:only; content:"|3B| MSIE "; http_header; content:!"Accept-
Language:"; http_header; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.drwebhk.com/en/virus_techinfo/Trojan.DownLoader7.25647.html;
classtype:trojan-activity; sid:26723; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc http command"; flow:to_client,established; file_data;
content:"http|7C|"; depth:5; pcre:"/^http\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26725; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc stop command"; flow:to_client,established; file_data;
content:"stop|7C|"; depth:5; pcre:"/^stop\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26726; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc die command"; flow:to_client,established; file_data;
content:"die|7C|"; depth:4; pcre:"/^die\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26727; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc sleep command"; flow:to_client,established; file_data;
content:"sleep|7C|"; depth:6; pcre:"/^sleep\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26728; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc simple command"; flow:to_client,established; file_data;
content:"simple|7C|"; depth:7; pcre:"/^simple\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26729; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc loginpost command"; flow:to_client,established; file_data;
content:"loginpost|7C|"; depth:10; pcre:"/^loginpost\x7c\d+\x7c\d+\x7C[a-z0-
9]+\x2E[a-z]{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26730; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc datapost command"; flow:to_client,established; file_data;
content:"datapost|7C|"; depth:9; pcre:"/^datapost\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-
z]{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26731; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc syn command"; flow:to_client,established; file_data;
content:"syn|7C|"; depth:4; pcre:"/^syn\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26732; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc udp command"; flow:to_client,established; file_data;
content:"udp|7C|"; depth:4; pcre:"/^udp\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26733; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc udpdata command"; flow:to_client,established; file_data;
content:"udpdata|7C|"; depth:8; pcre:"/^udpdata\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26734; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc data command"; flow:to_client,established; file_data;
content:"data|7C|"; depth:5; pcre:"/^data\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26735; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc icmp command"; flow:to_client,established; file_data;
content:"icmp|7C|"; depth:5; pcre:"/^icmp\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26736; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc tcpdata command"; flow:to_client,established; file_data;
content:"tcpdata|7C|"; depth:8; pcre:"/^tcpdata\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26737; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc dataget command"; flow:to_client,established; file_data;
content:"dataget|7C|"; depth:8; pcre:"/^dataget\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26738; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc connect command"; flow:to_client,established; file_data;
content:"connect|7C|"; depth:8; pcre:"/^connect\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26739; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc dns command"; flow:to_client,established; file_data;
content:"dns|7C|"; depth:4; pcre:"/^dns\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26740; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc exec command"; flow:to_client,established; file_data;
content:"exec|7C|"; depth:5; isdataat:!200; pcre:"/^exec\x7c\d+\x7c\d+\x7C[a-z0-
9]+\x2E[a-z]{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26741; rev:5;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc resolve command"; flow:to_client,established; file_data;
content:"resolve|7C|"; depth:8; pcre:"/^resolve\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26742; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc antiddos command"; flow:to_client,established; file_data;
content:"antiddos|7C|"; depth:9; pcre:"/^antiddos\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-
z]{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26743; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc range command"; flow:to_client,established; file_data;
content:"range|7C|"; depth:6; pcre:"/^range\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26744; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc ftp command"; flow:to_client,established; file_data;
content:"ftp|7C|"; depth:4; pcre:"/^ftp\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26745; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc download command"; flow:to_client,established; file_data;
content:"download|7C|"; depth:9; pcre:"/^download\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-
z]{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26746; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc fastddos command"; flow:to_client,established; file_data;
content:"fastddos|7C|"; depth:9; pcre:"/^fastddos\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-
z]{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26747; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc slowhttp command"; flow:to_client,established; file_data;
content:"slowhttp|7C|"; depth:9; pcre:"/^slowhttp\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-
z]{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26748; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc allhttp command"; flow:to_client,established; file_data;
content:"allhttp|7C|"; depth:8; pcre:"/^allhttp\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26749; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.BlackRev cnc full command"; flow:to_client,established; file_data;
content:"full|7C|"; depth:5; pcre:"/^full\x7c\d+\x7c\d+\x7C[a-z0-9]+\x2E[a-z]
{2,3}\x7C[a-z0-9]+\x7C/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-
delphi; classtype:trojan-activity; sid:26750; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Worm.Luder variant outbound connection"; flow:to_server,established;
content:"/loader.cpl"; fast_pattern:only; http_uri; pcre:"/\/loader\.cpl$/U";
content:"|3B 20|MSIE|20|"; http_header; content:!"|0D 0A|Accept-Language:";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/6077fd6cbb44c78a16d66fedb10492c7776127dc76
ee071b051970971212bae8/analysis/; classtype:trojan-activity; sid:26774; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Blocker variant outbound connection HTTP Header Structure";
flow:to_server,established; urilen:11; content:"GET"; http_method;
content:"/index.html"; http_uri; content:".info|0D 0A|Cache-Control: no-cache|0D 0A
0D 0A|"; fast_pattern:only; pcre:"/HTTP\/1.[01]\r\nUser\x2dAgent\x3a\x20[ -~]
+\r\nHost\x3a\x20[a-z0-9\x2d\x2e]+\.info\r\n/"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/c157a06965bf9edc101350c6122d108ccb1d99600c
bb6967ef41dfed255f2009/analysis/; classtype:trojan-activity; sid:26775; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Blocker variant outbound connection POST"; flow:to_server,established;
content:"POST"; http_method; content:"cmd=gravar&dados="; fast_pattern:only;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/c157a06965bf9edc101350c6122d108ccb1d99600c
bb6967ef41dfed255f2009/analysis/; classtype:trojan-activity; sid:26776; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Cridex encrypted POST check-in"; flow:to_server,established;
content:"/cos3q/in"; fast_pattern:only; http_uri; content:".exe"; nocase;
http_client_body; pcre:"/\x5f\w{24}\.exe/Pi"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/843ffd922b9bd902d736ddb664b578cde6e3033fa5
a14b862b09045c36aa7524/analysis/1369942427/; classtype:trojan-activity; sid:26779;
rev:3;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC cridex HTTP
Response - default0.js"; flow:to_client,established; file_data; content:"|00|
<script type=|22|text/javascript|22| src=|22|/scripts/default0.js|22|></script>|
00|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/843ffd922b9bd902d736ddb664b578cde6e3033fa5
a14b862b09045c36aa7524/analysis/1369942427/; classtype:trojan-activity; sid:26780;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC XP Fake
Antivirus Payment Page Request"; flow:to_server,established; urilen:23;
content:"/content/img/awards.jpg"; fast_pattern:only; http_uri;
pcre:"/\r\nReferer\x3A\x20http\x3A\x2F\x2f[a-z0-9\x2d\x2e]
+\x2F\x3Fdo\x3Dpayment\x26ver\x3D\d+\x26sid\x3D\d+\x26sn\x3D\d+\r\n/H";
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http; reference:url,camas.comodo.com/cgi-bin/submit?
file=cf3eff5320b0c8d41490e412e89b97559bf34fcde8f9934e5fb7c76467a679d8;
classtype:trojan-activity; sid:26811; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC XP Fake
Antivirus Check-in"; flow:to_server,established; urilen:11; content:"|3B| MSIE 6.0|
3B| Windows NT 5.1)|0D 0A|Accept: */*|0D 0A|"; fast_pattern:only; http_header;
pcre:"/^\x2F\d{10}$/U"; metadata:policy balanced-ips drop, policy security-ips
drop, ruleset community, service http; reference:url,camas.comodo.com/cgi-
bin/submit?file=cf3eff5320b0c8d41490e412e89b97559bf34fcde8f9934e5fb7c76467a679d8;
classtype:trojan-activity; sid:26812; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Blackholev2 exploit kit Initial Gate from Linked-In Mailing Campaign";
flow:to_server,established; urilen:17,norm; content:"/linkendorse.html";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:trojan-activity; sid:26814; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Sweet Orange
exploit kit landing page in.php base64 uri"; flow:to_server,established;
urilen:<75; content:"/in.php"; http_uri; content:"&q="; distance:0; http_uri;
content:"=="; distance:0; http_uri; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2010-0188; reference:cve,2012-0422; reference:cve,2012-
0431; reference:cve,2012-0607; reference:cve,2012-1723; reference:cve,2012-4681;
reference:cve,2012-5076; reference:cve,2013-2423; classtype:trojan-activity;
sid:26834; rev:5;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC RDN Banker
POST variant outbound connection"; flow:to_server,established; content:"POST";
http_method; content:"op=IncluirAvisos&"; fast_pattern:only; http_client_body;
content:"HostBD="; depth:7; offset:17; http_client_body; metadata:impact_flag red,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/1a23f27b046af92b7dd2c4a8f8349c9fd9582ad91b
5a61556470c58b15af3b26/analysis/1369251144/; classtype:trojan-activity; sid:26835;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC RDN Banker
Strange Google Traffic"; flow:to_server,established; urilen:30; content:"User-
Agent: Mozilla/4.0 (compatible|3B| Win32|3B| WinHttp.WinHttpRequest.5)";
fast_pattern:only; http_header; content:"Host: www.google.com"; http_header;
metadata:impact_flag red, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/1a23f27b046af92b7dd2c4a8f8349c9fd9582ad91b
5a61556470c58b15af3b26/analysis/1369251144/; classtype:trojan-activity; sid:26836;
rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC BitBot Idle
C2 response"; flow:to_client,established; file_data; content:"<|5C||5C||5C|>IDLE<|
5C||5C||5C|>"; depth:18; metadata:policy balanced-ips drop, policy security-ips
drop, ruleset community, service http; classtype:trojan-activity; sid:26837;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Blackholev2 exploit kit Initial Gate from NatPay Mailing Campaign";
flow:to_server,established; content:"/natpay.html?"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; classtype:trojan-activity; sid:26838;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-BACKDOOR
Win.Backdoor.Boda Malware Checkin"; flow:to_server,established; content:"macName=";
depth:60; http_client_body; content:"&macOS="; within:100; http_client_body;
content:"&macMac="; within:200; http_client_body; metadata:policy balanced-ips
drop, policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:26842; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC ZeroAccess
Encrypted 128-byte POST No Accept Headers"; flow:to_server,established;
content:"POST"; http_method; content:"Content-Length: 128|0D 0A|";
fast_pattern:only; http_header; content:" HTTP/1."; content:"|0D 0A|User-Agent: ";
within:14; distance:1; content:!"|0D 0A|Accept"; http_header; pcre:"/[^ -~\x0d\x0a]
{4}/P"; metadata:ruleset community, service http; classtype:trojan-activity;
sid:26910; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Rombrast Trojan outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/info.php?act="; fast_pattern:only; http_uri;
pcre:"/^\/info\.php\?act\x3d(list|online)/U"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/deac0b06fb36e38520b002489dae6fff3d346e72d3
31c3889e9d2764fe2bcf14/analysis/; classtype:trojan-activity; sid:26911; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Rombrast Trojan outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"<|7C|>"; fast_pattern:only; http_client_body;
content:"data="; depth:5; http_client_body; content:"<|7C|>"; within:3;
distance:31; http_client_body; content:"<|7C|>"; distance:0; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/deac0b06fb36e38520b002489dae6fff3d346e72d3
31c3889e9d2764fe2bcf14/analysis/; classtype:trojan-activity; sid:26912; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established;
content:"/images/"; http_uri; content:".php?id="; distance:1; http_uri;
pcre:"/\/images\/[a-zA-Z]\.php\?id\=[0-9]{2,3}(\.\d)?$/Ui"; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:26923; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Potential
Gozi Trojan HTTP Header Structure"; flow:to_server,established; urilen:255<>260;
content:"= HTTP/1."; fast_pattern:only; content:".php?"; http_uri;
content:!"Accept"; http_header; pcre:"/^\/[a-z]{2,20}\.php\?[a-z]{2,10}\x3d[a-zA-
Z0-9\x2f\x2b]+\x3d$/I"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:26924; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SQL generic convert
injection attempt - GET parameter"; flow:to_server,established; content:"convert|
28|"; fast_pattern:only; http_uri; metadata:policy max-detect-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.securiteam.com/securityreviews/5DP0N1P76E.html; classtype:web-
application-attack; sid:26925; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT
DotkaChef/Rmayana/DotCache exploit kit inbound java exploit download";
flow:to_client,established; content:"filename=atom.jar"; fast_pattern:only;
http_header; metadata:policy max-detect-ips drop, ruleset community, service http;
reference:cve,2013-2423; reference:url,www.basemont.com/new_exploit_kit_june_2013;
classtype:trojan-activity; sid:26947; rev:5;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT
DotkaChef/Rmayana/DotCache exploit kit inbound java exploit download";
flow:to_client,established; content:"filename=site.jar"; fast_pattern:only;
http_header; metadata:policy max-detect-ips drop, ruleset community, service http;
reference:cve,2013-1493; reference:url,www.basemont.com/new_exploit_kit_june_2013;
classtype:trojan-activity; sid:26948; rev:5;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT
DotkaChef/Rmayana/DotCache exploit kit landing page"; flow:to_client,established;
file_data; content:"<applet width="; content:"0"; within:1; distance:1; content:"
height="; within:8; distance:1; content:"0"; within:1; distance:1; content:"
code="; within:6; distance:1; content:"site.avi"; within:8; distance:1; nocase;
content:" archive="; within:9; distance:1; metadata:policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.basemont.com/new_exploit_kit_june_2013; classtype:trojan-
activity; sid:26949; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
DotkaChef/Rmayana/DotCache exploit kit Malvertising Campaign URI request";
flow:to_server,established; content:"/.cache/?f="; fast_pattern; http_uri;
content:".jar"; http_uri; pcre:"/[^&]+&[a-z]=[a-f0-9]{16}&[a-z]=[a-f0-9]{16}$/U";
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http; reference:url,research.zscaler.com/2013/06/openxadvertisingcom-mass-
malvertising.html; classtype:trojan-activity; sid:26951; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Win32 Facebook Secure Cryptor C2"; flow:to_server,established;
content:"/forum/search.php?email="; http_uri; content:"&method="; distance:0;
http_uri; content:!"Referer"; http_header; content:!"Accept-"; http_header;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http; reference:url,blog.avast.com/2013/06/18/your-facebook-connection-is-
now-secured; classtype:trojan-activity; sid:26965; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win32/Autorun.JN variant outbound connection"; flow:to_server,established;
dsize:142; urilen:8; content:"/u5.htm"; fast_pattern:only; http_uri;
content:"//u5.htm"; http_raw_uri; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?
Name=Worm%3AWin32%2FAutorun.JN;
reference:url,www.virustotal.com/en/file/36144738373c665d262bc007fceaeb9613e59ec29e
a3d7424dd9f400af2c0f06/analysis/; classtype:trojan-activity; sid:26966; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gozi Data Theft POST Data"; flow:to_server,established; content:"POST";
http_method; content:"data.php"; http_uri; content:"|0D 0A|URL: ";
fast_pattern:only; http_client_body; content:"Content-Disposition: form-data|3B|
name="; http_client_body; metadata:impact_flag red, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/b78c5c53d3b54acbca2b344a779528f0408258b6ac
12899c860d99bf563e883a/analysis/; classtype:trojan-activity; sid:26968; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gozi Trojan Data Theft POST URL"; flow:to_server,established;
content:"POST"; http_method; content:".php?version="; http_uri; content:"&user=";
distance:0; http_uri; content:"&server="; distance:0; http_uri; content:"&name=";
distance:0; http_uri; metadata:impact_flag red, policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/en/file/b78c5c53d3b54acbca2b344a779528f0408258b6ac
12899c860d99bf563e883a/analysis/; classtype:trojan-activity; sid:26969; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Pirminay variant outbound connection"; flow:to_server,established;
content:"Cookie: cache=cc2="; fast_pattern:only; content:"cache=cc2="; http_cookie;
pcre:"/Host\x3a\x20\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\r\n/H"; metadata:impact_flag
red, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/97f97c2126ed6ffc447a5f8c72d504679129a38f8a
62e4678321f9a8057c3307/analysis/; classtype:trojan-activity; sid:26970; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Injector Info Stealer Trojan variant outbound connection";
flow:to_server,established; content:"/xgi-bin/"; depth:9; http_uri;
content:".php?"; within:5; distance:1; http_uri; content:"|3B| MSIE "; http_header;
content:!"Accept-Language:"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/4BAF26D033E17F0171AB27291649EEAE19EE33BD02
46F17BC921E3ADB7F36F42/analysis/; classtype:trojan-activity; sid:26984; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Rawin
exploit kit outbound java retrieval"; flow:to_server,established;
content:"rawin.php?b="; http_uri; content:"&v=1."; distance:0; http_uri;
pcre:"/\.php\?b=[A-F0-9]+&v=1\./U"; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:26985; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Dapato variant inbound response connection"; flow:to_client,established;
content:"Content-Length: 150|0D 0A|"; fast_pattern:only; http_header; file_data;
content:"|0D 0A|"; depth:2; offset:4; content:"|0D 0A|"; within:2; distance:4;
content:"|0D 0A|"; within:2; distance:4; pcre:"/^([A-F0-9]{4})\r\n\1\r\n\1\r\n([A-
F0-9]{26})\r\n[A-F0-9]{48}\r\n\2\r\n\2$/"; metadata:impact_flag red, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/111ffe389dc8fa802b8aff3b4e02a2f59d1b649276
3f9dc5a20a84f4da46932a/analysis/; classtype:trojan-activity; sid:27017; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.OnlineGameHack variant outbound connection"; flow:to_server,established;
content:"/get.asp?mac="; http_uri; content:"&os="; within:36; http_uri;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http;
reference:url,image.ahnlab.com/global/upload/download/asecreport/ASEC_Report_Vol.39
_Eng.pdf; classtype:trojan-activity; sid:27039; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Styx exploit
kit plugin detection connection jorg"; flow:to_server,established;
content:"/jorg.html"; fast_pattern:only; http_uri; pcre:"/\/jorg\.html$/U";
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; reference:cve,2007-5659; reference:cve,2008-
0655; reference:cve,2011-3544; reference:cve,2012-0507; reference:cve,2012-1723;
reference:cve,2012-4681; reference:cve,2012-4969; reference:cve,2013-0422;
reference:cve,2013-2423; classtype:trojan-activity; sid:27040; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Styx exploit
kit plugin detection connection jlnp"; flow:to_server,established;
content:"/jlnp.html"; fast_pattern:only; http_uri; pcre:"/\/jlnp\.html$/U";
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; reference:cve,2007-5659; reference:cve,2008-
0655; reference:cve,2011-3544; reference:cve,2012-0507; reference:cve,2012-1723;
reference:cve,2012-4681; reference:cve,2012-4969; reference:cve,2013-0422;
reference:cve,2013-2423; classtype:trojan-activity; sid:27041; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Styx exploit
kit plugin detection connection jovf"; flow:to_server,established;
content:"/jovf.html"; fast_pattern:only; http_uri; pcre:"/\/jovf\.html$/U";
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; reference:cve,2007-5659; reference:cve,2008-
0655; reference:cve,2011-3544; reference:cve,2012-0507; reference:cve,2012-1723;
reference:cve,2012-4681; reference:cve,2012-4969; reference:cve,2013-0422;
reference:cve,2013-2423; classtype:trojan-activity; sid:27042; rev:5;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user-agent string pb - Htbot"; flow:to_server,established;
content:"User-Agent: pb|0D 0A|"; fast_pattern:only; http_header;
metadata:impact_flag red, policy security-ips drop, ruleset community, service
http;
reference:url,malwr.com/analysis/MTNlMDg4ZTQwZjU2NDUxM2EwZDNlYzllNjZkMjRkNDI/;
reference:url,www.virustotal.com/en/file/36802c72d1d5addc87d16688dcb37b680fd48f832f
a7b93c15cf4f426aa3f0a7/analysis/; classtype:trojan-activity; sid:27044; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Blocker Download"; flow:to_client,established; flowbits:isset,file.exe;
content:"filename="; http_header; content:"security_cleaner.exe";
fast_pattern:only; http_header; metadata:impact_flag red, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/6d4d93f68aaf783a2526d920fa3c070d061fd56853
669a72a10b2c2232008582/analysis/1372086855/; classtype:trojan-activity; sid:27045;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
Unknown ?1 redirect"; flow:to_server,established; content:"GET /?1 HTTP/1.1";
fast_pattern:only; metadata:ruleset community, service http; classtype:bad-unknown;
sid:27047; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT Unknown
Malvertising exploit kit Hostile Jar pipe.class"; flow:to_client,established;
flowbits:isset,file.jar; file_data; content:"PK"; content:"|00|pipe.class";
distance:0; content:"|00|inc.class"; distance:0; content:"|00|fdp.class";
distance:0; fast_pattern; metadata:policy balanced-ips drop, policy security-ips
drop, ruleset community, service http; classtype:trojan-activity; sid:27085;
rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT Unknown
Malvertising exploit kit stage-1 redirect"; flow:to_client,established;
content:"<html><body><script>|0A|var "; fast_pattern;
content:"document.createElement("; within:80; content:".setAttribute(|22|archive|
22|, "; within:65; content:".setAttribute(|22|codebase|22|, "; within:65;
content:".setAttribute(|22|id|22|, "; within:65; content:".setAttribute(|22|code|
22|, "; within:65; content:"|22|)|3B 0A|document.body.appendChild("; within:65;
content:"</script>|0A|</body>|0A|</html>|0A 0A|"; metadata:policy balanced-ips
drop, policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:27086; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Blackholev2/Cool exploit kit outbound portable executable request";
flow:to_server,established; content:"php?sf="; http_uri; content:"&Ze=";
distance:0; http_uri; content:"&m="; distance:0; http_uri; pcre:"/php\?
sf=\d+\&Ze=\d+\&m=\d+/U"; flowbits:set,file.exploit_kit.pe; metadata:policy
balanced-ips alert, policy max-detect-ips alert, policy security-ips alert, ruleset
community, service http; classtype:trojan-activity; sid:27110; rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
DotkaChef/Rmayana/DotCache exploit kit Zeroaccess download attempt";
flow:to_server,established; content:"/?f=a"; http_uri; content:"&k="; distance:0;
http_uri; pcre:"/\&k=\d+($|\&h=)/U"; flowbits:set,file.exploit_kit.jar;
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; reference:cve,2013-1493; reference:cve,2013-
2423; reference:url,www.basemont.com/new_exploit_kit_june_2013;
reference:url,www.malwaresigs.com/2013/06/14/dotcachef/; classtype:trojan-activity;
sid:27113; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Private
exploit kit outbound traffic"; flow:to_server,established; content:".php?";
http_uri; content:"content-type: application/"; http_header; content:" Java/1";
http_header; pcre:"/\x2ephp\x3f[a-z]+=[a-fA-Z0-9]+&[a-z]+=[0-9]+$/iU";
metadata:policy balanced-ips alert, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; reference:cve,2006-0003; reference:cve,2010-
0188; reference:cve,2011-3544; reference:cve,2013-1347; reference:cve,2013-1493;
reference:cve,2013-2423; reference:url,malwageddon.blogspot.com/2013/07/unknown-ek-
well-hey-hey-i-wanna-be.html; reference:url,malware.dontneedcoffee.com/2013/07/pep-
new-bep.html; reference:url,www.malwaresigs.com/2013/07/03/another-unknown-ek;
classtype:trojan-activity; sid:27144; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Meredrop variant outbound connection GET Request";
flow:to_server,established; content:"/?"; depth:2; http_uri; content:"h=NT";
fast_pattern:only; http_uri; pcre:"/\.[A-Z\d]{8}\x2d[A-Z\d]{6}\x2d[A-Z\d]{6}\x2d[A-
Z\d]{8}/U"; metadata:impact_flag red, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/dfb0050cb7fd6c879027cbecda703613b8d9fb2b2a
5682478dbcd0518172302c/analysis/1373576492/; classtype:trojan-activity; sid:27199;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Meredrop variant outbound connection POST Request";
flow:to_server,established; content:"POST"; content:"|3B 20|MSIE 28|3B 20|";
fast_pattern:only; http_header; content:"User-Agent"; http_header;
pcre:"/User\x2dAgent\x3a\x20[ -~]*?\.[A-Z\d]{8}\x2d[A-Z\d]{6}\x2d[A-Z\d]{6}\x2d[A-
Z\d]{8}\x3b[ -~]*?\r\n/H"; metadata:impact_flag red, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/dfb0050cb7fd6c879027cbecda703613b8d9fb2b2a
5682478dbcd0518172302c/analysis/1373576492/; classtype:trojan-activity; sid:27200;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Neurevt variant outbound connection"; flow:to_server,established;
content:"ps0="; depth:4; http_client_body; content:"ps1="; distance:0;
http_client_body; content:"cs1="; distance:0; http_client_body; content:"cs2=";
distance:0; http_client_body; content:"cs3="; distance:0; http_client_body;
pcre:"/ps0=[A-F0-9]*&ps1=[A-F0-9]*&cs1=[A-F0-9]*&cs2=[A-F0-9]*&cs3=[A-F0-9]*/P";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:27201; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
Apache auto_prepend_file a.control.bin C2 traffic"; flow:to_server,established;
content:"User-Agent|3A| SEX|2F|1"; fast_pattern:only; http_header; metadata:ruleset
community, service http; reference:url,blog.sucuri.net/2013/06/apache-php-
injection-to-javascript-files.html; classtype:trojan-activity; sid:27203; rev:3;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC Potential
Bancos Brazilian Banking Trojan Browser Proxy Autoconfig File";
flow:to_client,established; file_data; content:"return |22|DIRECT|22|";
fast_pattern:only; content:".com.br"; nocase; pcre:"/\x22[a-z\d\x2e\x2d]
{1,10}\x22\s{0,3}\+\s{0,3}\x22[a-z\d\x2e\x2d]{1,10}\x22\s{0,3}\+\s{0,3}\x22[a-
z\d\x2e\x2d]{1,10}\x22/i"; metadata:impact_flag red, ruleset community, service
http; classtype:trojan-activity; sid:27204; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER Mac OSX
FBI ransomware"; flow:to_client,established; file_data; content:"<iframe src=|22|
YOUR|25|20BROWSER|25|20HAS|25|20BEEN|25|20LOCKED"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,blog.malwarebytes.org/intelligence/2013/07/fbi-ransomware-now-
targeting-apples-mac-os-x-users/; classtype:trojan-activity; sid:27246; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gamarue - Mozi1la User-Agent"; flow:to_server,established;
content:"User-Agent|3A| Mozi1la/4.0|0D 0A|"; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/03103b40b95070e4d14803e949dc754ca02bcea25e
8b3a4194f7d248f15ca515/analysis/; classtype:trojan-activity; sid:27248; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ZeroAccess 111-byte URL variant outbound connection";
flow:to_server,established; urilen:111; content:"=="; depth:2; offset:103;
content:" HTTP/1.0|0D 0A|Host:"; within:16; distance:10; pcre:"/^\/[a-z\d]
{98}\x3d{2}[a-z\d]{10}$/Ui"; content:!"Accept:"; http_header; metadata:impact_flag
red, policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:27252; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Cridex Encrypted POST w/ URL Pattern"; flow:to_server,established;
urilen:<34; content:"POST"; http_method; content:"U|3B| MSIE "; http_header;
content:"|0D 0A|Connection|3A| Keep-Alive|0D 0A|Cache-Control|3A| no-cache";
fast_pattern:only; http_header; content:!"Accept-Language:"; http_header;
pcre:"/\x2f[A-Za-z0-9\x2b\x2f\x3d]{1,10}\x2f[A-Za-z0-9\x2b\x2f\x3d]{1,10}\x2f[A-Za-
z0-9\x2b\x2f\x3d]{1,10}\x2f([A-Za-z0-9\x2b\x2f\x3d]{1,10})?(\x2f[A-Za-z0-
9\x2b\x2f\x3d]{1,10})?/U"; pcre:"/[^ -~\x0d\x0a]{4}/P"; metadata:impact_flag red,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/cd0cdc216e456b34dc2e4c6db6bacbbba20122489e
6751621f921ca53cc7e421/analysis/; classtype:trojan-activity; sid:27253; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Yakes
Trojan HTTP Header Structure"; flow:to_server,established; content:"POST";
http_method; content:".php HTTP/1.1|0D 0A|Cache-Control: "; fast_pattern:only;
content:".php HTTP/1.1"; nocase; content:"|0D 0A|Cache-Control: no-cache|0D 0A|
Connection: close|0D 0A|Pragma: no-cache|0D 0A|Content-Type: application/x-www-
form-urlencoded|0D 0A|"; within:113; pcre:"/coded\r\nUser\x2dAgent\x3a\x20[ -~]
+\r\nContent\x2dLength\x3a\x20[2-9][02468]\r\nHost\x3a\x20[a-z0-9\x2d\x2e]
+\r\n\r\n[a-zA-Z0-9\x2f\x2b\x3d]{20,}$/"; pcre:"/[\x2f\x2b\x3d]/P";
metadata:impact_flag red, ruleset community, service http;
reference:url,www.virustotal.com/en/file/980c4ed3dd130c9313a35434e0b102a6b8b038c987
35814834334ccc03e4da3c/analysis/; classtype:trojan-activity; sid:27254; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
All Numbers .EXE file name from abnormally ordered HTTP headers - Potential Yakes
Trojan Download"; flow:to_server,established; content:"GET"; http_method;
content:".exe HTTP/1.1|0D 0A|Cache-Control: "; fast_pattern:only; content:".exe
HTTP/1.1"; nocase; content:"|0D 0A|Cache-Control: no-cache|0D 0A|Connection: close|
0D 0A|Pragma: no-cache|0D 0A|User-Agent: "; within:76; content:"|3A 20|";
distance:0; content:!"|3A 20|"; distance:0; pcre:"/\x2f\d+\.exe$/Ui";
metadata:impact_flag red, ruleset community, service http;
reference:url,www.virustotal.com/en/file/980c4ed3dd130c9313a35434e0b102a6b8b038c987
35814834334ccc03e4da3c/analysis/; classtype:trojan-activity; sid:27255; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kryptik Drive-by Download Malware"; flow:to_server,established;
content:"GET"; http_method; content:".php?id="; offset:6; fast_pattern; http_uri;
content:" HTTP/1."; within:11; distance:1; http_header; content:"|0D 0A|User-Agent:
Mozilla/"; within:22; distance:1; http_header; pcre:"/\)\r\nHost\x3a\x20[a-z0-
9\x2d\x2e]+\r\n(Cache\x2dControl|Pragma)\x3a\x20no-cache\r\n\r\n$/H";
metadata:impact_flag red, policy security-ips drop, ruleset community, service
http; reference:url,threatpost.com/nsa-whistleblower-article-redirects-to-malware;
reference:url,www.virustotal.com/en/file/5d7b09613c03cb3b54b9ab7a886558bba38861a899
638f4318c09eaa56401821/analysis/1373466967/; classtype:trojan-activity; sid:27256;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kryptic 7-byte URI Invalid Firefox Headers - no Accept-Language";
flow:to_server,established; urilen:7; content:"GET"; http_method;
content:"Firefox/3."; fast_pattern:only; http_header; pcre:"/^\/[A-Z]{6}$/U";
content:!"Accept-Language:"; http_header; content:!"Referer:"; http_header;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/8c1ff08a25b93da66921c75d0d21a9c08c5d3d36b9
5f9eaf113ecd84fa452944/analysis/1374505566/; classtype:trojan-activity; sid:27257;
rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Potential
Win.Trojan.Kraziomel Download - 000.jpg"; flow:to_server,established; urilen:8;
content:"/000.jpg"; fast_pattern:only; http_uri; content:"HTTP/1.0|0D 0A|Host: ";
content:!"|3A 20|"; distance:0; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/33525f8cf5ca951095d4af7376e026821b81557526
d4846916805387fb9c5bb2/analysis/; classtype:trojan-activity; sid:27533; rev:3;)
# alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"MALWARE-OTHER self-signed SSL
certificate with default MyCompany Ltd organization name";
flow:established,to_client; ssl_state:server_hello; content:"|55 04 0A|";
content:"|0E|MyCompany Ltd"; within:14; distance:1; metadata:impact_flag red,
ruleset community, service ssl; reference:url,en.wikipedia.org/wiki/Self-
signed_certificate; reference:url,security.ncsa.illinois.edu/research/grid-
howtos/usefulopenssl.html; classtype:policy-violation; sid:27538; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
HideMeBetter spam injection variant"; flow:to_client,established; file_data;
content:"<div id=|22|HideMeBetter|22|>"; fast_pattern:only; content:"if(document|
2E|getElementById(|22|HideMeBetter|22|)|20 21 3D 20|null)"; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,blog.sucuri.net/2013/07/hidemebetter-spam-injection-
variant.html; classtype:trojan-activity; sid:27565; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Rovnix malicious download request"; flow:to_server,established;
content:"/ld.aspx"; nocase; http_uri; content:"User-Agent|3A 20|FWVersionTestAgent|
0D 0A|"; fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,blog.didierstevens.com/2013/08/04/quickpost-rovnix-pcap;
reference:url,blogs.technet.com/b/mmpc/archive/2013/07/25/the-evolution-of-ronvix-
private-tcp-ip-stacks.aspx; classtype:trojan-activity; sid:27567; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Redyms variant outbound connection"; flow:to_server,established;
content:"&intip="; fast_pattern:only; http_uri; content:"?id="; http_uri;
content:"&port="; distance:0; http_uri; content:"&bid="; distance:0; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/1c61afd792257cbc72dc3221deb3d0093f0fc1abf2
c3f2816e041e37769137a4/analysis/1375189147/; classtype:trojan-activity; sid:27596;
rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Fort Disco
Registration variant outbound connection"; flow:to_server,established;
content:"/cmd.php"; http_uri; content:"User-Agent|3A 20|Mozilla/4.0 (compatible|3B|
Synapse)"; fast_pattern:only; http_header; metadata:policy balanced-ips drop,
policy security-ips drop, ruleset community, service http; reference:url,www.net-
security.org/secworld.php?id=15370; classtype:trojan-activity; sid:27599; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Aumlib variant outbound connection"; flow:to_server,established;
content:"/tomcat-docs/index.jsp?/"; http_uri; content:"User-Agent|3A| Mozilla/4.0 |
28|compatible|3B| MSIE 5.01|3B| Windows NT 5.0|29|"; fast_pattern:only;
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http; classtype:trojan-activity; sid:27629;
rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Backdoor.Aumlib
variant outbound connection"; flow:to_server,established;
content:"/bbs/search.asp"; content:"User-Agent|3A| Mozilla/4.0 |28|compatible|3B|
MSIE 5.0|3B| Windows NT 5.0|29|"; fast_pattern:only; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; classtype:trojan-activity; sid:27630; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Backdoor.Aumlib
variant outbound connection"; flow:to_server,established; content:"/buy-
sell/search.asp?newsid="; content:"User-Agent|3A| Mozilla/4.0 |28|compatible|3B|
MSIE 5.0|3B| Windows NT 5.0|29|"; fast_pattern:only; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; classtype:trojan-activity; sid:27631; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Worm.Silly
variant outbound connection"; flow:to_server,established; urilen:7;
content:"/ul.htm"; fast_pattern:only; http_uri; content:"|3B| MSIE 6.0|3B 20|";
http_header; content:!"Accept-Language: "; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/0ddd3488b618b17437413a9d579aa111f0a2ba3022
62d0a9b0d2832718a93524/analysis/; classtype:trojan-activity; sid:27633; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.SpyBanker.ZSL variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"valor="; depth:6; http_client_body;
content:"]branco["; fast_pattern:only; http_client_body; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/709fa674b301e9123fc2c01e817da21cb29cdfb5a4
2634a793e27c9533d335b1/analysis/1375811416/; classtype:trojan-activity; sid:27648;
rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Brazilian
Banking Trojan data theft"; flow:to_server,established; content:"POST";
http_method; content:"remetente="; depth:10; http_client_body;
content:"&destinatario="; distance:0; http_client_body; content:"&assunto=";
distance:0; http_client_body; content:"&mensagem="; distance:0; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:27649; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ZeroAccess variant outbound connection"; flow:to_server,established;
urilen:>95; content:".php HTTP/1.1|0D 0A|User-Agent: Opera/"; fast_pattern:only;
pcre:"/(?=^[a-z\x2d\x5f\x2f]{95,}\.php$).*?[a-z]{2,48}\x2d[a-z]{2,48}\x2d[a-z]
{2,48}\x2d[a-z]{2,48}\x2d?\.php$/U"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:27680; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Ransomware.Urausy outbound connection"; flow:to_server,established;
urilen:>145,norm; content:".html"; http_uri; content:"|0D 0A|User-Agent|3A|
Mozilla/5.0 |28|compatible|3B| MSIE 9.0|3B| Windows NT 6.1|3B| Trident/5.0";
fast_pattern:only; content:!"Cookie:"; http_header; content:!"X-BlueCoat-Via:";
http_header; content:!"Referer"; http_header; pcre:"/\x2f[a-z-_]{80,}\x2ehtml$/U";
metadata:impact_flag red, ruleset community, service http;
reference:url,www.virustotal.com/en/file/f53a483befed8d1494827a3f2444cfe638d3f7e595
d72b722eab92d1aca9ede3/analysis/1376847283/; classtype:trojan-activity; sid:27708;
rev:8;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Orbit
Downloader denial of service update"; flow:to_server,established;
content:"/update/ido.ipl"; fast_pattern:only; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,www.welivesecurity.com/2013/08/21/orbital-decay-the-dark-side-
of-a-popular-file-downloading-tool; classtype:trojan-activity; sid:27726; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Orbit
Downloader denial of service update"; flow:to_server,established;
content:"/update/myinfo.php"; fast_pattern:only; http_uri; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,www.welivesecurity.com/2013/08/21/orbital-decay-the-dark-side-
of-a-popular-file-downloading-tool; classtype:trojan-activity; sid:27727; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Orbit
Downloader denial of service update"; flow:to_server,established;
content:"/update/param.php?"; fast_pattern:only; http_uri; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,www.welivesecurity.com/2013/08/21/orbital-decay-the-dark-side-
of-a-popular-file-downloading-tool; classtype:trojan-activity; sid:27728; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC RDN Banker
Data Exfiltration"; flow:to_server,established; content:"POST"; http_method;
content:"|3B| name=|22|arquivo|22 3B| filename=|22|C:|5C|"; fast_pattern:only;
http_client_body; content:"_.log|22 0D 0A|"; http_client_body; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; classtype:trojan-activity; sid:27774; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection"; flow:to_server,established;
content:"GET"; http_method; content:".htm"; http_uri; content:!"Accept";
http_header; content:"|0A|Content-Length: 164|0D 0A|User-Agent: ";
fast_pattern:only; http_header; content:"host|3A|"; nocase; http_header; content:"|
2E|"; within:5; http_header; content:"|2E|"; within:4; http_header; content:"|2E|";
within:4; http_header; content:"|6C 55 55 45|"; depth:4; offset:4;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:27775; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.PRISM variant outbound connection"; flow:to_server,established;
content:"/page/index_htm_files2/"; nocase; http_uri; content:".png"; within:4;
distance:3; http_uri; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/417cb84f48d20120b92530c489e9c3ee9a9deab53f
ddc0dc153f1034d3c52c58/analysis/1377785686/; classtype:trojan-activity; sid:27802;
rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.PRISM variant outbound connection"; flow:to_server,established;
content:"/form.php"; depth:9; http_uri; content:"RcpTfdsvoD9KB9O";
fast_pattern:only; http_client_body; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/417cb84f48d20120b92530c489e9c3ee9a9deab53f
ddc0dc153f1034d3c52c58/analysis/1377785686/; classtype:trojan-activity; sid:27803;
rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.PRISM variant outbound connection"; flow:to_server,established;
content:"/page/index.php"; nocase; http_uri; content:"foo="; http_cookie;
content:"data=RcpTfdssoD9KB9O"; depth:20; fast_pattern; http_client_body;
metadata:impact_flag red, ruleset community, service http;
reference:url,www.virustotal.com/en/file/417cb84f48d20120b92530c489e9c3ee9a9deab53f
ddc0dc153f1034d3c52c58/analysis/1377785686/; classtype:trojan-activity; sid:27804;
rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.Bisonha
variant outbound connection"; flow:to_server,established; content:"GET /3001";
fast_pattern; isdataat:260,relative; content:"0000000000000000000000000";
pcre:"/\/3001[0-9A-F]{262,304}/"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service ssl;
reference:url,bl0g.cedricpernet.net/post/2013/08/29/APT-More-on-G20Summit-
Espionage-Operation;
reference:url,www.virustotal.com/en/file/f0d8834fb0e2d3c6e7c1fde7c6bcf9171e5deca119
338e4fac21568e0bb70ab7/analysis/; classtype:trojan-activity; sid:27805; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Blackholev2/Darkleech exploit kit landing page request";
flow:to_server,established; urilen:>32; content:".php"; fast_pattern:only;
http_uri; content:"GET"; http_method; pcre:"/^\/[a-f0-9]{32}\/[a-z]{1,15}-[a-z]
{1,15}\.php/U"; content:!"PacketShaper"; http_header; content:!"siteadvisor.com";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2012-1889; reference:cve,2012-4681; classtype:trojan-activity;
sid:27865; rev:7;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT
Blackholev2/Darkleech exploit kit landing page"; flow:to_client,established;
file_data; content:"<body><b></b><style>div{overflow|3A|hidden|3B|width|3A|1px|3B|
height|3A|1px}</style><div>"; fast_pattern:only; flowbits:set,file.exploit_kit.jar;
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; classtype:trojan-activity; sid:27866;
rev:2;)
# alert udp $EXTERNAL_NET any -> $SIP_SERVERS $SIP_PORTS (msg:"PROTOCOL-VOIP
Possible SIP OPTIONS service information gathering attempt"; flow:to_server;
sip_method:options; content:"SIP/2.0"; fast_pattern:only; detection_filter:track
by_src, count 100, seconds 25; metadata:ruleset community, service sip;
reference:url,blog.sipvicious.org/2008/02/detecting-sip-attacks-with-snort.html;
classtype:attempted-recon; sid:27899; rev:3;)
# alert udp $SIP_SERVERS $SIP_PORTS -> $EXTERNAL_NET any (msg:"PROTOCOL-VOIP
Excessive number of SIP 4xx responses potential user or password guessing attempt";
flow:to_client; sip_stat_code:4; content:"SIP/2.0"; fast_pattern:only;
detection_filter:track by_src, count 100, seconds 25; metadata:ruleset community,
service sip; reference:url,blog.sipvicious.org/2008/02/detecting-sip-attacks-with-
snort.html; classtype:attempted-recon; sid:27900; rev:3;)
# alert udp $SIP_SERVERS $SIP_PORTS -> $EXTERNAL_NET any (msg:"PROTOCOL-VOIP Ghost
call attack attempt"; flow:to_client; sip_stat_code:180; content:"SIP/2.0";
fast_pattern:only; detection_filter:track by_src, count 100, seconds 25;
metadata:ruleset community, service sip;
reference:url,blog.sipvicious.org/2008/02/detecting-sip-attacks-with-snort.html;
classtype:attempted-recon; sid:27901; rev:3;)
# alert tcp $EXTERNAL_NET any -> $SIP_SERVERS $SIP_PORTS (msg:"PROTOCOL-VOIP
Possible SIP OPTIONS service information gathering attempt";
flow:to_server,established,only_stream; sip_method:options; content:"SIP/2.0";
fast_pattern:only; detection_filter:track by_src, count 100, seconds 25;
metadata:ruleset community, service sip;
reference:url,blog.sipvicious.org/2008/02/detecting-sip-attacks-with-snort.html;
classtype:attempted-recon; sid:27902; rev:2;)
# alert tcp $SIP_SERVERS $SIP_PORTS -> $EXTERNAL_NET any (msg:"PROTOCOL-VOIP Ghost
call attack attempt"; flow:to_client,established,only_stream; sip_stat_code:180;
content:"SIP/2.0"; fast_pattern:only; detection_filter:track by_src, count 100,
seconds 25; metadata:ruleset community, service sip;
reference:url,blog.sipvicious.org/2008/02/detecting-sip-attacks-with-snort.html;
classtype:attempted-recon; sid:27903; rev:2;)
# alert tcp $SIP_SERVERS $SIP_PORTS -> $EXTERNAL_NET any (msg:"PROTOCOL-VOIP
Excessive number of SIP 4xx responses potential user or password guessing attempt";
flow:to_client,established,only_stream; sip_stat_code:4; content:"SIP/2.0";
fast_pattern:only; detection_filter:track by_src, count 100, seconds 25;
metadata:ruleset community, service sip;
reference:url,blog.sipvicious.org/2008/02/detecting-sip-attacks-with-snort.html;
classtype:attempted-recon; sid:27904; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Blackholev2/Cool exploit kit payload download attempt"; flow:to_server,established;
urilen:50<>150; content:"GET"; http_method; content:" Java/1."; fast_pattern:only;
http_header; content:".php?"; http_uri; pcre:"/\/(?:[^\/]+?\/[a-z]{2,24}[_-][a-z]
{2,16}([_-][a-z]{2,16})*?|closest\/[a-z0-9]{15,25})\.php\?[\(\)\!\*\w-]+=[\
(\)\!\*\w-]+&[\(\)\*\!\w-]+=[\(\)\!\*\w-]+$/U"; metadata:ruleset community, service
http; classtype:trojan-activity; sid:27907; rev:7;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Vittalia
adware - get ads"; flow:to_server,established; content:"/afr.php?zoneid=";
http_uri; content:"/ads/ox.html"; http_header; metadata:ruleset community, service
http;
reference:url,www.virustotal.com/en/file/9cdb2b3095cfb94cf8f6204d0f073674dd808b0f74
2a16216c2f06cf3b5afd50/analysis/1378700802/; classtype:trojan-activity; sid:27913;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Vittalia
adware - post install"; flow:to_server,established; content:"/report.php?key=";
http_uri; content:"User-Agent|3A| NSIS_ToolkitOffers (Mozilla)"; fast_pattern:only;
http_header; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/9cdb2b3095cfb94cf8f6204d0f073674dd808b0f74
2a16216c2f06cf3b5afd50/analysis/1378700802/; classtype:trojan-activity; sid:27914;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Vittalia
adware outbound connection - pre install"; flow:to_server,established;
content:"/instapi.php?idMk="; http_uri; content:"&state="; distance:0; http_uri;
content:"&idTime="; distance:0; http_uri; content:"&idA2="; distance:0; http_uri;
content:"&xVal="; distance:0; http_uri; content:"User-Agent|3A| NSIS_ToolkitOffers
(Mozilla)"; fast_pattern:only; http_header; metadata:ruleset community, service
http;
reference:url,www.virustotal.com/en/file/9cdb2b3095cfb94cf8f6204d0f073674dd808b0f74
2a16216c2f06cf3b5afd50/analysis/1378700802/; classtype:trojan-activity; sid:27915;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-TOOLBARS Vittalia
adware outbound connection - Eazel toolbar install"; flow:to_server,established;
content:"/utilsbar/EazelBar.exe"; http_uri; content:"User-Agent|3A|
NSIS_ToolkitOffers (Mozilla)"; fast_pattern:only; http_header; metadata:ruleset
community, service http;
reference:url,www.virustotal.com/en/file/9cdb2b3095cfb94cf8f6204d0f073674dd808b0f74
2a16216c2f06cf3b5afd50/analysis/1378700802/; classtype:trojan-activity; sid:27916;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-TOOLBARS Vittalia
adware outbound connection - offers"; flow:to_server,established;
content:"/listener.php"; http_uri; content:"User-Agent|3A| NSIS_ToolkitOffers
(Mozilla)"; fast_pattern:only; http_header; metadata:ruleset community, service
http;
reference:url,www.virustotal.com/en/file/9cdb2b3095cfb94cf8f6204d0f073674dd808b0f74
2a16216c2f06cf3b5afd50/analysis/1378700802/; classtype:trojan-activity; sid:27917;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established;
content:".exe HTTP/1.0|0D 0A|Host:"; fast_pattern:only; content:"Accept-Encoding:
identity, *|3B|q=0|0D 0A|"; http_header; content:"|3B| MSIE "; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/8825abfca1a6d843ce5670858886cb63bb1317ddbb
92f91ffd46cfdcaba9ac00/analysis/; classtype:trojan-activity; sid:27918; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus encrypted POST Data exfiltration"; flow:to_server,established;
content:"Accept-Encoding|3A| identity, *|3B|q=0|0D 0A|"; fast_pattern:only;
http_header; content:"|3B| MSIE "; http_header; pcre:"/[^ -~\r\n]{4}/P";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/8825abfca1a6d843ce5670858886cb63bb1317ddbb
92f91ffd46cfdcaba9ac00/analysis/; classtype:trojan-activity; sid:27919; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Gh0st
variant outbound connection"; flow:to_server,established; content:"Gh0st"; depth:5;
content:"|00 00 00|"; within:3; distance:1; content:"|00 00 78 9C|"; within:4;
distance:2; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community;
reference:url,virustotal.com/en/file/a4fd37b8b9eabd0bfda7293acbb1b6c9f97f8cc3042f3f
78ad2b11816e1f9a59/analysis/1425053730/; classtype:trojan-activity; sid:27964;
rev:5;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Eupuds variant connection"; flow:to_client,established; file_data;
content:"insert into avs (id, pc,data,ref,country , id_user, mostrar)values(";
fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/09f4611c05dcff55d4471b90d41b0fd3e6d3289f71
321301751008dab75ded4d/analysis/; classtype:trojan-activity; sid:27965; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Chopper web shell connection"; flow:to_server,established; content:"X-
Forwarded-For"; nocase; http_header; content:"=Response"; nocase; http_client_body;
content:"FromBase64String"; nocase; http_client_body; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,informationonsecurity.blogspot.com/2012/11/china-chopper-
webshell.html;
reference:url,www.virustotal.com/en/file/BE24561427D754C0C150272CAB5017D5A2DA64D41B
EC74416B8AE363FB07FD77/analysis/; classtype:trojan-activity; sid:27966; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Chopper web shell connection"; flow:to_server,established; content:"X-
Forwarded-For"; nocase; http_header; content:"caidao="; fast_pattern:only;
http_client_body; pcre:"/caidao\s?=\s?(Response|Write|Execute)/Pmi";
metadata:impact_flag red, ruleset community, service http;
reference:url,informationonsecurity.blogspot.com/2012/11/china-chopper-
webshell.html;
reference:url,www.virustotal.com/en/file/BE24561427D754C0C150272CAB5017D5A2DA64D41B
EC74416B8AE363FB07FD77/analysis/; classtype:trojan-activity; sid:27967; rev:4;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Chopper web shell connection"; flow:to_server,established; content:"X-
Forwarded-For"; nocase; http_header; content:"=Execute"; nocase; http_client_body;
content:"On+Error+Resume+Next:"; fast_pattern:only; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,informationonsecurity.blogspot.com/2012/11/china-chopper-
webshell.html;
reference:url,www.virustotal.com/en/file/BE24561427D754C0C150272CAB5017D5A2DA64D41B
EC74416B8AE363FB07FD77/analysis/; classtype:trojan-activity; sid:27968; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kuluoz outbound command"; flow:to_server,established,only_stream;
content:"/index.php?"; http_uri; content:"-dsafe_mode"; distance:0; http_uri;
content:"-ddisable_functions"; distance:0; http_uri; content:"-dallow_url_fopen";
distance:0; http_uri; content:"-dallow_url_include"; distance:0; http_uri;
content:"-dauto_prepend_file"; distance:0; http_uri; content:"echo.txt";
detection_filter:track by_src, count 20, seconds 60; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/2d134b69c41fadc5d3a28c90e452323f1c54dd1aa2
0ac5f5e897feac8d86755a/analysis/; classtype:trojan-activity; sid:28005; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER
Win.Trojan.Kuluoz outbound download request"; flow:to_server,established;
content:"?message="; fast_pattern:only; http_uri; pcre:"/(info|
app)\x2ephp\x3fmessage\x3d/U"; metadata:impact_flag red, policy security-ips drop,
ruleset community, service http;
reference:url,malwaremustdie.blogspot.com/2013/09/302-redirector-new-cushion-
attempt-to.html; classtype:trojan-activity; sid:28006; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC BLYPT
installer startupkey outbound traffic"; flow:to_server,established;
content:"/index.aspx?info=startupkey_"; fast_pattern:only; http_uri;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http; reference:url,blog.trendmicro.com/trendlabs-security-
intelligence/blypt-a-new-backdoor-family-installed-via-java-exploit;
classtype:trojan-activity; sid:28007; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC BLYPT
installer reuse outbound traffic"; flow:to_server,established;
content:"/index.aspx?info=reuse"; fast_pattern:only; http_uri; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,blog.trendmicro.com/trendlabs-security-intelligence/blypt-a-new-
backdoor-family-installed-via-java-exploit; classtype:trojan-activity; sid:28008;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC BLYPT
installer configkey outbound traffic"; flow:to_server,established;
content:"/index.aspx?info=configkey"; fast_pattern:only; http_uri; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,blog.trendmicro.com/trendlabs-security-intelligence/blypt-a-new-
backdoor-family-installed-via-java-exploit; classtype:trojan-activity; sid:28009;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC BLYPT
installer tserror outbound traffic"; flow:to_server,established;
content:"/index.aspx?info=tserror_"; fast_pattern:only; http_uri; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,blog.trendmicro.com/trendlabs-security-intelligence/blypt-a-new-
backdoor-family-installed-via-java-exploit; classtype:trojan-activity; sid:28010;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC BLYPT
installer createproc outbound traffic"; flow:to_server,established;
content:"/index.aspx?info=createproc_"; fast_pattern:only; http_uri;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service http; reference:url,blog.trendmicro.com/trendlabs-security-
intelligence/blypt-a-new-backdoor-family-installed-via-java-exploit;
classtype:trojan-activity; sid:28011; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"from=%20Nome..:"; depth:15; http_client_body; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/d8870137f7f761055a2ac83b03eb3f8fe26015fa0b
a99f41551ca59374c6a3ec/analysis/1365436849/; classtype:trojan-activity; sid:28012;
rev:1;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT
Blackholev2 exploit kit landing page"; flow:to_client,established; file_data;
content:"</div><i></i><style>div{overflow|3A|hidden|3B|width|3A|1px|3B|";
fast_pattern:only; metadata:ruleset community, service http; classtype:trojan-
activity; sid:28026; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Blackholev2/Cool exploit kit exploit download attempt"; flow:to_server,established;
urilen:50<>250; content:"GET"; http_method; content:" Java/1."; fast_pattern:only;
http_header; content:".php?"; http_uri; pcre:"/\/(?:[^\/]+?\/[a-z]{2,24}[_-][a-z]
{2,16}([_-][a-z]{2,16})*?|closest\/[a-z0-9]{15,25})\.php\?[\(\)\!\*\w-]+=[\
(\)\!\*\w-]+&[\(\)\*\!\w-]+=[\(\)\!\*\w-]+&[\(\)\!\*\w-]+=[\(\)\!\*\w-]+&[\
(\)\!\*\w-]+=[\(\)\!\*\w-]+&[\(\)\!\*\w-]+=[\(\)\!\*\w-]+$/U"; metadata:ruleset
community, service http; classtype:trojan-activity; sid:28028; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Ransomware.Urausy variant outbound connection"; flow:to_server,established;
urilen:>95,norm; content:"User-Agent|3A| Opera/10.80 |28|Windows NT 5.1|3B| U|3B|
Edition Yx|3B| en|29| Presto/2.9.168 Version/11.52|0D 0A|"; fast_pattern:only;
pcre:"/\x2f[a-z-_]{90,}\x2e(html|php)$/U"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/e74e0b2f3efbe8edadeaeef501fe268e2ff7c8a8bc
8550de7924f77f2a612941/analysis/1378636986/; classtype:trojan-activity; sid:28033;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Caphaw variant outbound connection"; flow:to_server,established;
content:"/ping.html?r="; fast_pattern:only; http_uri; content:!"/utils/"; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,research.zscaler.com/2013/09/a-new-
wave-of-win32caphaw-attacks.html; classtype:trojan-activity; sid:28042; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.CryptoLocker variant connection"; flow:to_server,established;
content:"/crypt_1_sell"; fast_pattern:only; http_uri;
pcre:"/\/crypt_1_sell\d\d-\d\d.exe$/Ui"; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/d4b16269c9849c33a7bb2fdc782173a00e99db12a5
85689618dde3f4c6fcb101/analysis; classtype:trojan-activity; sid:28044; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Napolar variant outbound connection"; flow:to_server, established;
content:"POST"; http_method; content:"v="; http_client_body; content:"|26|u=";
within:3; distance:3; http_client_body; content:"|26|c="; distance:0;
http_client_body; content:"|26|s={"; distance:0; http_client_body; content:"}|26|
w="; within:4; distance:36; http_client_body; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/463d39dcbf19b5c4c9e314e5ce77bf8a51848b8c7d
64e4f0a6656b9d28941e2e/analysis/; classtype:trojan-activity; sid:28079; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Napolar data theft"; flow:to_server,established; content:".exe&h=";
fast_pattern:only; http_client_body; content:"p="; depth:2; http_client_body;
metadata:impact_flag red, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/12781be5908ecc3dbf4a459e4cbc7bedb654b50236
f7a961e85f3af5e2275ddf/analysis/; classtype:trojan-activity; sid:28080; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banload variant outbound connection"; flow:to_server,established;
content:"/v22/mutabixa/"; fast_pattern:only; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,www.nyxbone.com/malware/banload.html; classtype:trojan-
activity; sid:28105; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banload information upload"; flow:to_server,established;
content:"/v22/mutabixa/1nf3ct/"; http_uri; content:"chave="; distance:0; http_uri;
content:"&url="; distance:0; http_uri; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.nyxbone.com/malware/banload.html; classtype:trojan-activity;
sid:28106; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banload download"; flow:to_server,established; content:".jpg"; http_uri;
content:"User-Agent|3A| runddll32.exe"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.nyxbone.com/malware/banload.html; classtype:trojan-activity;
sid:28107; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /default.htm GET Encrypted
Payload"; flow:to_server,established; urilen:12; content:"GET"; http_method;
content:"/default.htm"; fast_pattern:only; http_uri; content:!"Referer";
http_header; content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P";
metadata:policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28114; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /file.htm GET Encrypted Payload";
flow:to_server,established; urilen:9; content:"GET"; http_method;
content:"/file.htm"; fast_pattern:only; http_uri; content:!"Referer"; http_header;
content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P"; metadata:policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28115; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /home.htm GET Encrypted Payload";
flow:to_server,established; urilen:9; content:"GET"; http_method;
content:"/home.htm"; fast_pattern:only; http_uri; content:!"Referer"; http_header;
content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P"; metadata:policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28116; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /install.htm GET Encrypted
Payload"; flow:to_server,established; urilen:12; content:"GET"; http_method;
content:"/install.htm"; fast_pattern:only; http_uri; content:!"Referer";
http_header; content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P";
metadata:policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28117; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /login.htm GET Encrypted Payload";
flow:to_server,established; urilen:10; content:"GET"; http_method;
content:"/login.htm"; fast_pattern:only; http_uri; content:!"Referer"; http_header;
content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P"; metadata:policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28118; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /search.htm GET Encrypted Payload";
flow:to_server,established; urilen:11; content:"GET"; http_method;
content:"/search.htm"; fast_pattern:only; http_uri; content:!"Referer";
http_header; content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P";
metadata:policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28119; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /start.htm GET Encrypted Payload";
flow:to_server,established; urilen:10; content:"GET"; http_method;
content:"/start.htm"; fast_pattern:only; http_uri; content:!"Referer"; http_header;
content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P"; metadata:policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28120; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /welcome.htm GET Encrypted
Payload"; flow:to_server,established; urilen:12; content:"GET"; http_method;
content:"/welcome.htm"; fast_pattern:only; http_uri; content:!"Referer";
http_header; content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P";
metadata:policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28121; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /index.htm GET Encrypted Payload";
flow:to_server,established; urilen:10; content:"GET"; http_method;
content:"/index.htm"; fast_pattern:only; http_uri; content:!"Referer"; http_header;
content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P"; metadata:policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28122; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /setup.htm GET Encrypted Payload";
flow:to_server,established; urilen:10; content:"GET"; http_method;
content:"/setup.htm"; fast_pattern:only; http_uri; content:!"Referer"; http_header;
content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P"; metadata:policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28123; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Conficker variant outbound connection"; flow:to_server,established;
urilen:11; content:"/search?q="; fast_pattern:only; http_uri; content:"User-Agent:
Mozilla/4.0 (compatible|3B| MSIE "; http_header; content:": no-cache|0D 0A 0D 0A|";
http_header; content:!"Accept"; http_header; content:!"Referer"; http_header;
pcre:"/^\/search\?q=[0-9]$/Umi"; metadata:impact_flag red, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/57212e057db0d45d94d08cd47dec85f0d85a20a7f4
d3824559c81a50999cc2a5/analysis/; classtype:trojan-activity; sid:28147; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Mevade variant outbound connection"; flow:to_server,established;
content:"|0D 0A|uuid: "; fast_pattern:only; http_header; content:!"User-Agent:";
http_header; pcre:"/[^\n -~\r]{4}/P"; content:"Content-Type|3A| binary/octet-
stream|0D 0A|"; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/526fe8eee74dc51a23e458115179dcda4027277b69
6b6a06889ed52751b39f54/analysis/; classtype:trojan-activity; sid:28148; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Foreign variant outbound connection - /html2/";
flow:to_server,established; urilen:7; content:"POST"; http_method;
content:"/html2/"; fast_pattern:only; http_uri; content:!"Accept-Language:";
http_header; pcre:"/[^\r -~\n]{4}/P"; metadata:policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/en/file/5a9cd53f13825e17107d6b9f81ebe4013f3abf2342
9d9735c7258d43c101b71f/analysis/; classtype:trojan-activity; sid:28153; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Foreign variant outbound connection - MSIE 7.1";
flow:to_server,established; content:"POST"; http_method; content:"|3B| MSIE 7.1|3B
20|"; fast_pattern:only; http_header; content:!"Accept-Language:"; http_header;
pcre:"/[^\r -~\n]{4}/P"; metadata:policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/5a9cd53f13825e17107d6b9f81ebe4013f3abf2342
9d9735c7258d43c101b71f/analysis/; classtype:trojan-activity; sid:28154; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Foreign variant outbound connection - MSIE 7.2";
flow:to_server,established; content:"POST"; http_method; content:"|3B| MSIE 7.2|3B
20|"; fast_pattern:only; http_header; content:!"Accept-Language:"; http_header;
pcre:"/[^\r -~\n]{4}/P"; metadata:policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/5a9cd53f13825e17107d6b9f81ebe4013f3abf2342
9d9735c7258d43c101b71f/analysis/; classtype:trojan-activity; sid:28155; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Linkury
outbound time check"; flow:to_server,established; dsize:72; urilen:8;
content:"/utc/now HTTP/1.1|0D 0A|Host: www.timeapi.org|0D 0A|Connection: Keep-
Alive|0D 0A 0D 0A|"; fast_pattern:only; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/a2c4e162624ddb169542e12e148a3be6bfe79a1fed
4adfb28ad1a308a0d1bade/analysis/1380219003/; classtype:trojan-activity; sid:28156;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kuluoz Potential Phishing URL"; flow:to_server,established;
content:"/info.php?message="; fast_pattern:only; http_uri; content:!"Referer:";
http_header; metadata:impact_flag red, policy security-ips drop, ruleset community,
service http; reference:url,urlquery.net/report.php?id=5117077;
reference:url,www.soleranetworks.com/blogs/kuluoz-spam-uses-a-lot-of-stolen-web-
servers/; classtype:trojan-activity; sid:28192; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
vBulletin upgrade.php exploit attempt"; flow:to_server, established;
content:"install/upgrade.php"; fast_pattern:only; http_uri;
content:"firstrun=false"; http_client_body; content:"&customerid=";
http_client_body; content:"username%5d="; http_client_body; content:"password%5d=";
http_client_body; metadata:ruleset community, service http; reference:url,www.net-
security.org/secworld.php?id=15743; classtype:attempted-admin; sid:28215; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Blackholev2/Cool exploit kit payload download attempt"; flow:to_server,established;
urilen:50<>150; content:" Java/1."; fast_pattern:only; http_header;
content:".php?"; http_uri; pcre:"/\/(?:[^\/]+?\/[a-z]{2,24}|closest\/[a-z0-9]
{15,25})\.php\?[ab10]+=[ab10]+&[ab10]+=[ab10]+$/U"; metadata:ruleset community,
service http; classtype:trojan-activity; sid:28233; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.KanKan variant connection"; flow:to_server,established; content:"/?u=";
depth:4; http_uri; content:"&u2="; http_uri; content:"&u5=inststart"; http_uri;
content:"NSIS_Inetc (Mozilla)"; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/db31bdf400dd0d28487a0d298bc383a4a291256613
0ea512b25639b3f95e94c4/analysis/; classtype:trojan-activity; sid:28242; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kuluoz Potential phishing URL"; flow:to_server,established;
content:"/get.php?invite="; fast_pattern:only; http_uri; content:"Accept-Encoding:
gzip"; http_header; pcre:"/^\/get.php\?invite=.*?=$/mU"; content:!"Referer:";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http; reference:url,urlquery.net/search.php?
q=get.php%3Finvite%3D&type=string&start=2013-10-01&end=2013-10-16&max=50;
reference:url,www.virustotal.com/en/file/93a40a83977ca24df6e12d7d6f19a9b9d92cb3ea31
74ea9d4398ad2048205c42/analysis/; classtype:trojan-activity; sid:28255; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.hdog connectivity check-in version 2"; flow:to_server,established;
content:"/?gws_rd=cr"; fast_pattern:only; http_uri; content:"|0D 0A|Connection:
Close|0D 0A 0D 0A|"; content:"|3B 20|MSIE|20|"; http_header; content:!"Accept-
Encoding: "; http_header; metadata:policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/ca1bc54e33064eb08163a17a56dcb1d0d811fc694c
05af1d9ea768ef992cb489/analysis/1381870348/;
reference:url,www.virustotal.com/en/file/d4b16269c9849c33a7bb2fdc782173a00e99db12a5
85689618dde3f4c6fcb101/analysis/; classtype:trojan-activity; sid:28285; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Blackholev2/Cool exploit kit exploit download attempt"; flow:to_server,established;
urilen:50<>150; content:" Java/1."; fast_pattern:only; http_header;
content:".php?"; http_uri; pcre:"/\/(?:[^\/]+?\/[a-z]{2,24}|closest\/[a-z0-9]
{15,25})\.php\?
[ab10]+=[ab10]+&[ab10]+=[ab10]+&[ab10]+=[ab10]+&[ab10]+=[ab10]+&[ab10]+=[ab10]+
$/U"; metadata:ruleset community, service http; classtype:trojan-activity;
sid:28291; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Agent variant connection"; flow:to_server,established;
content:"/status/?&cmp="; fast_pattern; http_uri; content:"&src="; distance:0;
http_uri; content:"&status=start"; distance:0; http_uri; content:!"User-Agent: ";
http_uri; content:!"Accept"; http_uri; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/e21a7333f5e6fe6de87b0b4ef928202724680d46ee
3524983ec6962b4061813c/analysis/1381409595/; classtype:trojan-activity; sid:28300;
rev:3;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Chopper web shell connection"; flow:to_server,established; content:"X-
Forwarded-For"; nocase; http_header; content:"FromBase64String"; http_client_body;
content:"z"; within:200; nocase; http_client_body; pcre:"/z\d{1,3}/Pi";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,informationonsecurity.blogspot.com/2012/11/china-chopper-
webshell.html;
reference:url,www.virustotal.com/en/file/BE24561427D754C0C150272CAB5017D5A2DA64D41B
EC74416B8AE363FB07FD77/analysis/; classtype:trojan-activity; sid:28323; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE FakeAV
runtime detection"; flow:to_server,established; content:"&affid=";
fast_pattern:only; http_uri; content:"/api/"; nocase; http_uri; content:"?ts=";
nocase; http_uri; content:"&token="; nocase; http_uri; content:"&group="; nocase;
http_uri; content:"&nid="; nocase; http_uri; content:"&lid="; nocase; http_uri;
content:"&ver="; nocase; http_uri; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:28324; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"INDICATOR-OBFUSCATION
large number of calls to chr function - possible sql injection obfuscation";
flow:established,to_server; content:"GET"; http_method; content:"CHR("; nocase;
http_uri; content:"CHR("; distance:0; nocase; http_uri; content:"CHR("; distance:0;
nocase; http_uri; content:"CHR("; distance:0; nocase; http_uri; content:"CHR(";
distance:0; nocase; http_uri; metadata:ruleset community, service http;
reference:url,isc.sans.org/diary.html?storyid=3823; classtype:web-application-
attack; sid:28344; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-OBFUSCATION
Javascript obfuscation - split - seen in IFRAMEr Tool attack";
flow:to_client,established; file_data; content:"ps=|22|split|22 3B|asd=function()";
fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:28345; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-OBFUSCATION
Javascript obfuscation - seen in IFRAMEr Tool attack"; flow:to_client,established;
file_data; content:"aq=|22|0x|22 3B|ff=String|3B|"; fast_pattern:only;
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; classtype:trojan-activity; sid:28346;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kazy variant outbound connection"; flow:to_server,established;
urilen:>90; content:"/p.ashx?prd="; fast_pattern; http_uri; content:"&pixGuid=";
distance:0; http_uri; content:"&ver="; distance:0; http_uri; content:"&rnd=";
distance:0; http_uri; content:!"Accept"; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/a064a1d3d8b9d8ab649686b7fb01e0631e56941238
8084f5c391722c98660763/analysis/; classtype:trojan-activity; sid:28405; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kazy variant outbound connection"; flow:to_server,established;
content:".exe HTTP/1.1|0D 0A|User-Agent: Mozilla/"; fast_pattern:only; content:"|
3B| MSIE "; http_header; content:!"Accept"; http_header; content:"|29 0D 0A|Host:
"; distance:0; http_header; pcre:"/^GET\x20\x2f[a-z]
{1,12}\.exe\x20HTTP\x2f1\.1\r\nUser\x2dAgent\x3a\x20Mozilla\x2f[\x20-\x7e]
{10,100}\)\r\nHost\x3a\x20[a-z0-9\x2e\x2d]
{6,32}\r\nConnection\x3a\x20Keep\x2dAlive\r\n\r\n$/"; metadata:impact_flag red,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/a064a1d3d8b9d8ab649686b7fb01e0631e56941238
8084f5c391722c98660763/analysis/; classtype:trojan-activity; sid:28406; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-OBFUSCATION
Javascript obfuscation - createElement - seen in IFRAMEr Tool attack";
flow:to_client,established; file_data; content:"|22|c|22|+|22|r|22 3A|2+|22|e|22|+|
22|a|22|+|22|t|22|+|22|e|22|+|22|E|22|+|22|l|22|+|22|e|22|+|22|m|22|+((f)?|22|e|22|
+|22|n|22|+|22|t|22 3A 22 22|"; fast_pattern:only; metadata:policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; classtype:trojan-activity; sid:28420; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-OBFUSCATION
Javascript obfuscation - fromCharCode - seen in IFRAMEr Tool attack";
flow:to_client,established; file_data; content:"|22|fr|22|+|22|omCh|22|+|22|arCo|
22|+|22|de|22|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:28421; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT Glazunov
exploit kit landing page"; flow:to_client,established; file_data; content:"= |22|
applet|22 3B 20|"; content:"= |22|object|22 3B 20|"; within:50; content:"=|27|
param|27 3B 20|"; within:50; content:".zip|27 3B| </script>"; distance:0;
pcre:"/\/\d+\/\d\.zip\x27\x3b/"; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2013-2471; reference:url,nakedsecurity.sophos.com/2013/07/02/the-
four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/;
classtype:trojan-activity; sid:28428; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Glazunov
exploit kit outbound jnlp download attempt"; flow:to_server,established; urilen:15;
content:".jnlp"; fast_pattern; http_uri; content:" Java/1."; http_header; pcre:"/\/
[a-z0-9]{9}\.jnlp$/U"; metadata:policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community, service http;
reference:cve,2013-2471; reference:url,nakedsecurity.sophos.com/2013/07/02/the-
four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/;
classtype:trojan-activity; sid:28429; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Glazunov
exploit kit zip file download"; flow:to_server,established; content:".zip";
fast_pattern; http_uri; content:" Java/1."; http_header;
pcre:"/^\/\d+\/\d\.zip$/U"; metadata:policy balanced-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2013-2471; reference:url,nakedsecurity.sophos.com/2013/07/02/the-
four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/;
classtype:trojan-activity; sid:28430; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 1039 (msg:"MALWARE-CNC Win.Trojan.Symmi
variant SQL check-in"; flow:to_server,established; content:"s|00|e|00|l|00|e|00|c|
00|t|00| |00|v|00|e|00|r|00|i|00|f|00|i|00|c|00|a|00|n|00|d|00|o|00| |00|f|00|r|00|
o|00|m|00| |00|v|00|e|00|r|00|i|00|f|00|i|00|c|00|a|00|n|00|d|00|o|00| |00|w|00|h|
00|e|00|r|00|e|00| |00|i|00|d|00|_|00|p|00|c|00|=|00|"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community;
reference:url,www.virustotal.com/en/file/47c71ff0eb61b371e967b93b6909bb05f2aab973e3
214ea2d5ed246884dd045e/analysis/; classtype:trojan-activity; sid:28446; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Sakura
exploit kit exploit payload retrieve attempt"; flow:to_server,established;
urilen:<25; content:".ld"; fast_pattern:only; http_uri; content:" Java/1.";
http_header; pcre:"/^\/\d+\.ld$/U"; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:28450; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC DeputyDog
diskless method outbound connection"; flow:to_server,established; content:"User-
Agent: lynx|0D 0A|"; fast_pattern:only; http_header; content:"POST"; http_method;
pcre:"/^\x2f[0-9a-f]+$/iU"; metadata:impact_flag red, policy balanced-ips drop,
policy max-detect-ips drop, policy security-ips drop, ruleset community, service
http; reference:cve,2013-3918; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS13-090; classtype:trojan-activity; sid:28493; rev:6;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET [$HTTP_PORTS,443] (msg:"MALWARE-CNC
Win.Trojan.Asprox/Kuluoz variant connection"; flow:to_server,established;
content:"User-Agent: Mozilla/5.0 (Windows NT 6.1|3B| WOW64|3B| rv:23.0)
Gecko/20100101 Firefox/23.0"; content:"Content-Disposition: form-data|3B| name=|22|
key|22 3B| filename=|22|key.bin|22|"; fast_pattern:only; content:"Content-
Disposition: form-data|3B| name=|22|data|22 3B| filename=|22|data.bin|22|";
content:"Content-Type: multipart/form-data|3B| boundary="; pcre:"/POST\s\/[A-F0-9]
{42}\s/"; metadata:impact_flag red, policy security-ips drop, ruleset community,
service http; reference:url,stopmalvertising.com/malware-reports/analysis-of-
asprox-and-its-new-encryption-scheme.html;
reference:url,www.virustotal.com/en/file/929b62b673db55f443a36fa2de184a2be03788bbe7
14fc586b82a19444727a54/analysis/; classtype:trojan-activity; sid:28538; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ZeroAccess Download Headers"; flow:to_server,established; urilen:5<>14;
content:"|0D 0A|Accept: */*|0D 0A|Accept-Encoding: identity, *|3B|q=0|0D 0A|
Connection: close|0D 0A|User-Agent: "; fast_pattern:only; http_header;
content:".exe HTTP/1.0|0D 0A|Host: "; pcre:"/^\x2f[a-z\d]{1,8}\.exe$/Ui";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/#/file/eeaeb1506d805271b5147ce911df9c264d63e4d229d
e4464ef879a83fb225a40/detection; classtype:trojan-activity; sid:28541; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Conficker
variant outbound connection"; flow:to_server,established; dsize:146; urilen:1;
content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0 (compatible|3B| MSIE 7.0|3B|
Windows NT 5.1|3B| Trident/4.0)|0D 0A|Host: checkip.dyndns.org|0D 0A|Cache-Control:
no-cache|0D 0A 0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.sans.org/security-resources/malwarefaq/conficker-worm.php;
classtype:trojan-activity; sid:28542; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Conficker
variant outbound connection"; flow:to_server,established; dsize:139; urilen:1;
content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0 (compatible|3B| MSIE 7.0|3B|
Windows NT 5.1|3B| Trident/4.0)|0D 0A|Host: www.ask.com|0D 0A|Cache-Control: no-
cache|0D 0A 0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.sans.org/security-resources/malwarefaq/conficker-worm.php;
classtype:trojan-activity; sid:28543; rev:1;)
# alert udp $EXTERNAL_NET 2425 -> $HOME_NET 2425 (msg:"INDICATOR-SCAN inbound
probing for IPTUX messenger port "; flow:to_server; content:"iptux"; depth:5;
offset:2; content:"lws|3A|lws"; within:7; distance:9; metadata:ruleset community;
reference:url,github.com/iptux-src/iptux; classtype:misc-activity; sid:28552;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /main.htm GET Encrypted Payload";
flow:to_server,established; urilen:9; content:"GET"; http_method;
content:"/main.htm"; fast_pattern:only; http_uri; content:!"Referer"; http_header;
content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P"; metadata:impact_flag red,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28553; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection - /online.htm GET Encrypted Payload";
flow:to_server,established; urilen:11; content:"GET"; http_method;
content:"/online.htm"; fast_pattern:only; http_uri; content:!"Referer";
http_header; content:!"Accept"; http_header; pcre:"/[^\r -~\n]{4}/P";
metadata:impact_flag red, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/0682508f3d7c85e086055ce943aeaa634484d8e0cb
22be776bac6930b00fae49/analysis/; classtype:trojan-activity; sid:28554; rev:1;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1434 (msg:"MALWARE-OTHER SQL Slammer
worm propagation attempt inbound"; flow:to_server; content:"|04|"; depth:1;
content:"Qh.dll"; fast_pattern:only; content:"sock"; content:"send";
metadata:impact_flag red, ruleset community; reference:bugtraq,5310;
reference:bugtraq,5311; reference:cve,2002-0649; classtype:trojan-activity;
sid:28555; rev:1;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS DNS query
amplification attempt"; flow:to_server; content:"|00 01|"; depth:2; offset:4;
content:"|00 01|"; within:2; distance:4; byte_test:1,!&,0xF8,2; content:"|00 00 FF
00 01 00 00 29|"; byte_test:2,>,0x7FFF,0,relative; metadata:policy max-detect-ips
drop, policy security-ips drop, ruleset community, service dns;
reference:url,www.us-cert.gov/ncas/alerts/TA13-088A; classtype:attempted-dos;
sid:28556; rev:3;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"PROTOCOL-DNS Malformed DNS
query with HTTP content"; flow:to_server; content:"|54 20|"; fast_pattern:only;
content:"GET |2F| HTTP"; metadata:policy max-detect-ips drop, policy security-ips
drop, ruleset community, service dns; reference:url,www.ietf.org/rfc/rfc2616.txt;
classtype:misc-activity; sid:28557; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Nuclear
exploit kit payload request"; flow:to_server,established; urilen:24<>26,norm;
content:"/f/"; fast_pattern:only; http_uri; pcre:"/^\/f\/1\d{9}\/\d{9,10}(\/\d)+
$/U"; flowbits:set,file.exploit_kit.pe; metadata:policy balanced-ips drop, policy
max-detect-ips alert, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:28596; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Goon/Infinity exploit kit payload download attempt"; flow:to_server,established;
urilen:<30; content:".mp3"; fast_pattern:only; http_uri; content:" Java/1.";
http_header; pcre:"/\/\d+\.mp3$/U"; flowbits:set,file.exploit_kit.pe;
metadata:policy balanced-ips drop, policy max-detect-ips alert, policy security-ips
drop, ruleset community, service http; reference:cve,2012-0507;
reference:url,blog.talosintel.com/2013/11/im-calling-this-goon-exploit-kit-for-
now.html; classtype:trojan-activity; sid:28795; rev:6;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Zeus
outbound connection"; flow:to_server,established; urilen:1; content:"GET /
HTTP/1.1|0D 0A|Accept: */*|0D 0A|Accept-Language:"; depth:45; content:"|0D 0A|
Connection: Close|0D 0A 0D 0A|"; fast_pattern; content:"google.com|0D 0A|";
http_header; content:"|3B 20|MSIE|20|"; http_header; content:!"Accept-Encoding: ";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/d4b16269c9849c33a7bb2fdc782173a00e99db12a5
85689618dde3f4c6fcb101/analysis/; classtype:trojan-activity; sid:28800; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos outbound connection"; flow:to_server,established; urilen:17<>27;
content:"ip-who-is.com|0D 0A|"; fast_pattern:only; http_header; content:"/locate-
ip/"; depth:11; http_uri; content:"User-Agent: Mozilla/3.0 (compatible|3B| Indy
Library)"; http_header; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/26c60976776d212aefc9863efde914059dd2847291
084c158ce51655fc1e48d0/analysis/1382620137/; classtype:trojan-activity; sid:28802;
rev:3;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Injector inbound connection"; flow:to_client,established; file_data;
content:"UPDATE|7C|"; depth:7; pcre:"/^UPDATE\|[0-9]\.[0-9]\.[0-9]\|[A-F0-9]{48}\|
{3}$/"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/253b2cb7f6eacaaaca5053f73445defce5df2cd4a5
564ebc0721e0323a6c3557/analysis/1383139183/; classtype:trojan-activity; sid:28803;
rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Injector outbound connection"; flow:to_server,established; content:"|0D
0A 0D 0A|&nome="; fast_pattern:only; http_client_body; content:"conteudo=";
depth:9; http_client_body; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/253b2cb7f6eacaaaca5053f73445defce5df2cd4a5
564ebc0721e0323a6c3557/analysis/1383139183/; classtype:trojan-activity; sid:28804;
rev:3;)
alert udp $HOME_NET any -> $EXTERNAL_NET 2090 (msg:"MALWARE-CNC Win.Trojan.Palevo
outbound connection"; flow:to_server; dsize:21; content:"|00 00|"; depth:2;
offset:19; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community; reference:url,palevotracker.abuse.ch/?
ipaddress=209.222.14.3; reference:url,palevotracker.abuse.ch/?
ipaddress=31.170.179.179; classtype:trojan-activity; sid:28805; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
potential malware download - single digit .exe file download";
flow:to_server,established; urilen:6; content:".exe"; fast_pattern:only; pcre:"/\/
[a-z0-9]\.exe$/Ui"; metadata:impact_flag red, policy max-detect-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,urlquery.net/search.php?q=%5C%2F%5Ba-zA-Z%5D%5C.%5BEe%5D%5BXx%5D%5BEe
%5D%24&type=regexp&start=2013-09-07&end=2013-12-06&max=400; classtype:trojan-
activity; sid:28806; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Injector variant outbound connection"; flow:to_server,established;
urilen:9; content:"/load.exe HTTP/1.1|0D 0A|User-Agent: Mozilla/";
fast_pattern:only; content:"|3B 20|MSIE|20|"; http_header; content:")|0D 0A|Host:
"; distance:0; http_header; content:!"Accept"; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,urlquery.net/search.php?q=%5C%2Fload%5C.exe
%24&type=regexp&start=2013-08-24&end=2013-11-22&max=400;
reference:url,www.virustotal.com/en/file/032572ea1f34a060ecac98a8e2899dc0f2a41dff19
9e879050481ddd3818b4d0/analysis/; classtype:trojan-activity; sid:28807; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Dofoil inbound connection"; flow:to_client,established; content:"|3B 20|
filename=exe.exe|0D 0A|"; fast_pattern:only; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/2325492f457a8b7d3df48a570210f65f3a094fe892
5278451713768d938bec86/analysis/; classtype:trojan-activity; sid:28809; rev:5;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection - MSIE7 No Referer No Cookie";
flow:to_server,established; urilen:1; content:"|2F|"; http_uri;
pcre:"/\r\nHost\x3A\s+[^\r\n]*?[bcdfghjklmnpqrstvwxyz]{5,}[^\r\n]*?\x2Ebiz\r\n/Hi";
content:!"|0A|Referer|3A|"; http_header; content:!"|0A|Cookie|3A|"; http_header;
content:"|3B 20|MSIE|20|7.0|3B 20|"; http_header; content:"|2E|biz|0D 0A|";
fast_pattern; nocase; http_header; metadata:impact_flag red, policy security-ips
drop, ruleset community, service http;
reference:url,en.wikipedia.org/wiki/Zeus_(Trojan_horse); classtype:trojan-activity;
sid:28810; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gozi/Neverquest variant outbound connection";
flow:to_server,established; content:"/post.aspx?forumID="; fast_pattern:only;
http_uri; content:"|0D 0A|URL: http"; depth:11; offset:17; http_client_body;
content:!"Accept"; http_header; pcre:"/^(?!\d{17}|[A-F]{17})[A-F0-9]{17}/P";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/b78c5c53d3b54acbca2b344a779528f0408258b6ac
12899c860d99bf563e883a/analysis/; classtype:trojan-activity; sid:28814; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gozi/Neverquest variant outbound connection";
flow:to_server,established; content:"forumdisplay.php?fid="; fast_pattern:only;
http_uri; content:"id="; depth:3; http_client_body; content:!"Accept"; http_header;
pcre:"/^id\x3d[A-F\d]{32}(\x26info\x3d[A-F\d]{24})?$/P"; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/b78c5c53d3b54acbca2b344a779528f0408258b6ac
12899c860d99bf563e883a/analysis/; classtype:trojan-activity; sid:28815; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Iniduoh variant outbound connection"; flow:to_server,established;
content:"/is-ready"; fast_pattern:only; http_uri; content:"User|2D|Agent|3A 20|";
http_header; content:"|3C 7C 3E|"; within:3; distance:8; http_header; content:"|3C
7C 3E|"; within:18; http_header; content:"|3C 7C 3E|Microsoft Windows"; within:84;
http_header; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/220b551d9381fb56b48511b622a0bbc15482378396
b3e83f708379f460f3347a/analysis/;
reference:url,www.virustotal.com/en/file/be442a5f8be3bf720236f71a613a534b8aa82b16b0
daf8ff84a59bcb92e19e7d/analysis/; classtype:trojan-activity; sid:28817; rev:4;)
alert tcp any any -> any $HTTP_PORTS (msg:"MALWARE-CNC User-Agent known malicious
user-agent string - Linux.Trojan.Zollard"; flow:to_server,established;
content:"User-Agent|3A| Zollard|0D 0A|"; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/d757aa51974806e5402fb8a5c930518bf9ba0b2fd6
2f74e0f4c33d85bce08ada/analysis/; classtype:trojan-activity; sid:28852; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user-agent z00sAgent - Win.Trojan.Zbot";
flow:to_server,established; content:"User-Agent|3A| z00sAgent"; fast_pattern:only;
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0220b1071c8a0093e673d836ae436cb468b8cd1bd5
873dad08351309e13af9e5/analysis/1383673331/; classtype:trojan-activity; sid:28859;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 58455 (msg:"MALWARE-BACKDOOR Zollard
variant outbound connection attempt"; flow:to_server,established;
content:".zollard/"; fast_pattern:only; metadata:impact_flag red, ruleset
community, service telnet; reference:url,www.deependresearch.org/2013/12/hey-
zollard-leave-my-internet-of-things.html; classtype:trojan-activity; sid:28913;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Symmi
variant network connectivity check"; flow:to_server,established; content:"Host:
bit.ly|0D 0A|Accept: text/html, */*|0D 0A|Accept-Encoding: identity|0D 0A|User-
Agent: Mozilla/3.0 (compatible|3B| Indy Library)"; fast_pattern:only; http_header;
metadata:impact_flag red, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/47c71ff0eb61b371e967b93b6909bb05f2aab973e3
214ea2d5ed246884dd045e/analysis/; classtype:trojan-activity; sid:28918; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Symmi
variant network connectivity check"; flow:to_server,established; content:"Host:
bitly.com|0D 0A|Accept: text/html, */*|0D 0A|Accept-Encoding: identity|0D 0A|User-
Agent: Mozilla/3.0 (compatible|3B| Indy Library)"; fast_pattern:only; http_header;
metadata:impact_flag red, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/084455c1de5d9440eb95edd2e6868aab1ce3dd674c
2e3ba481254edc65b30b89/analysis/; classtype:trojan-activity; sid:28919; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fakeav variant outbound data connection"; flow:to_server,established;
urilen:>150; content:"/?"; depth:2; http_uri; content:"Firefox/4.0b8pre|0D 0A|";
fast_pattern:only; http_header; pcre:"/^\/\?[a-z0-9]{2}\=[a-z1-9]{100}/siU";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:28930; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Rovnix malicious download"; flow:to_server,established;
content:"/config.php?"; fast_pattern:only; http_uri; content:"version="; http_uri;
content:"user="; http_uri; content:"server="; http_uri; content:"id="; http_uri;
content:"crc="; http_uri; content:"id="; http_uri; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,isc.sans.edu/forums/diary/Suspected+Active+Rovnix+Botnet+Controller/1
7180; reference:url,www.welivesecurity.com/2012/02/22/rovnix-reloaded-new-step-of-
evolution/; classtype:trojan-activity; sid:28940; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
exe.exe download"; flow:to_server,established; urilen:>7; content:"/exe.exe";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:url,urlquery.net/search.php?q=%5C%2F%5BEe%5D%5BXx%5D%5BEe%5D%5C.%5BEe%5D
%5BXx%5D%5BEe%5D%24&type=regexp&start=2013-11-21&end=2013-12-06&max=400;
classtype:trojan-activity; sid:28945; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Alurewo outbound connection"; flow:to_server,established; content:"/cmd?
version="; fast_pattern:only; http_uri; content:"&aid="; http_uri; content:"&id=";
distance:0; http_uri; content:"&os="; within:4; distance:36; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,www.sophos.com/ja-jp/threat-
center/threat-analyses/viruses-and-spyware/Troj~Agent-AFDE/detailed-analysis.aspx;
reference:url,www.virustotal.com/en/file/9171bd76d3fa26a78225cb7c9d5112635fa84e8bdf
3388577f22da9178871161/analysis/; classtype:trojan-activity; sid:28960; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT HiMan
exploit kit outbound payload retreival - specific string";
flow:to_server,established; content:"/tx.exe"; fast_pattern:only; http_uri;
flowbits:set,file.exploit_kit.pe; metadata:policy balanced-ips drop, policy max-
detect-ips alert, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:28969; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Agent.DF - Data Exfiltration"; flow:to_server,established; content:"|3B|
name=|22|arquivo|22 3B| filename=|22|C:|5C|"; fast_pattern:only; http_client_body;
content:"|0D 0A|TP="; http_client_body; content:"|0D 0A|LGSN="; distance:0;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/b9587fc86f1459ccf7b096b6bf68b4fcc165946a86
f3ed9ce84c61907aa99dae/analysis/1386599712/; classtype:trojan-activity; sid:28976;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Agent.DF - User-Agent Missing Bracket"; flow:to_server,established;
content:"|3B 20|Windows NT 5.0|0D 0A|Host:"; fast_pattern:only; http_header;
content:" HTTP/1.1|0D 0A|Connection: Keep-Alive|0D 0A|Accept: */*|0D 0A|User-Agent:
Mozilla/"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/b9587fc86f1459ccf7b096b6bf68b4fcc165946a86
f3ed9ce84c61907aa99dae/analysis/1386599712/; classtype:trojan-activity; sid:28977;
rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Worm.Steckt
IRCbot requesting URL through IRC"; flow:to_client,established; content:"JOIN |3A|
#"; content:"!dl http://"; fast_pattern:only; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service irc;
reference:url,www.virustotal.com/en/file/411e93206a7750c8df25730349bf9756ddba52c1bc
780eaac4bba2b3872bc037/analysis/; classtype:trojan-activity; sid:28982; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Steckt IRCbot executable download"; flow:to_server,established;
content:"User-Agent|3A| Mozilla/4.0 |28|compatible|29 0D 0A|"; fast_pattern:only;
http_header; content:"/launch.php"; http_uri; content:"?f="; http_uri;
content:"&s="; distance:0; http_uri; content:"&is_direct="; distance:0; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/411e93206a7750c8df25730349bf9756ddba52c1bc
780eaac4bba2b3872bc037/analysis/; classtype:trojan-activity; sid:28983; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Worm.Steckt IRCbot executable download"; flow:to_server,established;
content:"User-Agent|3A| Mozilla/4.0 |28|compatible|29 0D 0A|"; fast_pattern:only;
http_header; content:"/direct.php"; http_uri; content:"?f="; http_uri;
content:"&s="; http_uri; pcre:"/\x2Fdirect\.php\x3Ff=[0-9]{8}\x26s=[a-z0-9]{3}\.[a-
z]{1,4}/U"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/411e93206a7750c8df25730349bf9756ddba52c1bc
780eaac4bba2b3872bc037/analysis/; classtype:trojan-activity; sid:28984; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Worm.Steckt IRCbot executable download"; flow:to_server,established;
content:"/site2/"; http_uri; content:!"Referer|3A| "; http_header; content:"60gp=";
http_cookie; content:"60gpBAK="; http_cookie; metadata:impact_flag red, ruleset
community, service http;
reference:url,www.virustotal.com/en/file/411e93206a7750c8df25730349bf9756ddba52c1bc
780eaac4bba2b3872bc037/analysis/; classtype:trojan-activity; sid:28985; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Worm.Neeris
IRCbot variant outbound connection"; flow:to_server,established; content:"JOIN #biz
abc|0D 0A|"; depth:15; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service irc;
reference:url,www.virustotal.com/en/file/0a8f320fc7535f164bbd9d0e462fd459c55ff448cf
5e84dc2115f2f4aa800e6b/analysis/1387176826/; classtype:trojan-activity; sid:28986;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Worm.Steckt
IRCbot variant outbound connection"; flow:to_server,established; content:"JOIN #n
jobs|0D 0A|"; depth:14; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service irc;
reference:url,www.virustotal.com/en/file/480eb4aa76a55ad7b0db128138113615ca834f9e6c
62f798f54c8ac0759657fe/analysis/1387177714/;
reference:url,www.virustotal.com/en/file/5b1d04b7504a3ac1befe4408fd4f9cd877b92661db
47a75f197924cb660551d3/analysis/1387178129/; classtype:trojan-activity; sid:28987;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Worm.Steckt
IRCbot variant outbound connection"; flow:to_server,established; content:"JOIN
#test1|20 7C 0D 0A|JOIN #test2|20 7C 0D 0A|JOIN #test3 (null)|0D 0A|"; depth:50;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service irc;
reference:url,www.virustotal.com/en/file/480eb4aa76a55ad7b0db128138113615ca834f9e6c
62f798f54c8ac0759657fe/analysis/1387177714/;
reference:url,www.virustotal.com/en/file/5b1d04b7504a3ac1befe4408fd4f9cd877b92661db
47a75f197924cb660551d3/analysis/1387178129/; classtype:trojan-activity; sid:28988;
rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Banload variant inbound connection"; flow:to_client,established;
content:"/avcheck.exe|0D 0A 0D 0A|"; fast_pattern:only; http_header; content:"|0D
0A|Location: https://dl.dropboxusercontent.com/"; http_header;
pcre:"/\r\nLocation\x3a\x20https\x3a\x2f{2}dl\.dropboxusercontent\.com\/[a-zA-
Z\d\x2f]{5,32}\/avcheck\.exe\r\n\r\n$/H"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/30032d2b7fd928392837eeb814cf1e2add0d80b0e1
7b8dbfec2e2c3be9164cf6/analysis/; classtype:trojan-activity; sid:29031; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established;
urilen:13,norm; content:"/webstat/?i="; depth:12; fast_pattern; http_uri;
content:"User-Agent: Mozilla/7"; http_header; content:"|3B 20|MSIE|20|";
distance:0; http_header; content:!"Accept-Encoding:"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:29127; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT CritX
exploit kit payload download attempt"; flow:to_server,established;
content:"/loadmsie.php?id="; fast_pattern:only; http_uri;
flowbits:set,file.exploit_kit.pe; metadata:policy balanced-ips alert, policy max-
detect-ips alert, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:29166; rev:5;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT CritX
exploit kit payload download attempt"; flow:to_client,established; content:".exe|0D
0A|"; fast_pattern:only; http_header; content:"filename="; http_header;
content:".exe|0D 0A|"; within:6; distance:24; http_header; pcre:"/filename=(?![a-f]
{24}|\d{24})[a-f\d]{24}\.exe\r\n/H"; flowbits:set,file.exploit_kit.pe;
metadata:policy balanced-ips alert, policy max-detect-ips alert, policy security-
ips drop, ruleset community, service http; classtype:trojan-activity; sid:29167;
rev:4;)
alert tcp any any -> any $HTTP_PORTS (msg:"MALWARE-CNC User-Agent known malicious
user-agent string fortis"; flow:to_server,established; content:"User-Agent: fortis|
0D 0A|"; fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/92614908e7842e0dfa72ecfee868b06017b5cc445f
201874776583f754b137a3/analysis/; classtype:trojan-activity; sid:29174; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Magnitude
exploit kit Microsoft Internet Explorer Payload request";
flow:to_server,established; urilen:34; content:"/?"; depth:2; fast_pattern;
http_uri; pcre:"/^\/\?[a-f0-9]{32}$/U"; content:" MSIE "; http_header;
content:!"Referer|3A|"; http_header; flowbits:set,file.exploit_kit.pe;
metadata:policy balanced-ips alert, policy max-detect-ips alert, policy security-
ips drop, ruleset community, service http; classtype:trojan-activity; sid:29189;
rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Androm variant outbound connection"; flow:to_server,established;
content:"/se/gate.php"; http_uri; content:"HTTP/1.1|0D 0A|Cache-Control: no-cache|
0D 0A|Connection: close|0D 0A|Pragma: no-cache|0D 0A|Content-Type: application/x-
www-form-urlencoded|0D 0A|User-Agent: Mozilla/4.0|0D 0A|Content-Length: ";
fast_pattern:only; pcre:"/\x3d\x0a$/P"; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0baf3197bdb2c665fea0a84db91d3f65171cf6cf9a
732fd394ff9f707ddaf682/analysis/; classtype:trojan-activity; sid:29216; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Strictor variant outbound connection"; flow:to_server,established;
urilen:19,norm; content:"/mod/lookfashon.jpg"; fast_pattern:only; http_uri;
content:!"Accept-Language:"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0fe413704c85751b060546ebfd428d57726d8fd002
ca95ec8deb76f5f37ed9c4/analysis/1389125202/; classtype:trojan-activity; sid:29220;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Graftor variant outbound connection"; flow:to_server,established;
content:"/chamjavanv.inf?aapf/login.jsp?="; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/a46c3fee842f1ded35b6a4e003c0e6ea62ee66d354
d4b826b4c3e5aa9310b3ba/analysis/; classtype:trojan-activity; sid:29259; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Graftor variant outbound connection"; flow:to_server,established;
content:"/novredir_inf.php?apt/login.jsp?="; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/a46c3fee842f1ded35b6a4e003c0e6ea62ee66d354
d4b826b4c3e5aa9310b3ba/analysis/; classtype:trojan-activity; sid:29260; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Dropper variant outbound connection"; flow:to_server,established;
urilen:19,norm; content:"/FileToDownload.exe"; fast_pattern:only; http_uri;
content:"Host: dl.dropbox.com|0D 0A|"; http_header; content:!"Accept"; http_header;
content:!"User-Agent"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,file-analyzer.net/analysis/1087/5386/0/html;
reference:url,www.virustotal.com/en/file/913cc54750e8bb6b88d5ccbfc988e0107f80ad14ba
4d052a3f3db11ccfd8ce4a/analysis/; classtype:trojan-activity; sid:29261; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Graftor variant inbound connection"; flow:to_client,established;
content:"|3B 20|filename=CostcoForm.zip|0D 0A|"; fast_pattern:only; http_header;
file_data; content:"CostcoForm.exe"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/b20fcfe7d851dfe1f835e60072e53b0a3c54e14d0f
c94814ce841be4740f295c/analysis; classtype:trojan-activity; sid:29300; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zusy variant outbound connection"; flow:to_server,established;
content:"rotina=UPDATE&tip=stat&nome="; depth:28; fast_pattern; http_client_body;
content:"&tmp="; distance:0; http_client_body; content:"&stat="; distance:0;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/6fdd7c0630ea89a58cdc1f3fb74bf5a99732bd5649
a39411868bf71e90cfdc84/analysis/1389362066/; classtype:trojan-activity; sid:29349;
rev:1;)
# alert tcp $EXTERNAL_NET [777,778] -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Dropper inbound encrypted traffic"; flow:to_client,established;
dsize:10<>20; content:"|05 29 00 00 00 05 29 00 00 00|"; fast_pattern:only;
metadata:ruleset community;
reference:url,www.virustotal.com/en/file/20b49af8b750a1899117827476402ccaf7095fb5b7
aad2e96c8109290da453cb/analysis/;
reference:url,www.virustotal.com/en/file/559e8dbe388c8c103996b208eb5532e295da717f84
b4a7ddf5c9885de8115606/analysis/; classtype:trojan-activity; sid:29378; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET [777,778] (msg:"MALWARE-CNC
Win.Trojan.Dropper outbound encrypted traffic - potential exfiltration";
flow:to_server,established; dsize:>1440; content:"|03 2B 82 86 02 A0 05|";
fast_pattern:only; metadata:ruleset community;
reference:url,www.virustotal.com/en/file/20b49af8b750a1899117827476402ccaf7095fb5b7
aad2e96c8109290da453cb/analysis/;
reference:url,www.virustotal.com/en/file/559e8dbe388c8c103996b208eb5532e295da717f84
b4a7ddf5c9885de8115606/analysis/; classtype:trojan-activity; sid:29379; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET [777,778] (msg:"MALWARE-CNC
Win.Trojan.Dropper outbound encrypted traffic"; flow:to_server,established;
dsize:5; content:"|05 29 00 00 00|"; fast_pattern:only; metadata:ruleset community;
reference:url,www.virustotal.com/en/file/20b49af8b750a1899117827476402ccaf7095fb5b7
aad2e96c8109290da453cb/analysis/;
reference:url,www.virustotal.com/en/file/559e8dbe388c8c103996b208eb5532e295da717f84
b4a7ddf5c9885de8115606/analysis/; classtype:trojan-activity; sid:29380; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-IDENTIFY Adobe AIR
file download request"; flow:to_server,established; content:".air";
fast_pattern:only; http_uri; pcre:"/\x2eair([\?\x5c\x2f]|$)/smiU";
flowbits:set,file.zip; flowbits:noalert; metadata:ruleset community, service http;
classtype:misc-activity; sid:29384; rev:11;)
alert tcp $EXTERNAL_NET [110,143] -> $HOME_NET any (msg:"FILE-IDENTIFY Adobe AIR
file attachment detected"; flow:to_client,established; content:".air";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2eair/i";
flowbits:set,file.zip; flowbits:noalert; metadata:ruleset community, service imap,
service pop3; classtype:misc-activity; sid:29385; rev:12;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"FILE-IDENTIFY Adobe AIR file
attachment detected"; flow:to_server,established; content:".air";
fast_pattern:only; content:"Content-Disposition: attachment|3B|";
content:"filename="; nocase; pcre:"/filename=[^\n]*\x2eair/i";
flowbits:set,file.zip; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:29386; rev:12;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Zeus
variant outbound connection"; flow:to_server,established; urilen:6; content:"/webhp
HTTP/1.1|0D 0A|Accept: */*|0D 0A|Connection: Close|0D 0A|User-Agent: Mozilla/4.0
("; fast_pattern:only; content:"|3B| MSIE "; http_header; content:"google.";
http_header; content:!"Accept-"; http_header; content:"NID="; depth:4; http_cookie;
metadata:impact_flag red, ruleset community, service http;
reference:url,www.virustotal.com/en/file/ef4e0ccc49decb41f213a20f61d92374c3b9749710
5d7c20e7284f65055d2ccb/analysis/; classtype:trojan-activity; sid:29395; rev:1;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"POLICY-SPAM Potential
phishing attack - .zip receipt filename download with .exe name within .zip the
same"; flow:to_client,established; content:"Receipt"; fast_pattern:only;
http_header; content:".zip"; http_header; pcre:"/\sfilename=[a-z0-9]
{0,20}receipt[a-z0-9]{0,20}\.zip/Hi"; file_data; content:"PK"; depth:2;
content:".exe"; within:50; metadata:ruleset community, service http;
classtype:trojan-activity; sid:29396; rev:1;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"POLICY-SPAM Potential
phishing attack - .zip shipping filename download with .exe name within .zip the
same"; flow:to_client,established; content:"Shipping"; fast_pattern:only;
http_header; content:".zip"; http_header; pcre:"/\sfilename=[a-z0-9]
{0,20}shipping[a-z0-9]{0,20}\.zip/Hi"; file_data; content:"PK"; depth:2;
content:".exe"; within:50; metadata:ruleset community, service http;
classtype:trojan-activity; sid:29397; rev:1;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"POLICY-SPAM Potential
phishing attack - .zip voicemail filename download with .exe name within .zip the
same"; flow:to_client,established; content:"voicemail"; fast_pattern:only;
http_header; content:".zip"; http_header; pcre:"/\sfilename=[a-z0-9]
{0,20}voicemail[a-z0-9]{0,20}\.zip/Hi"; file_data; content:"PK"; depth:2;
content:".exe"; within:50; metadata:ruleset community, service http;
classtype:trojan-activity; sid:29398; rev:1;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"POLICY-SPAM Potential
phishing attack - .zip statement filename download with .exe name within .zip the
same"; flow:to_client,established; content:"statement"; fast_pattern:only;
http_header; content:".zip"; http_header; pcre:"/\sfilename=[a-z0-9]
{0,20}statement[a-z0-9]{0,20}\.zip/Hi"; file_data; content:"PK"; depth:2;
content:".exe"; within:50; metadata:ruleset community, service http;
classtype:trojan-activity; sid:29399; rev:1;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Unusual
L3retriever Ping detected"; icode:0; itype:8; dsize:>32;
content:"ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI"; depth:32; metadata:ruleset community;
reference:url,krebsonsecurity.com/2014/01/a-closer-look-at-the-target-malware-part-
ii/; reference:url,krebsonsecurity.com/2014/01/a-first-look-at-the-target-
intrusion-malware/; classtype:successful-recon-limited; sid:29454; rev:1;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Unusual
Microsoft Windows Ping detected"; icode:0; itype:8; dsize:>32;
content:"0123456789abcdefghijklmnopqrstuv"; depth:32; metadata:ruleset community;
reference:url,krebsonsecurity.com/2014/01/a-closer-look-at-the-target-malware-part-
ii/; reference:url,krebsonsecurity.com/2014/01/a-first-look-at-the-target-
intrusion-malware/; classtype:successful-recon-limited; sid:29455; rev:1;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Unusual PING
detected"; icode:0; itype:8; fragbits:!M;
content:!"ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI"; depth:32;
content:!"0123456789abcdefghijklmnopqrstuv"; depth:32;
content:!"EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"; depth:36; content:!"WANG2";
content:!"cacti-monitoring-system"; depth:65; content:!"SolarWinds"; depth:72;
metadata:ruleset community; reference:url,krebsonsecurity.com/2014/01/a-closer-
look-at-the-target-malware-part-ii/; reference:url,krebsonsecurity.com/2014/01/a-
first-look-at-the-target-intrusion-malware/; classtype:successful-recon-limited;
sid:29456; rev:2;)
# alert icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"PROTOCOL-ICMP Unusual
Microsoft Windows 7 Ping detected"; icode:0; itype:8; dsize:>32;
content:"abcdefghijklmnopqrstuvwabcdefghi"; depth:32; metadata:ruleset community;
reference:url,krebsonsecurity.com/2014/01/a-closer-look-at-the-target-malware-part-
ii/; reference:url,krebsonsecurity.com/2014/01/a-first-look-at-the-target-
intrusion-malware/; classtype:successful-recon-limited; sid:29457; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.Fexel
variant outbound connection"; flow:to_server,established; content:"|0A|Agtid|3A
20|"; content:"08x|0D 0A|"; within:5; distance:8; metadata:impact_flag red, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/b33ffbec01b43301edd9db42a59dcd33dd45f63873
3e2f92f0cb5bfe86714734/analysis/; classtype:trojan-activity; sid:29459; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Linux.Backdoor.Shellbot outbound connection"; flow:to_server,established;
content:"JOIN|20|#vnc|0A|"; depth:10; content:"PRIVMSG|20|#vnc|20 3A|"; within:14;
content:"status checking program online"; within:30; distance:7; nocase;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service irc;
reference:url,www.virustotal.com/en/file/8eb6c4a844cbfe98db78aef08a634c460c7c9f7d57
6b62444114306effb4023d/analysis/1390763713/; classtype:trojan-activity; sid:29569;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DomaIQ variant outbound connection"; flow:to_server,established;
content:"/trace/Start HTTP/1.1|0D 0A|Host: "; fast_pattern:only;
content:"/debug/Version/"; depth:15; http_uri; content:!"Accept"; http_header;
content:!"User-Agent:"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,file-analyzer.net/analysis/1546/6325/0/html#network;
reference:url,www.virustotal.com/en/file/59795540fc058979c6be02351507330fce8a8d3c6f
10cbcd4ee21ab0144b9a7f/analysis/1390421409/; classtype:trojan-activity; sid:29664;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Graftor variant outbound connection"; flow:to_server,established;
content:"&bolausado"; fast_pattern:only; http_client_body; content:"rotina=";
depth:7; http_client_body; content:"&casa="; distance:0; http_client_body;
content:"&idcliente"; distance:0; http_client_body; content:"&outro="; distance:0;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/9ce3d15cbb5bc8cd42570f44ab4eb8f6332c5d0f28
291d295883bf2923c01d4b/analysis/; classtype:trojan-activity; sid:29665; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Linkup outbound connection"; flow:to_server,established; urilen:20;
content:"POST"; http_method; content:"/uplink.php?logo.jpg"; fast_pattern:only;
http_uri; content:"User-Agent: Mozilla/5.0"; http_header; content:"token=";
depth:6; http_client_body; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,blog.emsisoft.com/2014/02/03/malware-analysis-ransomware-linkup-
blocks-dns-and-mines-bitcoins/; classtype:trojan-activity; sid:29666; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user-agent string MSIE 4.01 - Win.Trojan.Careto";
flow:to_server,established; content:"Mozilla/4.0 |28|compatible|3B| MSIE 4.01|3B|
Windows NT|29 0D 0A|"; fast_pattern:only; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/19e818d0da361c4feedd456fca63d68d4b024fbbd3
d9265f606076c7ee72e8f8/analysis/; classtype:trojan-activity; sid:29760; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Careto outbound connection"; flow:to_server,established; content:"Group|
3D|"; http_uri; content:"Install|3D|"; http_uri; content:"Ver|3D|"; http_uri;
content:"Ask|3D|"; http_uri; content:"Bn|3D|"; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/19e818d0da361c4feedd456fca63d68d4b024fbbd3
d9265f606076c7ee72e8f8/analysis/; classtype:trojan-activity; sid:29788; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Careto plugin download"; flow:to_server,established;
content:"/ag/plugin.crx"; fast_pattern:only; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/19e818d0da361c4feedd456fca63d68d4b024fbbd3
d9265f606076c7ee72e8f8/analysis/; classtype:trojan-activity; sid:29789; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Careto plugin download"; flow:to_server,established;
content:"/l/af_l_addon.xpi"; fast_pattern:only; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/19e818d0da361c4feedd456fca63d68d4b024fbbd3
d9265f606076c7ee72e8f8/analysis/; classtype:trojan-activity; sid:29790; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Careto plugin download"; flow:to_server,established;
content:"/m/f_l_addon.xpi"; fast_pattern:only; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/19e818d0da361c4feedd456fca63d68d4b024fbbd3
d9265f606076c7ee72e8f8/analysis/; classtype:trojan-activity; sid:29791; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Jackpos outbound connection"; flow:to_server, established;
content:"/post"; http_uri; content:"User-Agent: something"; fast_pattern:only;
http_header; content:"mac="; http_client_body; content:"&t1="; distance:0;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/39c13ee490a2c4cf6f3aafe92734edbf2373f25cc6
fab8e15cd4cf590f1abdf1/analysis; classtype:trojan-activity; sid:29816; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Jackpos outbound connection"; flow:to_server, established; urilen:10;
content:"/post/echo"; fast_pattern:only; http_uri; content:!"User-Agent:";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/39c13ee490a2c4cf6f3aafe92734edbf2373f25cc6
fab8e15cd4cf590f1abdf1/analysis; classtype:trojan-activity; sid:29817; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user agent - TixDll - Win.Trojan.Adload.dyhq";
flow:to_server,established; content:"User-Agent: TixDll|0D 0A|"; fast_pattern:only;
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/f5fbdc74afc209f2648490e077a2fcddc402cbc57a
babbc2f735aaecde95681b/analysis/; classtype:trojan-activity; sid:29824; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Adload.dyhq variant outbound connection"; flow:to_server,established;
content:"/get/?ver="; depth:10; http_uri; content:"&aid="; distance:0; http_uri;
content:"&hid="; distance:0; http_uri; content:"&rid="; distance:0; http_uri;
content:"&data="; distance:0; http_uri; content:!"Referer:"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/f5fbdc74afc209f2648490e077a2fcddc402cbc57a
babbc2f735aaecde95681b/analysis/; classtype:trojan-activity; sid:29828; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP HNAP
remote code execution attempt"; flow:established,to_server; urilen:6;
content:"/HNAP1"; fast_pattern:only; http_uri; content:"Authorization: Basic
YWRtaW46"; http_header; metadata:policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,isc.sans.edu/diary/Linksys+Worm+%22TheMoon%22+Summary
%3A+What+we+know+so+far/17633; classtype:attempted-admin; sid:29829; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys E-
series HNAP TheMoon remote code execution attempt"; flow:established,to_server;
content:"/tmUnblock.cgi"; fast_pattern:only; http_uri; content:"%74%74%63%70%5f
%69%70"; http_client_body; pcre:"/%74%74%63%70%5f%69%70%3d.*?([\x60\x3b\x7c]|
[\x3c\x3e\x24]\x28|%60|%3b|%7c|%26|%3c%28|%3e%28|%24%28)/Pim"; metadata:policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; reference:url,isc.sans.edu/diary/Linksys+Worm+
%28%22TheMoon%22%29+Captured/17630; classtype:attempted-admin; sid:29830; rev:3;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys E-
series HNAP TheMoon remote code execution attempt"; flow:established,to_server;
content:"/tmUnblock.cgi"; fast_pattern:only; http_uri; content:"ttcp_ip";
http_client_body; pcre:"/ttcp_ip=.*?([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28|%60|%3b|%7c|
%26|%3c%28|%3e%28|%24%28)/Pim"; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,isc.sans.edu/diary/Linksys+Worm+%28%22TheMoon%22%29+Captured/17630;
classtype:attempted-admin; sid:29831; rev:3;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Pirminay variant outbout connection"; flow:to_client,established;
content:"filename=|22|full__setup.zip|22 0D 0A|"; fast_pattern:only; http_header;
file_data; content:"full__setup.exe"; depth:200; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/5e1a615ddf73b27390d7a3c87a28932761fc1c843e
01cd68253e873270bef69d/analysis/1392222514/; classtype:trojan-activity; sid:29862;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Pirminay variant outbound connection"; flow:to_server,established;
urilen:33; content:"/read/swf/searchProductResult.jsp"; fast_pattern:only;
http_uri; content:"cache=cc2="; depth:10; http_cookie; content:"|3B| core=";
distance:0; http_cookie; metadata:impact_flag red, ruleset community, service http;
reference:url,www.virustotal.com/en/file/5e1a615ddf73b27390d7a3c87a28932761fc1c843e
01cd68253e873270bef69d/analysis/1392222514/; classtype:trojan-activity; sid:29863;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Redkit
exploit kit payload request"; flow:to_server,established; content:"/download.asp?
p="; nocase; http_uri; content:" Java/1."; fast_pattern:only; http_header;
pcre:"/\/download\.asp\?p\=\d$/Ui"; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.invincea.com/2014/02/ekia-citadel-a-k-a-the-malware-the-popped-
fazio-mechanical/; classtype:trojan-activity; sid:29864; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.Kuluoz
outbound connection"; flow:to_server,established; content:" HTTP/1.1|0D 0A|Accept:
*/*|0D 0A|Content-Type: application/x-www-form-urlencoded|0D 0A|User-Agent:
Mozilla/5.0 (Windows NT 6.1|3B| WOW64|3B| rv:25.0) Gecko/20100101 Firefox/25.0|0D
0A|Host: "; fast_pattern:only; content:"POST /"; depth:6; content:" HTTP/1.1";
within:9; distance:42; pcre:"/^POST\x20\x2f[A-F\d]{42}\x20HTTP/";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/8b53c46a7dfbe738c558e653f33fccf2004fc29484
8eee20903daa556bb3af09/analysis/; classtype:trojan-activity; sid:29865; rev:5;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Napolar phishing attack"; flow:to_client,established;
content:"facebook.com.exe"; fast_pattern:only; metadata:policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/58762cf6aa8eea5744716986773a2c22ae7412eae6
34be7bed648c96465bc8ef/analysis/; classtype:trojan-activity; sid:29869; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Pony HTTP response connection"; flow:to_client,established;
content:"Content-Length: 16"; http_header; file_data; content:"STATUS-IMPORT-OK";
fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,file-
analyzer.net/analysis/1830/6840/0/html;
reference:url,www.virustotal.com/en/file/58762cf6aa8eea5744716986773a2c22ae7412eae6
34be7bed648c96465bc8ef/analysis/; classtype:trojan-activity; sid:29870; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.WEC variant outbound connection"; flow:to_server,established; dsize:69;
urilen:1; content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0|0D 0A|Host:
checkip.dyndns.org|0D 0A 0D 0A|"; fast_pattern:only; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/164c792247b2822ab1dce8271a9498d3c9172ff21d
36feccf83265ded1be8d0b/analysis/; classtype:trojan-activity; sid:29882; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/gate.php"; fast_pattern:only; http_uri;
content:"|3B 20|MSIE|20|"; http_header; content:!"Accept-Language:"; http_header;
content:!"Referer:"; http_header; content:!"Accept-Encoding:"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:29884; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC User-Agent known
malicious user-agent string Updates downloader - Win.Trojan.Upatre";
flow:to_server,established; content:"User-Agent|3A| Updates downloader|0D 0A|";
fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/F167C95A467F584890F39BA2162F1B96E7626F5C57
5EB151C8E4E00E68F97478/analysis/; classtype:trojan-activity; sid:29887; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Pushdo variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:!"Referer|3A 20|"; http_header;
content:"Accept|3A| */*|0D 0A|Accept-Language|3A| en-us|0D 0A|Content-Type|3A|
application/octet-stream|0D 0A|Content-Length|3A| "; depth:93; http_header;
content:"User-Agent|3A| Mozilla/4.0 (compatible|3B| MSIE 6.0|3B| Windows NT 5.1|3B|
SV1)|0D 0A|Host|3A|"; distance:0; fast_pattern:34,20; http_header;
content:"Connection|3A| Keep-Alive|0D 0A|Cache-Control|3A| no-cache|0D 0A|";
distance:0; http_header; metadata:policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; classtype:trojan-activity; sid:29891;
rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"Content-Length: 166"; content:".php HTTP/1.1|0D 0A|Accept: */*|0D 0A|
Content-Type: application/x-www-form-urlencoded|0D 0A|User-Agent: Mozilla/5.0
(Windows NT 6.1|3B| Trident/7.0|3B| rv:11.0) like Gecko|0D 0A|Host: ";
fast_pattern:only; content:"v="; depth:2; http_client_body; content:"&c=";
within:7; http_client_body; pcre:"/\x3d\x3d$/P"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/51540d7c9a4bc2a430bc50c85cf9cec5c6f2bb755e
800a3f3575ba34fe5f008c/analysis; classtype:trojan-activity; sid:29895; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ExplorerHijack variant outbound connection"; flow:to_server,established;
urilen:12; content:"/prl/el.html"; fast_pattern:only; http_uri; content:"Accept:
text/html, */*|0D 0A|User-Agent: Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A 0D
0A|"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/b6f44c7466338ea14d1e711491b1d8174ee71e0054
1759eb18a31f959da521a9/analysis/;
reference:url,www.virustotal.com/en/file/de67654959d29ffc5b9ec854d1e9e240ec96090ce8
b3f9c3c9b337b7f2a54f8a/analysis/; classtype:trojan-activity; sid:29897; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Tiny variant outbound connection"; flow:to_server,established;
content:"/ie-error.gif?action=utility"; fast_pattern:only; http_uri;
content:"&os="; http_uri; content:"&error="; distance:0; http_uri; content:"&rnd=";
distance:0; http_uri; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/d446e176ba2141d0e7ae0799335fdd98f94d5e6b41
c88083f4a3d3c04805a721/analysis/; classtype:trojan-activity; sid:29981; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Hello/LightsOut exploit kit payload download attempt"; flow:to_server,established;
content:".php?a=dw"; fast_pattern:only; http_uri; pcre:"/\?a=dw[a-z]$/U"; content:"
Java/1."; http_header; flowbits:set,file.exploit_kit.pe; metadata:policy balanced-
ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2011-1255; reference:cve,2012-1723; reference:cve,2013-
1489; reference:url,blogs.cisco.com/security/watering-hole-attacks-target-energy-
sector/; reference:url,jsunpack.jeek.org/?
report=2a298ffa14fd2772bd646bd559f610b0c3b51862; reference:url,jsunpack.jeek.org/?
report=977b49ea5dc5ef85d8f50d1f1222befee8bf3581; classtype:trojan-activity;
sid:30003; rev:5;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Androm variant outbound connection"; flow:to_server,established;
urilen:14; content:"POST"; http_method; content:"/and/image.php";
fast_pattern:only; http_uri; content:"User-Agent: Mozilla/4.0|0D 0A|"; http_header;
pcre:"/^[a-z\d\x2f\+\x3d]{10,98}$/Pi"; metadata:impact_flag red, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0baf3197bdb2c665fea0a84db91d3f65171cf6cf9a
732fd394ff9f707ddaf682/analysis; classtype:trojan-activity; sid:30068; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER
ANDR.Trojan.iBanking outbound connection attempt"; flow:to_server,established;
urilen:21; content:"/android/sms/sync.php"; fast_pattern:only; http_uri;
content:"User-Agent|3A 20|Apache-HttpClient|2F|"; http_header; content:"bot_id=";
http_client_body; content:"&imei="; distance:0; http_client_body;
content:"&iscallhack="; distance:0; http_client_body; content:"&issmshack=";
distance:0; http_client_body; content:"&isrecordhack="; distance:0;
http_client_body; content:"&isadmin="; distance:0; http_client_body;
content:"&control_number="; distance:0; http_client_body; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,www.kernelmode.info/forum/viewtopic.php?f=16&t=3166;
reference:url,www.virustotal.com/en/file/38f6fccfc8a31306c0a03cad6908c148e8506fd70c
e03165fd89e18113b68e02/analysis/; classtype:trojan-activity; sid:30070; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER
ANDR.Trojan.iBanking outbound connection attempt"; flow:to_server,established;
urilen:21; content:"POST"; http_method; content:"/android/sms/ping.php";
fast_pattern:only; http_uri; content:"User-Agent|3A 20|Apache-HttpClient|2F|";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.kernelmode.info/forum/viewtopic.php?f=16&t=3166;
reference:url,www.virustotal.com/en/file/38f6fccfc8a31306c0a03cad6908c148e8506fd70c
e03165fd89e18113b68e02/analysis/; classtype:trojan-activity; sid:30071; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER
ANDR.Trojan.iBanking outbound connection attempt"; flow:to_server,established;
urilen:22; content:"/android/sms/index.php"; fast_pattern:only; http_uri;
content:"User-Agent|3A 20|Apache-HttpClient|2F|"; http_header; content:"bot_id=";
http_client_body; content:"&number=&iccid=&model="; distance:0; http_client_body;
content:"&imei="; distance:0; http_client_body; content:"&os="; distance:0;
http_client_body; content:"&control_number="; distance:0; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.kernelmode.info/forum/viewtopic.php?f=16&t=3166;
reference:url,www.virustotal.com/en/file/38f6fccfc8a31306c0a03cad6908c148e8506fd70c
e03165fd89e18113b68e02/analysis/; classtype:trojan-activity; sid:30072; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gamut configuration download"; flow:to_server,established; content:"|26|
file=SenderClient.conf"; fast_pattern:only; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/dcb60900fcfd4ec83930177b7055fbdbba37f8e217
409874be130f9c2e5b78fb/analysis/; classtype:trojan-activity; sid:30087; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Necurs variant outbound connection"; flow:to_server,established;
urilen:13; content:"/forum/db.php HTTP/1.1|0D 0A|Content-Type: application/octet-
stream|0D 0A|Host: "; fast_pattern:only; content:!"User-Agent:"; http_header;
content:!"Referer:"; http_header; content:!"Accept"; http_header; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,file-analyzer.net/analysis/2306/8066/0/html#network;
reference:url,www.virustotal.com/en/file/009f75196d1df18713d2572e3a797fb6a784a5c6c7
dd7d253ba408ed7164c313/analysis/1393271978/; classtype:trojan-activity; sid:30091;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Uroburos usermode-centric client request"; flow:to_server,established;
content:"/1/6b-558694705129b01c0"; fast_pattern:only; http_uri;
content:"Connection: Keep-Alive|0D 0A|"; nocase; metadata:impact_flag red, policy
balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,info.baesystemsdetica.com/rs/baesystems/images/snake_whitepaper.pdf;
reference:url,public.gdatasoftware.com/Web/Content/INT/Blog/2014/02_2014/documents/
GData_Uroburos_RedPaper_EN_v1.pdf;
reference:url,www.virustotal.com/en/file/50edc955a6e8e431f5ecebb5b1d3617d3606b8296f
838f0f986a929653d289ed/analysis/; classtype:trojan-activity; sid:30191; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Androm variant outbound connection"; flow:to_server,established;
urilen:14; content:"/tmp/image.php"; fast_pattern:only; http_uri; content:"User-
Agent: Mozilla/4.0|0D 0A|"; http_header; content:!"Accept"; http_header;
pcre:"/^[a-z\d\x2b\x2f\x3d]{48,256}$/iP"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0fb9613582fd025b6fd14dcd003973c676db3798b7
33851a6b37ef6b0bc5f3be/analysis; classtype:trojan-activity; sid:30196; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi variant outbound connection"; flow:to_server,established;
content:".xpg.com.br|0D 0A|Accept: text/html, */*|0D 0A|Accept-Encoding: identity|
0D 0A|User-Agent: Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A 0D 0A|";
fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/d28a89d789d51b30730a43ef903bc0fbb58e7014e9
d55fbb2e42fd640fee1eac/analysis/; classtype:trojan-activity; sid:30198; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Nuclear
exploit kit outbound payload request"; flow:to_server,established; content:"/f/";
depth:3; http_uri; pcre:"/^\/f(?:\/\d)?\/1[34]\d{8}(?:\/\d{9,10})?(?:\/\d)+[^a-zA-
Z]{1,6}$/U"; flowbits:set,file.exploit_kit.pe; metadata:policy balanced-ips drop,
policy max-detect-ips alert, policy security-ips drop, ruleset community, service
http; classtype:trojan-activity; sid:30220; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Graftor variant outbound connection"; flow:to_server,established;
content:"|0D 0A|User-Agent: Mozilla/5.0 (Windows|3B| U|3B| Windows NT 6.1|3B| pt-
BR|3B| rv:1.9.2b5) Gecko/20091204 Firefox/3.6b5|0D 0A 0D 0A|"; fast_pattern:only;
content:"|0D 0A|Accept-Encoding: gzip,deflate, identity|0D 0A|"; http_header;
content:" HTTP/1.1|0D 0A|Content-Type: application/x-www-form-urlencoded|0D 0A|";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/9ce3d15cbb5bc8cd42570f44ab4eb8f6332c5d0f28
291d295883bf2923c01d4b/analysis/; classtype:trojan-activity; sid:30234; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Strictor HTTP Response - Brazil Geolocated Infected User";
flow:to_client,established; content:"Content-Length: 6|0D 0A|"; http_header;
file_data; content:"BRASIL"; depth:6; fast_pattern; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/4b6a4211191c8115a3bce64897159127dabcef0fbf
6268007cb223dfa0870b60/analysis/; classtype:trojan-activity; sid:30255; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Strictor HTTP Response - Non-Brazil Geolocated Infected User";
flow:to_client,established; content:"Content-Length: 13|0D 0A|"; http_header;
file_data; content:"INTERNACIONAL"; depth:13; fast_pattern; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/4b6a4211191c8115a3bce64897159127dabcef0fbf
6268007cb223dfa0870b60/analysis/; classtype:trojan-activity; sid:30256; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ExplorerHijack variant outbound connection"; flow:to_server,established;
urilen:12; content:"/eh.html HTTP/1.1|0D 0A|Content-Type: text/html|0D 0A|Host: ";
fast_pattern:only; content:"|0D 0A|Accept: text/html, */*|0D 0A|User-Agent:
Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A 0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/29c3af334ce712ff66985f3584ad0af53ab16c2968
ca41f06b900d703a27064e/analysis/1393266939/;
reference:url,www.virustotal.com/en/file/5c2689920192836b3788a15f856ba311b54976a0a7
5016cbf0ae9a85d5a21d76/analysis/; classtype:trojan-activity; sid:30257; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/forumdisplay.php?fid="; fast_pattern:only;
http_uri; content:"id="; depth:3; http_client_body; content:"&iv="; within:4;
distance:36; http_client_body; content:!"Referer:"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/52906104fa7cf93bbaba9ac9c6c5ffb8c72799e142
48045e467c6568926cb494/analysis/1386078525/;
reference:url,www.virustotal.com/en/file/5a9cd53f13825e17107d6b9f81ebe4013f3abf2342
9d9735c7258d43c101b71f/analysis/; classtype:trojan-activity; sid:30258; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Strictor variant outbound connection"; flow:to_server,established;
content:"/20"; depth:3; http_uri; content:"|0D 0A|Accept: text/html, */*|0D 0A|
Accept-Encoding: identity|0D 0A|User-Agent: Mozilla/3.0 (compatible|3B| Indy
Library)|0D 0A 0D 0A|"; fast_pattern:only; http_header; content:".inf"; nocase;
http_uri; metadata:impact_flag red, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/143756537dfb4964c04d874fd16366ef384bdb4f64
a739db019fa9b947b821a1/analysis/1395684118/; classtype:trojan-activity; sid:30259;
rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Lucky Leap
Adware outbound connection"; flow:to_server,established; content:"/gcs?alpha=";
fast_pattern:only; http_uri; content:"|0D 0A|Cache-Control: no-store,no-cache|0D
0A|Pragma: no-cache|0D 0A|Connection: Keep-Alive|0D 0A 0D 0A|"; content:!"Accept";
http_header; content:!"User-Agent:"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/43c6fb02baf800b3ab3d8f35167c37dced8ef32446
91e70499a7a9243068c016/analysis/1395425759/; classtype:trojan-activity; sid:30260;
rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Lucky Leap
Adware outbound connection"; flow:to_server,established; content:"/gdi?alpha=";
fast_pattern:only; http_uri; content:"|0D 0A|Cache-Control: no-store,no-cache|0D
0A|Pragma: no-cache|0D 0A|Connection: Keep-Alive|0D 0A 0D 0A|"; content:!"Accept";
http_header; content:!"User-Agent:"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/43c6fb02baf800b3ab3d8f35167c37dced8ef32446
91e70499a7a9243068c016/analysis/1395425759/; classtype:trojan-activity; sid:30261;
rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi variant outbound connection"; flow:to_server,established;
content:"lista"; http_uri; content:"|3B| name=|22|arquivo|22 3B| filename=|22|C:|
5C|"; fast_pattern:only; http_client_body; content:".log|22 0D 0A|"; nocase;
http_client_body; content:!"Accept-"; http_header; metadata:policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/c70ca3914e44cf574f50019892916ed910d7454cdb
64b4eab403961c953fe44e/analysis/1395407305/; classtype:trojan-activity; sid:30262;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 1024: (msg:"MALWARE-CNC
Win.Trojan.Glupteba.M initial outbound connection"; flow:to_server,established;
content:"/stat?"; content:"uptime="; content:"&downlink="; distance:0;
content:"&uplink="; distance:0; content:"&id="; distance:0;
content:"&statpass=bpass"; distance:0; fast_pattern; content:"&version=";
distance:0; content:"&features="; distance:0; content:"&guid="; distance:0;
content:"&comment="; distance:0; content:"&p="; distance:0; content:"&s=";
distance:0; metadata:policy balanced-ips drop, policy security-ips drop, ruleset
community, service http; reference:url,www.welivesecurity.com/wp-
content/uploads/2014/03/operation_windigo.pdf; classtype:trojan-activity;
sid:30288; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT
Goon/Infinity exploit kit malicious portable executable file request";
flow:to_server,established; content:".mp3?rnd="; fast_pattern:only; http_uri;
pcre:"/\/\d+\.mp3\?rnd=\d+$/U"; flowbits:set,file.exploit_kit.pe; metadata:policy
balanced-ips drop, policy max-detect-ips alert, policy security-ips drop, ruleset
community, service http; classtype:trojan-activity; sid:30319; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Linux.Trojan.Calfbot outbound connection"; flow:to_server,established;
content:"/b/index.php?id="; fast_pattern:only; http_uri; content:"&sent=";
http_uri; content:"&notsent="; distance:0; http_uri; content:"&stat="; distance:0;
http_uri; metadata:ruleset community, service http;
reference:url,www.welivesecurity.com/wp-
content/uploads/2014/03/operation_windigo.pdf; classtype:trojan-activity;
sid:30336; rev:2;)
alert tcp $EXTERNAL_NET 1600:1604 -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Zbot/Bublik inbound connection"; flow:to_client,established; content:"E|
00|N|00|D|00|S|00|E|00|R|00|V|00|E|00|R|00|B|00|U|00|F|00|F|00|E|00|R|00|";
fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community;
reference:url,isc.sans.edu/forums/diary/Malicious+PDF+sent+in+massive+scam+to+Colom
bian+users+claiming+to+be+from+Credit+score+agency/17875;
reference:url,www.virustotal.com/en/file/bbc1a8b0892785c75f0f44d9414e424ed03cefbf95
1ed20eaae50031670c8a96/analysis/; classtype:trojan-activity; sid:30482; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 1600:1604 (msg:"MALWARE-CNC
Win.Trojan.Zbot/Bublik outbound connection"; flow:to_server,established;
content:"GET /123456789.functionss"; fast_pattern:only; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,isc.sans.edu/forums/diary/Malicious+PDF+sent+in+massive+scam+to+Colom
bian+users+claiming+to+be+from+Credit+score+agency/17875;
reference:url,www.virustotal.com/en/file/bbc1a8b0892785c75f0f44d9414e424ed03cefbf95
1ed20eaae50031670c8a96/analysis/; classtype:trojan-activity; sid:30483; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 1600:1604 (msg:"MALWARE-CNC
Win.Trojan.Zbot/Bublik outbound connection"; flow:to_server,established; dsize:<20;
content:"myversion|7C|"; fast_pattern:only; pcre:"/myversion\x7c(\d\x2e)
{3}\d\x0d\x0a/"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community;
reference:url,isc.sans.edu/forums/diary/Malicious+PDF+sent+in+massive+scam+to+Colom
bian+users+claiming+to+be+from+Credit+score+agency/17875;
reference:url,www.virustotal.com/en/file/bbc1a8b0892785c75f0f44d9414e424ed03cefbf95
1ed20eaae50031670c8a96/analysis/; classtype:trojan-activity; sid:30484; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET [21,25,443,465,636,992,993,995,2484]
(msg:"SERVER-OTHER OpenSSL SSLv3 heartbeat read overrun attempt";
flow:to_server,established,only_stream; content:"|18 03 00|"; depth:3;
detection_filter:track by_src, count 3, seconds 1; metadata:policy balanced-ips
drop, policy security-ips drop, ruleset community, service ssl; reference:cve,2014-
0160; classtype:attempted-recon; sid:30510; rev:7;)
alert tcp $EXTERNAL_NET any -> $HOME_NET [21,25,443,465,636,992,993,995,2484]
(msg:"SERVER-OTHER OpenSSL TLSv1 heartbeat read overrun attempt";
flow:to_server,established,only_stream; content:"|18 03 01|"; depth:3;
detection_filter:track by_src, count 3, seconds 1; metadata:policy balanced-ips
drop, policy security-ips drop, ruleset community, service ssl; reference:cve,2014-
0160; classtype:attempted-recon; sid:30511; rev:7;)
alert tcp $EXTERNAL_NET any -> $HOME_NET [21,25,443,465,636,992,993,995,2484]
(msg:"SERVER-OTHER OpenSSL TLSv1.1 heartbeat read overrun attempt";
flow:to_server,established,only_stream; content:"|18 03 02|"; depth:3;
detection_filter:track by_src, count 3, seconds 1; metadata:policy balanced-ips
drop, policy security-ips drop, ruleset community, service ssl; reference:cve,2014-
0160; classtype:attempted-recon; sid:30512; rev:7;)
alert tcp $EXTERNAL_NET any -> $HOME_NET [21,25,443,465,636,992,993,995,2484]
(msg:"SERVER-OTHER OpenSSL TLSv1.2 heartbeat read overrun attempt";
flow:to_server,established,only_stream; content:"|18 03 03|"; depth:3;
detection_filter:track by_src, count 3, seconds 1; metadata:policy balanced-ips
drop, policy security-ips drop, ruleset community, service ssl; reference:cve,2014-
0160; classtype:attempted-recon; sid:30513; rev:7;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed
attempt"; flow:to_client,established,only_stream; content:"|18 03 00|"; depth:3;
byte_test:2,>,128,0,relative; metadata:policy balanced-ips drop, policy security-
ips drop, ruleset community, service ssl; reference:cve,2014-0160;
classtype:attempted-recon; sid:30514; rev:9;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed
attempt"; flow:to_client,established,only_stream; content:"|18 03 01|"; depth:3;
byte_test:2,>,128,0,relative; metadata:policy balanced-ips drop, policy security-
ips drop, ruleset community, service ssl; reference:cve,2014-0160;
classtype:attempted-recon; sid:30515; rev:9;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1.1 large heartbeat response - possible ssl
heartbleed attempt"; flow:to_client,established,only_stream; content:"|18 03 02|";
depth:3; byte_test:2,>,128,0,relative; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service ssl; reference:cve,2014-0160;
classtype:attempted-recon; sid:30516; rev:9;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1.2 large heartbeat response - possible ssl
heartbleed attempt"; flow:to_client,established,only_stream; content:"|18 03 03|";
depth:3; byte_test:2,>,128,0,relative; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service ssl; reference:cve,2014-0160;
classtype:attempted-recon; sid:30517; rev:9;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [21,25,443,465,636,992,993,995,2484]
(msg:"SERVER-OTHER OpenSSL SSLv3 heartbeat read overrun attempt - vulnerable client
response"; flow:to_server,established,only_stream; content:"|18 03 00|"; depth:3;
byte_test:2,>,128,3; detection_filter:track by_dst, count 2, seconds 5;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service ssl; reference:cve,2014-0160; classtype:attempted-recon; sid:30520; rev:8;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [21,25,443,465,636,992,993,995,2484]
(msg:"SERVER-OTHER OpenSSL TLSv1 heartbeat read overrun attempt - vulnerable client
response"; flow:to_server,established,only_stream; content:"|18 03 01|"; depth:3;
byte_test:2,>,128,3; detection_filter:track by_dst, count 2, seconds 5;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service ssl; reference:cve,2014-0160; classtype:attempted-recon; sid:30521; rev:8;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [21,25,443,465,636,992,993,995,2484]
(msg:"SERVER-OTHER OpenSSL TLSv1.1 heartbeat read overrun attempt - vulnerable
client response"; flow:to_server,established,only_stream; content:"|18 03 02|";
depth:3; byte_test:2,>,128,3; detection_filter:track by_dst, count 2, seconds 5;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service ssl; reference:cve,2014-0160; classtype:attempted-recon; sid:30522; rev:8;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [21,25,443,465,636,992,993,995,2484]
(msg:"SERVER-OTHER OpenSSL TLSv1.2 heartbeat read overrun attempt - vulnerable
client response"; flow:to_server,established,only_stream; content:"|18 03 03|";
depth:3; byte_test:2,>,128,3; detection_filter:track by_dst, count 2, seconds 5;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service ssl; reference:cve,2014-0160; classtype:attempted-recon; sid:30523; rev:8;)
alert tcp $EXTERNAL_NET any -> $HOME_NET [21,25,443,465,636,992,993,995,2484]
(msg:"SERVER-OTHER OpenSSL TLSv1.1 heartbeat read overrun attempt";
flow:to_server,established; dsize:8; content:"|18 03 02 00 03 01 40 00|"; depth:8;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service ssl; reference:cve,2014-0160; classtype:attempted-recon; sid:30524; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET [21,25,443,465,636,992,993,995,2484]
(msg:"SERVER-OTHER OpenSSL TLSv1.2 heartbeat read overrun attempt";
flow:to_server,established; dsize:69; content:"|18 03 03 00 40|"; depth:5;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service ssl; reference:cve,2014-0160; classtype:attempted-recon; sid:30525; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Ramdo variant outbound connection"; flow:to_server,established;
urilen:1; content:"POST"; http_method; content:".org|0D 0A|Content-Length|3A| 128|
0D 0A|Cache-Control|3A| no-cache|0D 0A 0D 0A|"; fast_pattern:only; http_header;
content:!"User-Agent|3A|"; http_header; content:!"Accept|3A|"; http_header;
pcre:"/^Host\x3a\s[a-z]{16}\.org\x0d/Hm"; metadata:impact_flag red, policy
security-ips drop, ruleset community, service http;
reference:url,blogs.technet.com/b/mmpc/archive/2014/04/08/msrt-april-2014-
ramdo.aspx; classtype:trojan-activity; sid:30547; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established; urilen:6;
content:"POST"; http_method; content:"/write"; http_uri; content:"Host: default|0D
0A|"; fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,blog.malwaremustdie.org/2014/03/a-post-to-sting-zeus-p2pgameover-
crooks.html;
reference:url,www.virustotal.com/en/file/7647eec6ae87c203085fe433f25c78f415baf31d01
ee8aa31241241712b46a0d/analysis/; classtype:trojan-activity; sid:30548; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 443 (msg:"SERVER-OTHER OpenSSL Heartbleed
masscan access exploitation attempt"; flow:to_server,established;
content:"[masscan/1.0]"; metadata:policy balanced-ips drop, policy connectivity-ips
drop, policy security-ips drop, ruleset community, service ssl; reference:cve,2014-
0160; classtype:attempted-recon; sid:30549; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Malicious
BitCoiner Miner download - Win.Trojan.Minerd"; flow:to_server,established;
urilen:>10; content:"/minerd.exe"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/583b585078f37f5d399a228f1b8021ca0a9e904a55
792281048bae9cfe0e95c1/analysis/; classtype:trojan-activity; sid:30551; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Malicious
BitCoiner Miner download - Win.Trojan.Systema"; flow:to_server,established;
urilen:20; content:"/aviatic/systema.exe"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/583b585078f37f5d399a228f1b8021ca0a9e904a55
792281048bae9cfe0e95c1/analysis/;
reference:url,www.virustotal.com/en/file/e8bd297b1f59b7ea11db7d90e81002469a8f054f79
638a57332ac448d819fb5d/analysis/; classtype:trojan-activity; sid:30552; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 10991 (msg:"MALWARE-CNC
Linux.Trojan.Elknot outbound connection"; flow:to_server,established; dsize:401;
content:"Linux|20|"; depth:6; offset:17; pcre:"/Linux\x20\d\.[0-9]{1,2}\.[0-9]
{1,2}/"; metadata:impact_flag red, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/13f13f4e214c2755235ba36643e4ab08d4ea679da0
08397b7a540e0d45e70ab2/analysis/; classtype:trojan-activity; sid:30566; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Agent E-FAX phishing attempt"; flow:to_client,established;
flowbits:isset,file.zip; file_data; content:"pdf_efax_"; fast_pattern:only;
content:"PK"; depth:2; content:".pif"; distance:0; nocase; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/4e102fd6fce767fa6c0d0a9871bb71ec5969ded694
a9292c2c8a9749e5648ed4/analysis/; classtype:trojan-activity; sid:30567; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER
Win.Trojan.Agent E-FAX phishing attempt"; flow:to_server,established;
content:"/cache/pdf_efax_"; fast_pattern:only; http_uri;
pcre:"/\/cache\/pdf\x5Fefax\x5F\d{8,15}\.zip$/Ui"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/4e102fd6fce767fa6c0d0a9871bb71ec5969ded694
a9292c2c8a9749e5648ed4/analysis/; classtype:trojan-activity; sid:30568; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Agent Funeral ceremony phishing attempt"; flow:to_client,established;
content:"filename=FuneralCeremony_"; fast_pattern:only; http_header;
content:".zip"; nocase; http_header; file_data; content:"FuneralCeremony_";
content:".exe"; distance:0; nocase; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/285ec7e2f8cbaed5d8cebde56bb6d44a921eb4e838
4981832822329d8ccfb125/analysis/1395241815/; classtype:trojan-activity; sid:30569;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Zeus
variant outbound connection"; flow:to_server,established; urilen:6; content:"/webhp
HTTP/1.1|0D 0A|Accept: */*|0D 0A|Connection: Close|0D 0A|User-Agent: Mozilla/4.0
("; fast_pattern:only; content:"|3B| MSIE "; http_header; content:"google.";
http_header; content:!"Accept-"; http_header; content:"PREF="; depth:5;
http_cookie; metadata:impact_flag red, ruleset community, service http;
reference:url,www.virustotal.com/en/file/2f2e20d92f7551fccae73bba64d25dd1f18a4018ff
fd30bdb1f9fb6280182bd0/analysis/1396537812/;
reference:url,www.virustotal.com/en/file/b268cba8515040055d866fb9e29d7fe2bc087f2057
11cdbad3e4b1bde7be2d75/analysis/
reference:url,www.virustotal.com/en/file/ef4e0ccc49decb41f213a20f61d92374c3b9749710
5d7c20e7284f65055d2ccb/analysis/; classtype:trojan-activity; sid:30570; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed
attempt"; flow:to_client,established; content:"|16 03 00|"; byte_jump:2,0,relative;
content:"|18 03 00|"; within:3; fast_pattern; byte_test:2,>,128,0,relative;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service ssl; reference:cve,2014-0160; classtype:attempted-recon; sid:30777; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed
attempt"; flow:to_client,established; content:"|17 03 00|"; byte_jump:2,0,relative;
content:"|18 03 00|"; within:3; fast_pattern; byte_test:2,>,128,0,relative;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service ssl; reference:cve,2014-0160; classtype:attempted-recon; sid:30778; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed
attempt"; flow:to_client,established; content:"|16 03 01|"; byte_jump:2,0,relative;
content:"|18 03 01|"; within:3; fast_pattern; byte_test:2,>,128,0,relative;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service ssl; reference:cve,2014-0160; classtype:attempted-recon; sid:30779; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed
attempt"; flow:to_client,established; content:"|17 03 01|"; byte_jump:2,0,relative;
content:"|18 03 01|"; within:3; fast_pattern; byte_test:2,>,128,0,relative;
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community,
service ssl; reference:cve,2014-0160; classtype:attempted-recon; sid:30780; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1.1 large heartbeat response - possible ssl
heartbleed attempt"; flow:to_client,established; content:"|16 03 02|";
byte_jump:2,0,relative; content:"|18 03 02|"; within:3; fast_pattern;
byte_test:2,>,128,0,relative; metadata:policy balanced-ips drop, policy security-
ips drop, ruleset community, service ssl; reference:cve,2014-0160;
classtype:attempted-recon; sid:30781; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1.1 large heartbeat response - possible ssl
heartbleed attempt"; flow:to_client,established; content:"|17 03 02|";
byte_jump:2,0,relative; content:"|18 03 02|"; within:3; fast_pattern;
byte_test:2,>,128,0,relative; metadata:policy balanced-ips drop, policy security-
ips drop, ruleset community, service ssl; reference:cve,2014-0160;
classtype:attempted-recon; sid:30782; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1.2 large heartbeat response - possible ssl
heartbleed attempt"; flow:to_client,established; content:"|16 03 03|";
byte_jump:2,0,relative; content:"|18 03 03|"; within:3; fast_pattern;
byte_test:2,>,128,0,relative; metadata:policy balanced-ips drop, policy security-
ips drop, ruleset community, service ssl; reference:cve,2014-0160;
classtype:attempted-recon; sid:30783; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1.2 large heartbeat response - possible ssl
heartbleed attempt"; flow:to_client,established; content:"|17 03 03|";
byte_jump:2,0,relative; content:"|18 03 03|"; within:3; fast_pattern;
byte_test:2,>,128,0,relative; metadata:policy balanced-ips drop, policy security-
ips drop, ruleset community, service ssl; reference:cve,2014-0160;
classtype:attempted-recon; sid:30784; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed
attempt"; flow:to_client,established; content:"|18 03 00|"; byte_jump:2,0,relative;
content:"|18 03 00|"; within:3; byte_test:2,>,128,0,relative; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service ssl;
reference:cve,2014-0160; classtype:attempted-recon; sid:30785; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed
attempt"; flow:to_client,established; content:"|18 03 01|"; byte_jump:2,0,relative;
content:"|18 03 01|"; within:3; byte_test:2,>,128,0,relative; metadata:policy
balanced-ips drop, policy security-ips drop, ruleset community, service ssl;
reference:cve,2014-0160; classtype:attempted-recon; sid:30786; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1.1 large heartbeat response - possible ssl
heartbleed attempt"; flow:to_client,established; content:"|18 03 02|";
byte_jump:2,0,relative; content:"|18 03 02|"; within:3;
byte_test:2,>,128,0,relative; metadata:policy balanced-ips drop, policy security-
ips drop, ruleset community, service ssl; reference:cve,2014-0160;
classtype:attempted-recon; sid:30787; rev:3;)
alert tcp $HOME_NET [21,25,443,465,636,992,993,995,2484] -> $EXTERNAL_NET any
(msg:"SERVER-OTHER OpenSSL TLSv1.2 large heartbeat response - possible ssl
heartbleed attempt"; flow:to_client,established; content:"|18 03 03|";
byte_jump:2,0,relative; content:"|18 03 03|"; within:3;
byte_test:2,>,128,0,relative; metadata:policy balanced-ips drop, policy security-
ips drop, ruleset community, service ssl; reference:cve,2014-0160;
classtype:attempted-recon; sid:30788; rev:3;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OTHER RARLAB
WinRAR ZIP format filename spoof attempt"; flow:to_client,established;
flowbits:isset,file.zip; file_data; content:"|50 4B 03 04|"; depth:4; content:"|00
00|"; within:2; distance:24; content:".exe"; within:64;
flowbits:set,file.zip.winrar.spoof; flowbits:noalert; metadata:policy max-detect-
ips alert, ruleset community, service ftp-data, service http, service imap, service
pop3; reference:bugtraq,66383; reference:url,an7isec.blogspot.co.il/2014/03/winrar-
file-extension-spoofing-0day.html; classtype:attempted-user; sid:30906; rev:3;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OTHER RARLAB WinRAR ZIP
format filename spoof attempt"; flow:to_server,established;
flowbits:isset,file.zip; file_data; content:"|50 4B 03 04|"; depth:4; content:"|00
00|"; within:2; distance:24; content:".exe"; within:64;
flowbits:set,file.zip.winrar.spoof; flowbits:noalert; metadata:policy max-detect-
ips alert, ruleset community, service smtp; reference:bugtraq,66383;
reference:url,an7isec.blogspot.co.il/2014/03/winrar-file-extension-spoofing-
0day.html; classtype:attempted-user; sid:30909; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.SpySmall variant outbound connection"; flow:to_server,established;
content:"User-Agent: Mozilla/4.0 (compatible|3B| MSIE 10.0|3B| Windows NT 6.2|3B|
Trident/4.0|0D 0A|"; fast_pattern:only; http_header; content:!"Accept";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/df51eccf430ac391d09817d003977b4ea6af36117c
e3aaee2fa0ebf04505c0d2/analysis/; classtype:trojan-activity; sid:30914; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.SpySmall variant outbound connection"; flow:to_server,established;
content:"|3E 00|e|00|c|00|h|00|o|00 20 00|c|00|m|00|d|00 5F 00|b|00|e|00|g|00|i|00|
n|00|"; fast_pattern:only; http_client_body; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/df51eccf430ac391d09817d003977b4ea6af36117c
e3aaee2fa0ebf04505c0d2/analysis/; classtype:trojan-activity; sid:30915; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user agent - User-Agent User-Agent Mozilla";
flow:to_server,established; content:"User-Agent: User-Agent: Mozilla/";
fast_pattern:only; http_header; content:!"Accept"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/file/D67B6706559C5F7AB97CC788E668E27A29B7D2D39C9AC
A93AF73778E53993339/analysis/; classtype:trojan-activity; sid:30918; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/js/prototype/order.php"; fast_pattern:only;
http_uri; content:" HTTP/1.1|0D 0A|Content-Type: application/x-www-form-urlencoded|
0D 0A|User-Agent: Mozilla/"; content:"|3B 20|MSIE|20|"; distance:0; http_header;
content:"|29 0D 0A|Host:"; distance:0; http_header; content:!"Accept"; http_header;
content:!"|0D 0A|Referer:"; http_header; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/51540d7c9a4bc2a430bc50c85cf9cec5c6f2bb755e
800a3f3575ba34fe5f008c/analysis; classtype:trojan-activity; sid:30919; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Multiple
exploit kit redirection gate"; flow:to_server,established; urilen:72;
content:"POST"; http_method; content:".php?q="; fast_pattern:only; http_uri;
pcre:"/^\/[a-f0-9]{32}\.php\?q=[a-f0-9]{32}$/U"; metadata:policy balanced-ips drop,
policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:30920; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR
Win.Backdoor.Hikit outbound banner response"; flow:to_client,established;
content:"|5D 00 20 00|h|00|i|00|k|00|i|00|t|00|>|00|"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http, service ssl;
reference:url,www.virustotal.com/en/file/aa4b2b448a5e246888304be51ef9a65a11a53bab78
99bc1b56e4fc20e1b1fd9f/analysis/; classtype:trojan-activity; sid:30948; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT CritX
exploit kit payload request"; flow:to_server,established; content:"/load";
http_uri; content:".php"; distance:0; http_uri; pcre:"/\/load(?:(?:db|rh|silver|
msie|flash|fla[0-9]{4,5}))\.php/U"; flowbits:set,file.exploit_kit.pe;
metadata:policy balanced-ips drop, policy max-detect-ips alert, policy security-ips
drop, ruleset community, service http; reference:url,malware-traffic-
analysis.net/2014/05/29/index.html; classtype:trojan-activity; sid:30973; rev:6;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
Potential malware download - .doc.exe within .zip file";
flow:to_client,established; flowbits:isset,file.zip; file_data; content:".doc.exe";
fast_pattern:only; content:"Content-Length:"; http_header; metadata:policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:30997; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
Potential malware download - .gif.exe within .zip file";
flow:to_client,established; flowbits:isset,file.zip; file_data; content:".gif.exe";
fast_pattern:only; content:"Content-Length:"; http_header; metadata:policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:30998; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
Potential malware download - .jpeg.exe within .zip file";
flow:to_client,established; flowbits:isset,file.zip; file_data;
content:".jpeg.exe"; fast_pattern:only; content:"Content-Length:"; http_header;
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; classtype:trojan-activity; sid:30999; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
Potential malware download - .jpg.exe within .zip file";
flow:to_client,established; flowbits:isset,file.zip; file_data; content:".jpg.exe";
fast_pattern:only; content:"Content-Length:"; http_header; metadata:policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:31000; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
Potential malware download - .pdf.exe within .zip file";
flow:to_client,established; flowbits:isset,file.zip; file_data; content:".pdf.exe";
fast_pattern:only; content:"Content-Length:"; http_header; metadata:policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:31001; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/hunter/123/order.php"; fast_pattern:only;
http_uri; content:!"Accept"; http_header; content:!"|0D 0A|Referer:"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/51540d7c9a4bc2a430bc50c85cf9cec5c6f2bb755e
800a3f3575ba34fe5f008c/analysis; classtype:trojan-activity; sid:31020; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.SpyBanker variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:".php HTTP/1.0|0D 0A|Connection: keep-alive|0D
0A|Content-Type: application/x-www-form-urlencoded|0D 0A|Content-Length: 0|0D 0A|
Host: "; content:"|0D 0A|Accept: text/html,application/xhtml+xml,application/xml|
3B|q=0.9,*/*|3B|q=0.8|0D 0A|Accept-Encoding: identity|0D 0A|User-Agent: Mozilla/3.0
(compatible|3B| Indy Library)|0D 0A 0D 0A|"; distance:0; metadata:impact_flag red,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/726644e5f666b133159e6c2591cdd3bc628bcd335b
381b74fcfd2e4db73689af/analysis/;
reference:url,www.virustotal.com/en/file/af56f8f97c8872d043a4002daa6331f3b3be296427
b0e5d0560fd174e9f59e78/analysis/; classtype:trojan-activity; sid:31036; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.MadnessPro outbound connection"; flow:to_server,established;
content:"/?"; http_uri; content:"uid="; http_uri; content:"&mk="; fast_pattern;
http_uri; content:"&os="; http_uri; content:"&rs="; http_uri; content:"&c=";
http_uri; content:"&rq="; http_uri; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,blog.cylance.com/a-study-in-bots-madness-pro; classtype:trojan-
activity; sid:31053; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Rootkit.Necurs outbound connection"; flow:to_server,established;
content:"POST"; http_method; urilen:15; content:"/docs/index.php";
fast_pattern:only; http_uri; content:"Content-Type|3A 20|application/octet-stream";
http_header; content:!"User-Agent|3A 20|"; http_header; content:!"Accept|3A 20|";
http_header; content:!"Referer|3A 20|"; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/b47a1bdf5e53f4a754413d2461f7db9a4c7d1e0845
c1f676b5399061e3dc1a4b/analysis/; classtype:trojan-activity; sid:31070; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zbot variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; urilen:11; content:"/srt/ge.php"; fast_pattern:only;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/750d533898f19c606ee9e96ff72c1aa3d830c469f2
f564890ebbc38b169eb41b/analysis/1400275398/; classtype:trojan-activity; sid:31084;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user agent - User-Agent hello crazyk"; flow:to_server,established;
content:"User-Agent: hello crazyk|0D 0A|"; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/file/e61acf1cf61938eaa9cfa40e9dcd357f271c17c20218b
a895c1f4a/analysis/; classtype:trojan-activity; sid:31090; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos password stealing attempt"; flow:to_server,established;
content:"rotina=plogin&login="; fast_pattern:only; http_client_body;
content:"&senha="; http_client_body; content:"&casa="; distance:0;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/61cbe9b94bca25503c884bb0c9363b95fac6203534
e5b23c5887dde91fbd4951/analysis/1384873658; classtype:trojan-activity; sid:31112;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:")&dt="; fast_pattern:only; http_client_body; content:"pc="; depth:3;
http_client_body; content:"&av="; distance:0; http_client_body; content:"&wd=";
distance:0; http_client_body; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/61cbe9b94bca25503c884bb0c9363b95fac6203534
e5b23c5887dde91fbd4951/analysis/1384873658; classtype:trojan-activity; sid:31113;
rev:2;)
alert udp $EXTERNAL_NET any -> $HOME_NET [16464,16465,16470,16471] (msg:"MALWARE-
CNC Win.Trojan.ZeroAccess inbound connection"; flow:to_server; dsize:16; content:"|
28 94 8D AB|"; depth:4; offset:4; metadata:impact_flag red, policy balanced-ips
drop, policy connectivity-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/file/50cdd9f6c5629630c8d8a3a4fe7d929d3c6463b2f9407
d9a90703047e7db7ff9/analysis/; classtype:trojan-activity; sid:31136; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banker variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/notify.php HTTP/1.0|0D 0A|";
fast_pattern:only; content:"User-Agent: Mozilla/3.0 (compatible|3B| Indy Library)|
0D 0A|"; http_header; content:"Content-Length: 0|0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/bf40d710dda1a3ada127d68b34b837eca03a28699c
d858cda7d4a3e36690628a/analysis/; classtype:trojan-activity; sid:31221; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banker variant outbound connection"; flow:to_server,established;
urilen:17; content:"/second/game1.inf"; fast_pattern:only; http_uri; content:"|3B
20|MSIE|20|"; http_header; content:!"Accept-Language:"; http_header;
content:!"Referer:"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/bf40d710dda1a3ada127d68b34b837eca03a28699c
d858cda7d4a3e36690628a/analysis/; classtype:trojan-activity; sid:31222; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Necurs variant outbound connection"; flow:to_server,established;
urilen:15; content:"/news/index.php HTTP/1.1|0D 0A|Content-Type: application/octet-
stream|0D 0A|Host: "; fast_pattern:only; content:!"User-Agent:"; http_header;
content:!"Referer:"; http_header; content:!"Accept"; http_header;
metadata:impact_flag red, ruleset community, service http;
reference:url,www.virustotal.com/en/file/565496cb40fc868d233dabfb1e178e8b9042d964cb
1e4f5f3386a6db4f1cf30e/analysis/1400509611/; classtype:trojan-activity; sid:31243;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET [$HTTP_PORTS,443] (msg:"MALWARE-CNC
Win.Trojan.Kuluoz outbound connection"; flow:to_server,established; urilen:43;
content:"POST /"; depth:6; content:" HTTP/1.1"; within:9; distance:42;
content:"Firefox/"; distance:0; content:!"|0D 0A|Accept-"; pcre:"/^POST\x20\x2f[A-
F\d]{42}\x20HTTP/"; metadata:impact_flag red, policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/en/file/93a40a83977ca24df6e12d7d6f19a9b9d92cb3ea31
74ea9d4398ad2048205c42/analysis/; classtype:trojan-activity; sid:31244; rev:4;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Andromeda HTTP proxy response attempt"; flow:to_client,established;
file_data; content:"function FindProxyForURL(url, host)"; depth:35; content:"yx0=0|
3B|yx1=1|3B|yx2=2|3B|yx3=3|3B|yx4=4|3B|yx5=5|3B|yx6=6|3B|yx7=7|3B|yx8=8|3B|yx9=9|
3B|lit=|22 22|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.exposedbotnets.com/2013/06/localmworg-andromeda-http-botnet-
hosted.html; classtype:trojan-activity; sid:31260; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi outbound connection"; flow:to_server,established; content:".inf
HTTP/1.1|0D 0A|Accept: */*|0D 0A|Accept-Encoding: gzip, deflate|0D 0A|User-Agent:
Mozilla/"; fast_pattern:only; content:"|3B 20|MSIE|20|"; http_header;
pcre:"/\)\r\nHost\x3a\x20[\d\x2e]
{7,15}\r\nConnection\x3a\x20Keep\x2dAlive\r\n\r\n$/"; metadata:impact_flag red,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/c77a679df3b74c622e39ab163fc876cc9d7719f2c2
e8cf80beb36c813827d0c7/analysis/; classtype:trojan-activity; sid:31261; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Worm.VBNA variant outbound connection"; flow:to_server,established;
content:"/0.gif?"; depth:7; http_uri; content:" HTTP/1.1|0D 0A|Host:
sstatic1.histats.com|0D 0A 0D 0A|"; fast_pattern:only; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,malwr.com/analysis/NWI5M2QwY2QxZWIwNDU4NDliYjU5NWJmMzc0MzQ2MDE/;
reference:url,www.virustotal.com/en/file/0a777870b65d3dc80b56baf77f6d9e342d25a1c7d6
70077eca14a0f4309f9e26/analysis/;
reference:url,www.virustotal.com/en/file/b5a01ce5e2b074f40d86ecca802658a5c998b5bf45
2f164b1a76f8fa27f53b15/analysis/; classtype:trojan-activity; sid:31262; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Dyre publickey outbound connection"; flow:to_server,established;
content:"/publickey/ HTTP/1.1|0D 0A|User-Agent: Wget/1.9|0D 0A|Host: ";
fast_pattern:only; metadata:impact_flag red, policy security-ips drop, ruleset
community, service http; reference:url,phishme.com/project-dyre-new-rat-slurps-
bank-credentials-bypasses-ssl;
reference:url,www.virustotal.com/en/file/417c9cd7c8abbd7bbddfc313c9f153758fd11bda47
f754b9c59bc308d808c486/analysis/; classtype:trojan-activity; sid:31293; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zusy variant outbound connection"; flow:to_server,established;
content:"/workers.php?mac="; fast_pattern:only; http_uri; content:"&gpu=";
http_uri; content:!"|0D 0A|User-Agent:"; http_header; content:!"|0D 0A|Accept";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0f3243a4645ab4acb88e1e0ee4fa0cb254a88709ce
00a193ad6e20faec3243dc/analysis/; classtype:trojan-activity; sid:31295; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.MSIL variant outbound connection"; flow:to_server,established;
content:"/srv2.php?param=1 HTTP/1.1|0D 0A|Host: "; fast_pattern:only;
content:"Connection: Keep-Alive|0D 0A 0D 0A|"; content:!"User-Agent:"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,malwr.com/analysis/ZDI5NTViMGI2MzZiNDU0MTlhMzNlZDhiZGUwNjFmOGY/;
classtype:trojan-activity; sid:31315; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-APACHE
Apache Chunked-Encoding worm attempt"; flow:to_server,established;
content:"Transfer-Encoding: Chunked"; fast_pattern; nocase; content:"|0D 0A|";
distance:0 ; byte_test:8,>,2147483647,0,string,hex,relative; content:"|20|";
within:9; metadata:ruleset community, service http; reference:bugtraq,4474;
reference:bugtraq,4485; reference:bugtraq,5033; reference:cve,2002-0071;
reference:cve,2002-0079; reference:cve,2002-0392; reference:nessus,10932;
classtype:web-application-attack; sid:31405; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Injector variant outbound connection"; flow:to_server,established;
urilen:4; content:"/re/"; fast_pattern:only; http_uri; content:"User-Agent:
Mozilla/5.0 (compatible|3B| MSIE 9.0|3B| Windows NT 6.1|3B| Trident/5.0)|0D 0A|
Content-Type: application/x-www-form-urlencoded|0D 0A|Host: "; content:"|0D 0A|
Connection: Close|0D 0A|Cache-Control: no-cache|0D 0A 0D 0A|"; distance:0;
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/56939273f68158dacc58d4e8d5bb5b0c4c04be89e2
79651c8f19fa6392f3d837/analysis/;
reference:url,www.virustotal.com/en/file/ad40cabf66001087c2e9f548811b17341f63f19f52
8a3c04a1c9ab9f10b5eff9/analysis/; classtype:trojan-activity; sid:31442; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.CryptoWall downloader attempt"; flow:to_server,established; urilen:<20;
content:"User-Agent|3A 20|macrotest|0D 0A|"; fast_pattern:only; http_header;
pcre:"/\x2f(css|upload)\x2f[a-z]{2}[0-9]{3}\x2eccs/U"; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/e370c1fc6e7e289523fdf2f090edb7885f8d0de1b9
9be0164dafffeca9914b10/analysis/; classtype:trojan-activity; sid:31449; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.CryptoWall outbound connection"; flow:to_server,established;
content:"POST"; http_method; urilen:<17; content:"HTTP/1.1|0D 0A|Accept: */*|0D 0A|
Content-Type: application/x-www-form-urlencoded|0D 0A|Connection: Close|0D 0A|
Content-Length: 100|0D 0A|User-Agent: "; fast_pattern:only; content:"="; depth:1;
offset:1; http_client_body; pcre:"/[a-z]=[a-f0-9]{98}/P"; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/a92ae8e80b0b70288a32c0455856453c5980021156
132a540035e7ef5e0fa79e/analysis/; classtype:trojan-activity; sid:31450; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi variant outbound connection"; flow:to_server,established;
content:".php?chave=xchave&url|3D 20 3D 7C 3D 20|"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/08e670fd1f7141f219f0bb7f48c179485146e43984
7a68cdf52b85328b66dd22/analysis/; classtype:trojan-activity; sid:31452; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ChoHeap variant outbound connection"; flow:to_server,established;
content:" HTTP/1.1|0D 0A|User-Agent: Mozilla/5.0|0D 0A|"; content:"Service Pack ";
fast_pattern:only; http_uri; content:"Cache-Control: no-cache|0D 0A 0D 0A|";
http_header; metadata:impact_flag red, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/0423e10a674fb7e96557eac50b51207709a248df6e
06aeeba401ded6157c1298/analysis/; classtype:trojan-activity; sid:31453; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ChoHeap variant outbound connection"; flow:to_server,established;
content:".rar HTTP/1.1|0D 0A|Accept: text/*, application/*|0D 0A|User-Agent:
Mozilla/5.0|0D 0A|Host: "; fast_pattern:only; content:"|0D 0A|Cache-Control: no-
cache|0D 0A 0D 0A|"; http_header; metadata:impact_flag red, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/0423e10a674fb7e96557eac50b51207709a248df6e
06aeeba401ded6157c1298/analysis/; classtype:trojan-activity; sid:31454; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Rig
Exploit Kit Outbound DGA Request"; flow:established,to_server; urilen:25<>32;
content:".html?0."; depth:11; offset:2; http_uri; pcre:"/\/[a-z]
{1,4}\x2ehtml\x3f0\x2e[0-9]{15,}$/U"; metadata:ruleset community, service http;
reference:url,www.symantec.com/connect/blogs/rig-exploit-kit-used-recent-website-
compromise; classtype:trojan-activity; sid:31455; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.SDBot variant outbound connection"; flow:to_server,established;
urilen:8; content:"/install"; http_uri; content:"argc="; depth:5; http_client_body;
content:"&name="; distance:0; http_client_body; content:"&previous=";
fast_pattern:only; http_client_body; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/5682e096bad2d2e75fb09122af272572b23ca5defb
70325ab7cdc4c534a68e7d/analysis; classtype:trojan-activity; sid:31458; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Androm Click Fraud Request"; flow:to_server,established;
content:"/query?version="; fast_pattern:only; http_uri; content:"&sid="; http_uri;
content:"&builddate="; distance:0; http_uri; content:"&q="; distance:0; http_uri;
content:"&ref="; distance:0; http_uri; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,malwr.com/analysis/ZmE3ZWU2YTkyM2U0NGQ0MmI1NDcxMjUwZDE2NTM5MjQ/;
classtype:trojan-activity; sid:31465; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Androm Click Fraud Request"; flow:to_server,established; content:"|0D
0A|builddate:"; fast_pattern:only; http_header; content:"|0D 0A|aid: ";
http_header; content:"|0D 0A|redirect: http://"; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,malwr.com/analysis/ZmE3ZWU2YTkyM2U0NGQ0MmI1NDcxMjUwZDE2NTM5MjQ/;
classtype:trojan-activity; sid:31466; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Androm variant outbound connection"; flow:to_server,established;
urilen:9; content:"/gate.php"; fast_pattern:only; http_uri; content:"User-Agent:
Mozilla/4.0|0D 0A|"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,malwr.com/analysis/ZmE3ZWU2YTkyM2U0NGQ0MmI1NDcxMjUwZDE2NTM5MjQ/;
classtype:trojan-activity; sid:31467; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Papras variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/viewforum.php?f="; fast_pattern:only;
http_uri; content:"&sid="; http_uri; content:!"Referer:"; http_header;
content:!"Cookie:"; http_header; pcre:"/sid=[0-9A-F]{32}/U"; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/9e548d9a37c46423680e324b31204197babc45ddc0
5835afa772fde8627e72b2/analysis/; classtype:trojan-activity; sid:31468; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 25 (msg:"MALWARE-CNC Win.Trojan.HW32
variant spam attempt"; flow:to_server, established; content:"MAIL FROM:
<Reademal.com>|0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service smtp;
reference:url,www.virustotal.com/en/file/e69b310dff09830641d4b9682375ce3df503674d23
c429bd7847979ea9250b2b/analysis/; classtype:trojan-activity; sid:31507; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi variant outbound connection"; flow:to_server,established;
content:"/index.php?email=libpurple_XMPP"; fast_pattern:only; http_uri;
content:"&method=post"; http_uri; content:" HTTP/1.0|0D 0A|Accept: */*|0D 0A|
Connection: close|0D 0A|Host: "; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/b2b7571ffc6ee27fc716f308d72a3268ffa5f32330
ca6349aacc92e6cecb2582/analysis/1406043461/; classtype:trojan-activity; sid:31530;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
MinerDeploy monitor request attempt"; flow:to_server,established;
content:"/monitor.php?"; fast_pattern; http_uri; content:"myid="; distance:0;
http_uri; content:"&ip="; distance:0; http_uri; content:"&cgminer="; distance:0;
http_uri; content:"&operatingsystem="; distance:0; http_uri; content:!"Content-
Length|3A 20|"; http_header; content:!"Content-Type|3A 20|"; http_header;
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/06033b08afd30b413cce3b9a169cb8396fe34865f3
bacd436c652dbb469ced62/analysis/; classtype:trojan-activity; sid:31531; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.SMSSend outbound connection"; flow:to_server,established;
content:"sms"; http_uri; content:".ashx?t="; fast_pattern:only; http_uri;
content:!"User-Agent|3A 20|"; http_header; content:!"Accept|3A 20|"; http_header;
content:!"Content-Type|3A 20|"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/en/file/a70a62ac920e83bab5e3e38ac8853ca3f45b6022f4
d4ca47c9ae5cb9049700bb/analysis/1406724303/; classtype:trojan-activity; sid:31593;
rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Glupteba
C&C server HELLO request to client"; flow:to_client,established; dsize:6;
content:"HELLO|0A|"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/0bcc2bf3cf06952e18c3e1d9860698dbb3ff1644a0
389a9756c1b82b66fb2b83/analysis/; classtype:trojan-activity; sid:31603; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Glupteba
C&C server READD command to client"; flow:to_client,established; dsize:6;
content:"READD|0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/0bcc2bf3cf06952e18c3e1d9860698dbb3ff1644a0
389a9756c1b82b66fb2b83/analysis/; classtype:trojan-activity; sid:31604; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Glupteba
C&C server READY command to client"; flow:to_client,established; dsize:6;
content:"READY|0A|"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/0bcc2bf3cf06952e18c3e1d9860698dbb3ff1644a0
389a9756c1b82b66fb2b83/analysis/; classtype:trojan-activity; sid:31605; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Glupteba payload download request"; flow:to_server,established;
content:"/software.php?"; fast_pattern:only; http_uri; content:"Accept|3A| */*";
http_header; content:"User-Agent|3A| Mozilla/4.0 |28|compatible|3B| MSIE 7.0|3B|
Windows NT 6.1|3B|"; http_header; pcre:"/\/software\x2ephp\x3f[0-9]{15,}/Ui";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/0bcc2bf3cf06952e18c3e1d9860698dbb3ff1644a0
389a9756c1b82b66fb2b83/analysis/; classtype:trojan-activity; sid:31606; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Glupteba
client response/authenticate to C&C server"; flow:to_server,established;
dsize:15<>18; content:"|3A|bpass|0A|"; fast_pattern:only; pcre:"/[0-9A-Z]
{8}\x3abpass\x0a/"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/0bcc2bf3cf06952e18c3e1d9860698dbb3ff1644a0
389a9756c1b82b66fb2b83/analysis/; classtype:trojan-activity; sid:31607; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Tinybanker variant outbound connection"; flow:to_server,established;
content:"User-Agent: Mozilla/5.0 (compatible|3B| MSIE 9.0|3B| Windows NT 6.1|3B|
Trident/5.0)|0D 0A|Content-Type: application/x-www-form-urlencoded|0D 0A|Host: ";
fast_pattern:only; http_header; content:"|0D 0A|Content-Length: 13|0D 0A|
Connection: Close|0D 0A|Cache-Control: no-cache|0D 0A 0D 0A|"; http_header; pcre:"/
[^\x20-\x7e\r\n]{3}/P"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,blog.avast.com/2014/07/17/tinybanker-trojan-targets-banking-
customers/;
reference:url,www.virustotal.com/en/file/b88b978d00b9b3a011263f398fa6a21098aba714db
14f7e71062ea4a6b2e974e/analysis/; classtype:trojan-activity; sid:31641; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Tinybanker variant outbound connection"; flow:to_server,established; urilen:4;
content:"/de/"; fast_pattern:only; http_uri; content:"User-Agent: Mozilla/5.0
(compatible|3B| MSIE 9.0|3B| Windows NT 6.1|3B| Trident/5.0)|0D 0A|Content-Type:
application/x-www-form-urlencoded|0D 0A|Host: "; http_header; content:"Content-
Length: 13|0D 0A|Connection: Close|0D 0A|Cache-Control: no-cache|0D 0A 0D 0A|";
distance:0; http_header; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,blog.avast.com/2014/07/17/tinybanker-trojan-targets-banking-
customers/;
reference:url,www.virustotal.com/en/file/b88b978d00b9b3a011263f398fa6a21098aba714db
14f7e71062ea4a6b2e974e/analysis/; classtype:trojan-activity; sid:31642; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.Scarelocker outbound connection"; flow:to_server,established;
content:"/api.php"; fast_pattern:only; http_uri; content:"User-Agent|3A 20|Apache-
HttpClient|2F|UNAVAILABLE"; http_header; content:"method="; http_client_body;
content:"&app_key="; http_client_body; metadata:impact_flag red, policy balanced-
ips drop, policy connectivity-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,malware.dontneedcoffee.com/2014/08/scarepackageknstant.html;
reference:url,www.virustotal.com/en/file/ebed6a20738f68787e19eaafc725bc8c76fba6b104
e468ddcfb05a4d88a11811/analysis/; classtype:trojan-activity; sid:31644; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
urilen:16; content:"/boydn/boye.html"; fast_pattern:only; http_uri; content:"User-
Agent|3A 20|Mozilla/3.0 (compatible|3B| Indy Library)"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/61cbe9b94bca25503c884bb0c9363b95fac6203534
e5b23c5887dde91fbd4951/analysis/1384873658/; classtype:trojan-activity; sid:31649;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Tirabot variant outbound connection"; flow:to_server,established;
content:"&string="; fast_pattern:only; http_client_body; content:"key="; depth:4;
http_client_body; content:"Content-Type: application/x-www-Form-urlencoded|0D 0A|";
http_header; content:".php"; http_uri; pcre:"/User\x2dAgent\x3a\x20([\x20-\x7e]
{3,56})\r\n.*?\r\n\r\nkey\x3d\1\x26string\x3d/ms"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/7ea920d297e23cf58e9f00fa3d48e02994253cb4a6
73bdd6db9a02fa5ab9ffb8/analysis/1407432311/; classtype:trojan-activity; sid:31680;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Badur download attempt"; flow:to_server,established; urilen:12;
content:"/support.exe"; fast_pattern:only; http_uri; content:".exe HTTP/1.1|0D 0A|
Accept: */*|0D 0A|Accept-Encoding: gzip,deflate,sdch|0D 0A|Host: "; content:")
Chrome/"; distance:0; http_header; content:!"Accept-Language:"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/adf5d662af390ad3a187a1991e0b463327fb8360fd
55a27e6f9961c8a84a47c5/analysis/; classtype:trojan-activity; sid:31681; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Badur download attempt"; flow:to_server,established; urilen:9;
content:"/tmps.exe"; fast_pattern:only; http_uri; content:"Proxy-Authorization:
Basic |0D 0A|"; http_header; content:"__cfduid="; depth:9; http_cookie; content:")
Chrome/"; http_header; content:!"Accept-"; http_header; metadata:impact_flag red,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/840b3b76030696b1ce9eccd5ee6d55dd79c0120871
094cb9266769c09f03029c/analysis/; classtype:trojan-activity; sid:31682; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Badur variant outbound connection"; flow:to_server,established;
content:"/get/?data="; depth:11; http_uri; content:"User-Agent: win32|0D 0A|";
fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/840b3b76030696b1ce9eccd5ee6d55dd79c0120871
094cb9266769c09f03029c/analysis/; classtype:trojan-activity; sid:31683; rev:1;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IMAGE Microsoft
Multiple Products JPEG parser heap overflow attempt"; flow:to_server,established;
flowbits:isset,file.jpeg; file_data; content:"|00 10|JFIF"; depth:6; offset:4;
pcre:"/^.{0,100}\xFF[\xE1\xE2\xED\xFE]\x00[\x00\x01]/s"; metadata:ruleset
community, service smtp; reference:bugtraq,11173; reference:cve,2004-0200;
reference:url,www.microsoft.com/security/bulletins/200409_jpeg.mspx;
classtype:attempted-user; sid:31719; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Banker.Delf variant outbound connection"; flow:to_server,established;
urilen:11; content:"POST"; http_method; content:"/notify.php"; http_uri;
content:"Content-Length: 0|0D 0A|"; http_header; content:" HTTP/1.0|0D 0A|";
content:"Content-Type: application/x-www-form-urlencoded|0D 0A|"; http_header;
content:"User-Agent|3A 20|Mozilla/4.0 (compatible|3B| MyApp)|0D 0A 0D 0A|";
fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/dce2799df1da1ad992d37c78ea586dfd0cf673642e
cc56ac464fe7a81a6994ca/analysis/; classtype:trojan-activity; sid:31820; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Graftor variant outbound connection"; flow:to_server,established;
content:"dados="; depth:6; http_client_body; content:"&ct="; distance:0;
http_client_body; content:"/"; within:1; distance:2; http_client_body;
content:"/201"; within:4; distance:2; http_client_body; content:"="; within:1;
distance:1; http_client_body; content:"&windows="; fast_pattern:only;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/53ac9c629cf0cc468cfaf77fe4b54f1da7576e0c03
27650915b79f9340fa84ff/analysis/; classtype:trojan-activity; sid:31824; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Delf variant HTTP Response"; flow:to_client,established;
content:"Content-Length: 201|0D 0A|"; file_data; content:"<meta name=|22|token|22|
content=|22 A4|"; depth:29; content:"|A4 22|/>"; within:4; distance:168;
pcre:"/^\x3cmeta\x20name\x3d\x22token\x22\x20content\x3d\x22\xa4[A-F\d]
{168}\xa4\x22\x2f\x3e$/"; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/59e721000aa38a91ed42799e955f9337482c627e06
75520aa54dcad068e6e004/analysis/1409846457/; classtype:trojan-activity; sid:31826;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Delf variant outbound connection"; flow:to_server,established;
content:"/token/token.html HTTP/1.1|0D 0A|User-Agent: "; fast_pattern:only;
content:!"Accept"; http_header; content:!"Referer:"; http_header;
pcre:"/\)\r\nHost\x3a\x20[a-z\d\x2e\x2d]
{6,32}\r\nCache\x2dControl\x3a\x20no\x2dcache\r\n\r\n$/"; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/59e721000aa38a91ed42799e955f9337482c627e06
75520aa54dcad068e6e004/analysis/1409846457/; classtype:trojan-activity; sid:31827;
rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $FTP_PORTS (msg:"POLICY-OTHER QLogic
Switch 5600/5800 default ftp login attempt"; flow:to_server,established;
content:"PASS|20|images|0D 0A|"; flowbits:isset,qlogic_default_ftp; metadata:policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service ftp;
reference:url,filedownloads.qlogic.com/files/Manual/81355/UserGuide_5800V_Series_Qu
ickTools_v80_59264-02B.pdf;
reference:url,filedownloads.qlogic.com/files/manual/67941/QuickTools_Guide_Sb5600_S
eries_v74_59235-03_%5BA%5D.pdf; classtype:default-login-attempt; sid:31830; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $FTP_PORTS (msg:"POLICY-OTHER QLogic
Switch 5600/5800 default ftp login attempt"; flow:to_server,established;
content:"USER|20|images|0D 0A|"; flowbits:set,qlogic_default_ftp; flowbits:noalert;
metadata:ruleset community, service ftp;
reference:url,filedownloads.qlogic.com/files/Manual/81355/UserGuide_5800V_Series_Qu
ickTools_v80_59264-02B.pdf;
reference:url,filedownloads.qlogic.com/files/manual/67941/QuickTools_Guide_Sb5600_S
eries_v74_59235-03_%5BA%5D.pdf; classtype:default-login-attempt; sid:31831; rev:4;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY JPEG file magic
detection"; flow:to_server,established; file_data; content:"|FF D8 FF|"; depth:3;
flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community, service smtp;
classtype:misc-activity; sid:31871; rev:8;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"/trdpr/trde.html"; fast_pattern:only; http_uri; content:"Accept:
text/html, */*|0D 0A|User-Agent: Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A 0D
0A|"; http_header; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/61cbe9b94bca25503c884bb0c9363b95fac6203534
e5b23c5887dde91fbd4951/analysis/1384873658/; classtype:trojan-activity; sid:31916;
rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Symmi variant HTTP response attempt"; flow:to_client,established;
file_data; content:"%set_intercepts%"; fast_pattern:only; content:"%ban_contact%";
content:"%ebaylive%"; content:"%dep_host%"; content:"%relay_soxid%";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/4c0549384574ae91b68d58d92da3deacfcf714b27f
b8d762ce9de8c58990ffb1/analysis/; classtype:trojan-activity; sid:31923; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi variant outbound connection"; flow:to_server,established;
content:".php?method="; http_uri; content:"&mode=sox&v="; fast_pattern:only;
http_uri; content:" HTTP/1.0|0D 0A|Accept: */*|0D 0A|Connection: close|0D 0A|Host:
"; content:!"User-Agent:"; http_header; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/4c0549384574ae91b68d58d92da3deacfcf714b27f
b8d762ce9de8c58990ffb1/analysis/; classtype:trojan-activity; sid:31924; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banker variant outbound connection"; flow:to_server,established;
content:"/notify.php"; fast_pattern:only; http_uri; content:"Accept: text/html,
*/*|0D 0A|Accept-Encoding: identity|0D 0A|User-Agent: "; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/bf40d710dda1a3ada127d68b34b837eca03a28699c
d858cda7d4a3e36690628a/analysis/; classtype:trojan-activity; sid:31964; rev:1;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT Astrum
exploit kit landing page"; flow:to_client,established; file_data; content:"{(new
Image).src=|22|/"; content:"%72%6f%72%72%65%6e%6f"; distance:0; fast_pattern;
flowbits:set,file.exploit_kit.jar&file.exploit_kit.pdf&file.exploit_kit.flash&file.
exploit_kit.silverlight; metadata:policy max-detect-ips alert, policy security-ips
drop, ruleset community, service http;
reference:url,malware.dontneedcoffee.com/2014/09/astrum-ek.html; classtype:trojan-
activity; sid:31965; rev:3;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT Astrum
exploit kit payload delivery"; flow:to_client,established;
flowbits:isset,file.exploit_kit.pe; file_data; content:"|D5 B1 F8 24 89 28 15 47|";
fast_pattern:only; metadata:policy security-ips drop, ruleset community, service
http; reference:url,malware.dontneedcoffee.com/2014/09/astrum-ek.html;
classtype:trojan-activity; sid:31966; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT Astrum
exploit kit payload delivery"; flow:to_client,established;
flowbits:isset,file.exploit_kit.pe; file_data; content:"|F2 F7 94 75 16 7E 8E 15|";
fast_pattern:only; metadata:policy security-ips drop, ruleset community, service
http; reference:url,malware.dontneedcoffee.com/2014/09/astrum-ek.html;
classtype:trojan-activity; sid:31967; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Astrum
exploit kit redirection attempt"; flow:to_server,established; urilen:>60,norm;
content:"POST"; http_method; pcre:"/\x2f[\w\x2d]*\x2e+$/mU"; content:"Referer|3A
20|"; http_header; content:"x-req|3A 20|"; fast_pattern; http_header;
content:"Connection|3A 20|Keep-Alive|0D 0A|"; http_header; content:"Pragma|3A 20|
no-cache|0D 0A|"; http_header;
flowbits:set,file.exploit_kit.jar&file.exploit_kit.pdf&file.exploit_kit.flash&file.
exploit_kit.silverlight; metadata:policy max-detect-ips alert, policy security-ips
drop, ruleset community, service http;
reference:url,malware.dontneedcoffee.com/2014/09/astrum-ek.html; classtype:trojan-
activity; sid:31970; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Astrum
exploit kit multiple exploit download request"; flow:to_server,established;
urilen:>60,norm; content:"GET"; content:".. HTTP/1."; fast_pattern:only;
pcre:"/\x2f[\w\x2d]*\x2e\x2e$/mU"; content:"Connection|3A 20|Keep-Alive|0D 0A|";
http_header;
flowbits:set,file.exploit_kit.jar&file.exploit_kit.pdf&file.exploit_kit.flash&file.
exploit_kit.silverlight; flowbits:noalert; metadata:policy max-detect-ips alert,
ruleset community, service http;
reference:url,malware.dontneedcoffee.com/2014/09/astrum-ek.html; classtype:trojan-
activity; sid:31971; rev:9;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"EXPLOIT-KIT Astrum
exploit kit payload delivery"; flow:to_client,established;
flowbits:isset,file.exploit_kit.pe; file_data; content:"|DC C7 5E 47 A0 DB D2 51|";
fast_pattern:only; metadata:policy security-ips drop, ruleset community, service
http; reference:url,malware.dontneedcoffee.com/2014/09/astrum-ek.html;
classtype:trojan-activity; sid:31972; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Chebri variant outbound connection"; flow:to_server,established;
urilen:10; content:"/index.php HTTP/1.0|0D 0A|Host: google.com|0D 0A|User-Agent: ";
fast_pattern:only; content:"0="; depth:2; http_client_body; content:"Accept-
Encoding: none|0D 0A 0D 0A|"; http_header; pcre:"/User\x2dAgent\x3a\x20[A-F\d]
{32}\r\n/H"; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/db94644fc351fb4a9117b68ab625494daa2ebe3611
7a8333577d857a7c2d1ec6/analysis/1409853252/; classtype:trojan-activity; sid:31973;
rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"OS-OTHER Bash CGI
environment variable injection attempt"; flow:to_server,established; content:"%3D
%28%29+%7B"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2014-6271; reference:cve,2014-6277; reference:cve,2014-6278;
reference:cve,2014-7169; classtype:attempted-admin; sid:31975; rev:5;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"OS-OTHER Bash CGI
environment variable injection attempt"; flow:to_server,established; content:"()
{"; fast_pattern:only; http_client_body; metadata:policy balanced-ips drop, policy
max-detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2014-6271; reference:cve,2014-6277; reference:cve,2014-6278;
reference:cve,2014-7169; classtype:attempted-admin; sid:31976; rev:5;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"OS-OTHER Bash CGI
environment variable injection attempt"; flow:to_server,established; content:"()
{"; fast_pattern:only; http_uri; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2014-6271; reference:cve,2014-6277; reference:cve,2014-6278;
reference:cve,2014-7169; classtype:attempted-admin; sid:31977; rev:5;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"OS-OTHER Bash CGI
environment variable injection attempt"; flow:to_server,established; content:"()
{"; fast_pattern:only; http_header; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2014-6271; reference:cve,2014-6277; reference:cve,2014-6278;
reference:cve,2014-7169; classtype:attempted-admin; sid:31978; rev:5;)
alert udp $HOME_NET 67 -> $HOME_NET 68 (msg:"OS-OTHER Malicious DHCP server bash
environment variable injection attempt"; flow:stateless; content:"() {";
fast_pattern:only; content:"|02 01 06 00|"; depth:4; metadata:policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community;
reference:cve,2014-6271; reference:cve,2014-6277; reference:cve,2014-6278;
reference:cve,2014-7169; classtype:attempted-admin; sid:31985; rev:6;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC User-Agent known
malicious user-agent string - Install - Win.Backdoor.Upatre";
flow:to_server,established; content:"/0/ HTTP/1."; content:"User-Agent: Install|0D
0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/ae7f419e0093fd2d4892ea6920aaa2c12c95cede9c
97cb0a1f096496d4ff93ea/analysis/; classtype:trojan-activity; sid:31990; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC User-Agent known
malicious user-agent string - Treck - Win.Backdoor.Upatre";
flow:to_server,established; content:"/0/ HTTP/1."; content:"User-Agent: Treck|0D
0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/e295922322324e048657a5b4c0c4c9717a1a127e39
ba45a03dc5d4d4bb2e523f/analysis/; classtype:trojan-activity; sid:31991; rev:3;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER Fake Delta
Ticket HTTP Response phishing attack"; flow:to_client,established; file_data;
content:"PK"; depth:2; content:"DeltaTicket_ET-RM-"; distance:0; nocase;
content:".exe"; distance:0; nocase; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.satinfo.es/blog/tag/deltaticket_et-rm-0hj423891156-exe;
classtype:trojan-activity; sid:32008; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC
Linux.Backdoor.Flooder inbound connection attempt - command";
flow:to_client,established; dsize:<15; content:"|21 2A 20|SCANNER ON";
fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop,
ruleset community;
reference:url,www.virustotal.com/en/file/73b0d95541c84965fa42c3e257bb349957b3be626d
ec9d55efcc6ebcba6fa489/analysis/; classtype:trojan-activity; sid:32009; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 23 (msg:"MALWARE-CNC
Linux.Backdoor.Flooder outbound telnet connection attempt";
flow:to_server,established; content:"/bin/busybox|3B|echo -e |27 5C|147|5C|141|5C|
171|5C|146|5C|147|5C|164|27 0D 0A|"; fast_pattern:only; metadata:policy balanced-
ips drop, policy security-ips drop, ruleset community, service telnet;
reference:url,www.virustotal.com/en/file/73b0d95541c84965fa42c3e257bb349957b3be626d
ec9d55efcc6ebcba6fa489/analysis/; classtype:trojan-activity; sid:32010; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Linux.Backdoor.Flooder outbound connection"; flow:to_server,established; dsize:10;
content:"BUILD X86|0A|"; fast_pattern:only; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/73b0d95541c84965fa42c3e257bb349957b3be626d
ec9d55efcc6ebcba6fa489/analysis/; classtype:trojan-activity; sid:32011; rev:3;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"OS-OTHER Bash environment
variable injection attempt"; flow:to_server,established; content:"() {";
fast_pattern:only; content:"MAIL"; nocase; content:"FROM|3A|"; distance:0; nocase;
pcre:"/^\s*?MAIL\s+?FROM\x3a[^\r\n]*?\x28\x29\s\x7b/i"; metadata:policy balanced-
ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service smtp; reference:cve,2014-6271; reference:cve,2014-6277; reference:cve,2014-
6278; reference:cve,2014-7169; classtype:attempted-admin; sid:32038; rev:3;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"OS-OTHER Bash environment
variable injection attempt"; flow:to_server,established; content:"() {";
fast_pattern:only; content:"RCPT"; nocase; content:"TO|3A|"; distance:0; nocase;
pcre:"/^\s*?RCPT\s+?TO\x3a[^\r\n]*?\x28\x29\s\x7b/i"; metadata:policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service smtp; reference:cve,2014-6271; reference:cve,2014-6277; reference:cve,2014-
6278; reference:cve,2014-7169; classtype:attempted-admin; sid:32039; rev:3;)
# alert udp $EXTERNAL_NET any -> $SIP_SERVERS $SIP_PORTS (msg:"OS-OTHER Bash
environment variable injection attempt"; flow:stateless; sip_header; content:"()
{"; metadata:policy max-detect-ips drop, policy security-ips drop, ruleset
community, service sip; reference:cve,2014-6271; reference:cve,2014-6277;
reference:cve,2014-6278; reference:cve,2014-7169; classtype:attempted-admin;
sid:32041; rev:4;)
# alert tcp $EXTERNAL_NET any -> $SIP_SERVERS $SIP_PORTS (msg:"OS-OTHER Bash
environment variable injection attempt"; flow:to_server,established; sip_header;
content:"() {"; metadata:policy max-detect-ips drop, policy security-ips drop,
ruleset community, service sip; reference:cve,2014-6271; reference:cve,2014-6277;
reference:cve,2014-6278; reference:cve,2014-7169; classtype:attempted-admin;
sid:32042; rev:4;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"OS-OTHER Bash environment
variable injection attempt"; flow:to_server,established; content:"USER "; depth:5;
content:"() {"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service ftp;
reference:cve,2014-6271; reference:cve,2014-6277; reference:cve,2014-6278;
reference:cve,2014-7169; classtype:attempted-admin; sid:32043; rev:3;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Asprox inbound connection"; flow:to_client,established;
content:"Content-Length: 30"; http_header; file_data; content:"|3C|html|3E 3C|body|
3E|hi!|3C 2F|body|3E 3C 2F|html|3E|"; fast_pattern:only; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/8ba8292eaa47967618c2376afe524736f4fa7eec15
ed9cca17abfca692d26fe4/analysis/; classtype:trojan-activity; sid:32065; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Asprox outbound connection"; flow:to_server,established; urilen:20<>23;
content:"/b/pkg/T202"; depth:11; fast_pattern; http_uri; content:"UA-CPU: ";
http_header; content:"Connection: Keep-Alive|0D 0A 0D 0A|";
pcre:"/\x2fb\x2fpkg\x2fT202[0-9a-z]{10}/U"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/8ba8292eaa47967618c2376afe524736f4fa7eec15
ed9cca17abfca692d26fe4/analysis/; classtype:trojan-activity; sid:32066; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Asprox outbound connection"; flow:to_server,established; urilen:46<>51;
content:"/x/"; depth:3; fast_pattern; http_uri; content:"UA-CPU: ";
content:"Connection: Keep-Alive|0D 0A 0D 0A|"; pcre:"/\x2fx\x2f[0-9a-z]
{8,10}\x2f[0-9a-f]{32}\x2fAA\x2f0$/U"; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/8ba8292eaa47967618c2376afe524736f4fa7eec15
ed9cca17abfca692d26fe4/analysis/; classtype:trojan-activity; sid:32067; rev:3;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"OS-OTHER Bash environment
variable injection attempt"; flow:to_server,established; content:"PASS "; depth:5;
content:"() {"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service ftp;
reference:cve,2014-6271; reference:cve,2014-6277; reference:cve,2014-6278;
reference:cve,2014-7169; classtype:attempted-admin; sid:32069; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zemot configuration download attempt"; flow:to_server,established;
content:"/mod_"; http_uri; content:"/soft"; http_uri; content:".dll";
fast_pattern:only; http_uri; content:"Connection|3A 20|Close|0D 0A|"; http_header;
content:"Cache-Control|3A 20|no-cache|0D 0A|"; http_header; content:!"Referer";
http_header; pcre:"/\x2fsoft(64|32)\x2edll$/U"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/8ba8292eaa47967618c2376afe524736f4fa7eec15
ed9cca17abfca692d26fe4/analysis/; classtype:trojan-activity; sid:32072; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zemot outbound connection"; flow:to_server,established;
content:"/b/shoe/"; fast_pattern:only; http_uri; content:"Connection|3A 20|Close|0D
0A|"; http_header; content:"Cache-Control|3A 20|no-cache|0D 0A|"; http_header;
content:!"Referer"; http_header; pcre:"/\x2fb\x2fshoe\x2f[0-9]{3,5}$/U";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/8ba8292eaa47967618c2376afe524736f4fa7eec15
ed9cca17abfca692d26fe4/analysis/; classtype:trojan-activity; sid:32073; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zemot payload download attempt"; flow:to_server,established;
content:"/mod_articles-auth-"; depth:19; fast_pattern; http_uri;
content:"/jquery/"; within:8; distance:7; http_uri; content:"Accept: */*|0D 0A|
Connection|3A 20|Close|0D 0A|"; http_header; content:"Cache-Control|3A 20|no-cache|
0D 0A|"; http_header; content:!"Referer"; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/8ba8292eaa47967618c2376afe524736f4fa7eec15
ed9cca17abfca692d26fe4/analysis/; classtype:trojan-activity; sid:32074; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"/beta/order.php"; fast_pattern:only; http_uri; content:" HTTP/1.1|0D 0A|
Content-Type: application/x-www-form-urlencoded|0D 0A|User-Agent: Mozilla/";
content:"|3B 20|MSIE|20|"; distance:0; http_header; content:"|29 0D 0A|Host:";
distance:0; http_header; content:!"Accept"; http_header; content:!"|0D 0A|
Referer:"; http_header; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/51540d7c9a4bc2a430bc50c85cf9cec5c6f2bb755e
800a3f3575ba34fe5f008c/analysis; classtype:trojan-activity; sid:32130; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [53,80,443,5432] (msg:"MALWARE-CNC
WIN.Trojan.Plugx variant outbound connection"; flow:to_server,established;
content:"HHV1:"; content:"HHV2:"; within:20; content:"HHV3: 61456"; within:20;
fast_pattern; content:"HHV4:"; within:20; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service dns,
service http, service ssl;
reference:url,virustotal.com/en/file/4d464f9def2276dac15d19ccf049b7c68642290bc0e345
e06d4b6e9103fde9e6/analysis/; classtype:trojan-activity; sid:32179; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.ZxShell
connection incoming attempt"; flow:to_client,established; dsize:16; content:"|85 19
00 00 25 04 00 00|"; depth:8; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community;
reference:url,virustotal.com/en/file/438ed90e1f69b5dcae2d30d241159aaed74f9d3125c60f
1003915b2237978f7d/analysis/; classtype:trojan-activity; sid:32180; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Backdoor.ZxShell
connection outgoing attempt"; flow:to_server,established; dsize:16; content:"|86 19
00 00 04 01 00 00|"; depth:8; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community;
reference:url,virustotal.com/en/file/438ed90e1f69b5dcae2d30d241159aaed74f9d3125c60f
1003915b2237978f7d/analysis/; classtype:trojan-activity; sid:32181; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Zxshell
variant outbound connection"; flow:to_server,established; content:"|20|OS|3A 20|";
content:"|20|CPU|3A|"; distance:0; content:"Hz,RAM|3A|"; distance:0;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community;
reference:url,www.virustotal.com/en/file/547044cb73f1c18ccd92cd28afded37756f749a933
8ed7c04306c1de46889d6b/analysis/; classtype:trojan-activity; sid:32192; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Graftor variant outbound connection"; flow:to_server,established;
content:"form-data|3B| name=|22|PLUG|22 0D 0A|"; fast_pattern:only;
http_client_body; content:"form-data|3B| name=|22|PC|22 0D 0A|"; http_client_body;
content:"form-data|3B| name=|22|SEG|22 0D 0A|"; distance:0; http_client_body;
content:"User-Agent: Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A|";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/f7215718184d5fa1a2057e5dd714d3cdbd00fe9243
34ecdd3cd5662c3c284d90/analysis/; classtype:trojan-activity; sid:32196; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Cryptowall variant outbound connection"; flow:to_server,established;
urilen:27; content:"/blog-trabajos/n65dj17i1836"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/f75b9ed535c3b33ead4da28854f3e8d6e805135679
a2352463184acb06ffcaf0/analysis/; classtype:trojan-activity; sid:32225; rev:2;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"BROWSER-FIREFOX Mozilla 1.0
Javascript arbitrary cookie access attempt"; flow:to_server,established; file_data;
content:"javascript|3A|//"; fast_pattern:only; content:"document.cookie"; nocase;
metadata:ruleset community, service smtp; reference:bugtraq,5293;
reference:cve,2002-2314; classtype:attempted-user; sid:32244; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Hydraq.variant outbound detected"; flow:to_server,established;
content:"/info.xml"; http_uri; content:"Host:"; http_header; content:"update-
adobe.com"; within:30; http_header; metadata:policy balanced-ips drop, policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:32250; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-OTHER Sinkhole reply -
irc-sinkhole.cert.pl"; flow:to_client,established; content:"|3A|irc|2D|sinkhole|2E|
cert|2E|pl"; fast_pattern:only; content:"|3A|End of MOTD command|2E|";
metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-
ips drop, ruleset community; classtype:trojan-activity; sid:32260; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"OS-OTHER Bash CGI
environment variable injection attempt"; flow:to_server,established; content:" ()
{"; depth:50; urilen:>0,norm; content:!"HTTP/"; metadata:policy max-detect-ips
drop, ruleset community, service http; reference:cve,2014-6271; reference:cve,2014-
6277; reference:cve,2014-6278; reference:cve,2014-7169; classtype:attempted-admin;
sid:32335; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"OS-OTHER Bash CGI
environment variable injection attempt"; flow:to_server,established; content:"()
{"; fast_pattern:only; content:"() {"; http_cookie; metadata:policy max-detect-ips
drop, ruleset community, service http; reference:cve,2014-6271; reference:cve,2014-
6277; reference:cve,2014-6278; reference:cve,2014-7169; classtype:attempted-admin;
sid:32336; rev:2;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"OS-OTHER Bash environment
variable injection attempt"; flow:to_server,established; content:"() {";
content:"}"; within:25; pcre:"/^[\w\x2d\x5f]+?\x3a\s*?\x28\x29\s\x7b/mi";
metadata:policy max-detect-ips drop, ruleset community, service smtp;
reference:cve,2014-6271; reference:cve,2014-6277; reference:cve,2014-6278;
reference:cve,2014-7169; classtype:attempted-admin; sid:32366; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.GameOverZeus variant outbound connection"; flow:to_server,established;
urilen:<10; content:"/update"; http_uri; content:"POST"; http_method; content:"|0D
0A|Accept-Encoding:|0D 0A|Connection: close|0D 0A|Content-Length: ";
fast_pattern:only; http_header; content:!"User-Agent:"; http_header;
metadata:impact_flag red, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/d866214d1f921028f9001ae399e9f8dec32ec8998c
84d20d60a992164888a6fc/analysis; classtype:trojan-activity; sid:32367; rev:2;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SERVER-OTHER AOL Instant
Messenger goaway message buffer overflow attempt"; flow:to_server,established;
file_data; content:"aim|3A|goaway?message="; nocase; isdataat:500,relative;
pcre:"/\x22aim\x3Agoaway\x3Fmessage\x3D[^\x22]
{500}|\x27aim\x3Agoaway\x3Fmessage\x3D[^\x27]{500}|
aim\x3Agoaway\x3Fmessage\x3D[^\s]{500}/i"; metadata:ruleset community, service
smtp; reference:bugtraq,10889; reference:cve,2004-0636; classtype:misc-attack;
sid:32370; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Androm variant outbound connection"; flow:to_server,established;
urilen:13; content:"POST"; http_method; content:"/and/gate.php"; fast_pattern:only;
http_uri; content:"User-Agent: Mozilla/4.0|0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,malwr.com/analysis/ZmE3ZWU2YTkyM2U0NGQ0MmI1NDcxMjUwZDE2NTM5MjQ/;
classtype:trojan-activity; sid:32374; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"FILE-IDENTIFY bmp file attachment
detected"; flow:to_server,established; content:".bmp"; fast_pattern:only;
content:"Content-Disposition: attachment|3B|"; content:"filename="; nocase;
pcre:"/filename=[^\n]*\x2ebmp/i"; flowbits:set,file.bmp; flowbits:noalert;
metadata:ruleset community, service smtp;
reference:url,en.wikipedia.org/wiki/BMP_file_format; classtype:misc-activity;
sid:32378; rev:9;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"FILE-IDENTIFY dib file attachment
detected"; flow:to_server,established; content:".dib"; fast_pattern:only;
content:"Content-Disposition: attachment|3B|"; content:"filename="; nocase;
pcre:"/filename=[^\n]*\x2edib/i"; flowbits:set,file.bmp; flowbits:noalert;
metadata:ruleset community, service smtp;
reference:url,en.wikipedia.org/wiki/BMP_file_format; classtype:misc-activity;
sid:32380; rev:9;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Nuclear
exploit kit outbound structure"; flow:to_server,established; content:"/f/";
depth:3; http_uri; pcre:"/^\/f(\/[^\x2f]+)?\/14\d{8}(\/\d{9,10})?(\/\d)+(\/x[a-f0-
9]+(\x3b\d)+?)?$/U"; flowbits:set,file.exploit_kit.pe; metadata:policy balanced-ips
drop, policy max-detect-ips alert, policy security-ips drop, ruleset community,
service http; classtype:trojan-activity; sid:32386; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi variant outbound connection"; flow:to_server,established;
urilen:16; content:"/cbrry/cbre.html"; fast_pattern:only; http_uri; content:"User-
Agent: Mozilla/3.0 (compatible|3B| Indy Library)"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/7c110c2d125a4100322bd9c4328d0a01259cb00a4e
3709815711b8b364a58bdd/analysis/1415285838/; classtype:trojan-activity; sid:32583;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi variant outbound connection"; flow:to_server,established;
content:"plug=NAO"; fast_pattern:only; http_client_body; content:".php HTTP/1.0|0D
0A|"; content:"Content-Length: 8"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,malwr.com/analysis/NDUwYTczYzQ0YWMwNGM2Yjk5MDc5YmU4Yjg5MzY5OWY/;
reference:url,www.virustotal.com/en/file/d34644047c451081e9332e18600dba25aed42ff76f
96fc51cb3eada95ba57e59/analysis/; classtype:trojan-activity; sid:32584; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Geodo variant outbound connection"; flow:to_server,established;
urilen:1; content:"User-Agent: Mozilla/4.0 (compatible|3B|MSIE 7.0|3B|Windows NT
6.0)|0D 0A|"; fast_pattern:only; http_header; content:!"Accept-Language:";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/330b408173d45365dd6372bc659ebdd54b9eb18b32
3079da9552c4e3d8e62d1e/analysis/; classtype:trojan-activity; sid:32604; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Worm.Jenxcus variant outbound connection"; flow:to_server,established;
content:"/seo.php?username=MAREYOLE&format=ptp"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/8538cbb2271f90c57f57150d714ec92e59869f52c7
060bb2ab1f57ef6757321d/analysis/; classtype:trojan-activity; sid:32605; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Sodebral variant outbound connection"; flow:to_server,established;
content:"/verifica/index.php?id="; fast_pattern:only; http_uri; content:"User-
Agent: Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A 0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/e0290c3900445dc00ca24888924e37fa6ac17ecadd
c60591e32b81536b9f5ef7/analysis/; classtype:trojan-activity; sid:32606; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Sodebral HTTP Response attempt"; flow:to_client,established; file_data;
dsize:<194; content:"INTERNACIONAL"; depth:13; content:!"Content-Length";
http_header; content:"Transfer-Encoding: chunked"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/e0290c3900445dc00ca24888924e37fa6ac17ecadd
c60591e32b81536b9f5ef7/analysis/; classtype:trojan-activity; sid:32607; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Sodebral HTTP Response attempt"; flow:to_client,established; file_data;
dsize:<194; content:"BRASIL"; depth:6; content:!"Content-Length"; http_header;
content:"Transfer-Encoding: chunked"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/e0290c3900445dc00ca24888924e37fa6ac17ecadd
c60591e32b81536b9f5ef7/analysis/; classtype:trojan-activity; sid:32608; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC User-Agent known
malicious user-agent string RUpdate"; flow:to_server,established; content:"User-
Agent: RUpdate|0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0d68f1d3855543a4732e551e9e4375a2cd85d9ab11
a86334f67ad99c5f6990a0/analysis/; classtype:trojan-activity; sid:32645; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
Potential malware download - _pdf.exe within .zip file";
flow:to_client,established; flowbits:isset,file.zip; file_data; content:"_pdf.exe";
fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/0d68f1d3855543a4732e551e9e4375a2cd85d9ab11
a86334f67ad99c5f6990a0/analysis/; classtype:trojan-activity; sid:32646; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Chopstick variant outbound request"; flow:to_server,established;
content:"/search?btnG="; http_uri; content:"utm="; distance:0; http_uri;
content:"ai="; distance:0; http_uri; content:!"."; depth:20; http_client_body;
content:!"|22|"; depth:20; http_client_body; content:!"|3A|"; depth:20;
http_client_body; isdataat:500,relative; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,virustotal.com/en/file/7f6f9645499f5840b59fb59525343045abf91bc57183aa
e459dca98dc8216965/analysis/; classtype:trojan-activity; sid:32665; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Chopstick variant outbound request"; flow:to_server,established;
content:"/webhp?rel="; http_uri; content:"hl="; distance:0; http_uri;
content:"ai="; distance:0; http_uri; content:!"."; depth:20; http_client_body;
content:!"|22|"; depth:20; http_client_body; content:!"|3A|"; depth:20;
http_client_body; isdataat:500,relative; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,virustotal.com/en/file/7f6f9645499f5840b59fb59525343045abf91bc57183aa
e459dca98dc8216965/analysis/; classtype:trojan-activity; sid:32667; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Dropper.Ch variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/tasks.php"; fast_pattern:only; http_uri;
content:"Content-length:"; http_header; content:"Content-type:"; http_header;
content:!"Accept"; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/3d8f05f45f8335198e5488716be2a9c5cebead7d03
21bc371fa475d689ffe658/analysis/; classtype:trojan-activity; sid:32670; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET [8000,8080] (msg:"MALWARE-CNC
Win.Trojan.Wiper variant outbound connection"; flow:to_server,established;
dsize:42; content:"(|00|"; depth:2; content:"|04 00 00 00|"; within:4; distance:36;
metadata:impact_flag red, policy security-ips drop, ruleset community;
reference:url,virustotal.com/en/file/e2ecec43da974db02f624ecadc94baf1d21fd1a5c4990c
15863bb9929f781a0a/analysis/; classtype:trojan-activity; sid:32674; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC FIN4 VBA
Macro credentials upload attempt"; flow:to_server, established; content:"POST";
http_method; content:"/report.php?msg="; fast_pattern:only; http_uri;
content:"&uname="; http_uri; content:"&pword="; http_uri; content:"Content-Length|
3A 20|0|0D 0A|"; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/url/536ed7236769b9a5f09b2a31ab138fbad7331108cb6
5e1f4c77d129df7fb7764/analysis/; classtype:trojan-activity; sid:32776; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Darkhotel outbound connection"; flow:to_server,established;
content:"/images/view.php"; fast_pattern:only; http_uri; content:"User-Agent|3A
20|"; http_header; content:"Media Center PC 6.0"; within:175; http_header;
content:!"Accept|3A 20|"; http_header; content:!"Referer|3A 20|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,securelist.com/files/2014/11/darkhotel_kl_07.11.pdf;
reference:url,securelist.com/files/2014/11/darkhotelappendixindicators_kl.pdf;
classtype:trojan-activity; sid:32823; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Darkhotel variant outbound connection"; flow:to_server,established;
content:"/txt/read.php"; fast_pattern:only; http_uri; content:"User-Agent|3A 20|";
http_header; content:"Media Center PC 6.0"; within:175; http_header;
content:!"Accept|3A 20|"; http_header; content:!"Referer|3A 20|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,securelist.com/files/2014/11/darkhotel_kl_07.11.pdf;
reference:url,securelist.com/files/2014/11/darkhotelappendixindicators_kl.pdf;
classtype:trojan-activity; sid:32824; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Darkhotel outbound connection"; flow:to_server,established;
content:"/bin/read_i.php?"; http_uri; content:"a1="; http_uri; content:"&a2=step2-
down"; fast_pattern:only; http_uri; content:"&a3="; http_uri; content:"&a4=";
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,securelist.com/files/2014/11/darkhotel_kl_07.11.pdf;
reference:url,securelist.com/files/2014/11/darkhotelappendixindicators_kl.pdf;
classtype:trojan-activity; sid:32825; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Darkhotel data upload attempt"; flow:to_server,established;
content:"POST"; http_method; content:"/html/docu.php"; http_uri; content:"User-
Agent|3A 20|"; http_header; content:"Media Center PC 6.0"; within:175; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,securelist.com/files/2014/11/darkhotel_kl_07.11.pdf;
reference:url,securelist.com/files/2014/11/darkhotelappendixindicators_kl.pdf;
classtype:trojan-activity; sid:32826; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Darkhotel response connection attempt"; flow:to_client,established;
file_data; content:"DEXT87"; pcre:"/DEXT87(no|up|\d+\x2e\d+\x2e\d+\x2e\d+)/i";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,securelist.com/files/2014/11/darkhotel_kl_07.11.pdf;
reference:url,securelist.com/files/2014/11/darkhotelappendixindicators_kl.pdf;
classtype:trojan-activity; sid:32827; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Absolute
Software Computrace outbound connection - 209.53.113.223";
flow:to_server,established; content:"Host|3A| 209.53.113.223|0D 0A|";
fast_pattern:only; http_header; content:"TagId: "; http_header; metadata:policy
security-ips drop, ruleset community, service http;
reference:url,absolute.com/support/consumer/technology_computrace;
reference:url,www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-
Computrace-Backdoor-Revisited.pdf; reference:url,www.blackhat.com/presentations/bh-
usa-09/ORTEGA/BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf; classtype:misc-activity;
sid:32845; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Absolute
Software Computrace outbound connection - absolute.com";
flow:to_server,established; content:".absolute.com|0D 0A|"; fast_pattern:only;
http_header; content:"TagId: "; http_header; pcre:"/^m\d+\.absolute\.com$/Hi";
metadata:policy security-ips drop, ruleset community, service http;
reference:url,absolute.com/support/consumer/technology_computrace;
reference:url,www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-
Computrace-Backdoor-Revisited.pdf; reference:url,www.blackhat.com/presentations/bh-
usa-09/ORTEGA/BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf; classtype:misc-activity;
sid:32846; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Absolute
Software Computrace outbound connection - bh.namequery.com";
flow:to_server,established; content:"Host|3A| bh.namequery.com|0D 0A|";
fast_pattern:only; http_header; content:"TagId: "; http_header; metadata:policy
security-ips drop, ruleset community, service http;
reference:url,absolute.com/support/consumer/technology_computrace;
reference:url,www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-
Computrace-Backdoor-Revisited.pdf; reference:url,www.blackhat.com/presentations/bh-
usa-09/ORTEGA/BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf; classtype:misc-activity;
sid:32847; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Absolute
Software Computrace outbound connection - namequery.nettrace.co.za";
flow:to_server,established; content:"Host|3A| namequery.nettrace.co.za|0D 0A|";
fast_pattern:only; http_header; content:"TagId: "; http_header; metadata:policy
security-ips drop, ruleset community, service http;
reference:url,absolute.com/support/consumer/technology_computrace;
reference:url,www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-
Computrace-Backdoor-Revisited.pdf; reference:url,www.blackhat.com/presentations/bh-
usa-09/ORTEGA/BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf; classtype:misc-activity;
sid:32848; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Absolute
Software Computrace outbound connection - search.us.namequery.com";
flow:to_server,established; content:"Host|3A| search.us.namequery.com|0D 0A|";
fast_pattern:only; http_header; content:"TagId: "; http_header; metadata:policy
security-ips drop, ruleset community, service http;
reference:url,absolute.com/support/consumer/technology_computrace;
reference:url,www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-
Computrace-Backdoor-Revisited.pdf; reference:url,www.blackhat.com/presentations/bh-
usa-09/ORTEGA/BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf; classtype:misc-activity;
sid:32849; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Absolute
Software Computrace outbound connection - search2.namequery.com";
flow:to_server,established; content:"Host|3A| search2.namequery.com|0D 0A|";
fast_pattern:only; http_header; content:"TagId: "; http_header; metadata:policy
security-ips drop, ruleset community, service http;
reference:url,absolute.com/support/consumer/technology_computrace;
reference:url,www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-
Computrace-Backdoor-Revisited.pdf; reference:url,www.blackhat.com/presentations/bh-
usa-09/ORTEGA/BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf; classtype:misc-activity;
sid:32850; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Absolute
Software Computrace outbound connection - search64.namequery.com";
flow:to_server,established; content:"Host|3A| search64.namequery.com|0D 0A|";
fast_pattern:only; http_header; content:"TagId: "; http_header; metadata:policy
security-ips drop, ruleset community, service http;
reference:url,absolute.com/support/consumer/technology_computrace;
reference:url,www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-
Computrace-Backdoor-Revisited.pdf; reference:url,www.blackhat.com/presentations/bh-
usa-09/ORTEGA/BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf; classtype:misc-activity;
sid:32851; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Poolfiend variant outbound connection"; flow:to_server, established;
content:"/11/form.php"; fast_pattern:only; http_uri; content:"POST"; http_method;
content:!"Accept"; http_header; pcre:"/[a-z\d\x2f\x2b\x3d]{100}/AGPi";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/12a803cd2f67d2dbdc3fb1a6940b9a11b61f6d8455
f139e6e90893d9a4eb455a/analysis/; classtype:trojan-activity; sid:32852; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Poolfiend variant outbound connection"; flow:to_server, established;
content:"/11/feed.php"; fast_pattern:only; http_uri; content:"POST"; http_method;
content:!"Accept"; http_header; pcre:"/[a-z\d\x2f\x2b\x3d]{100}/AGPi";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/12a803cd2f67d2dbdc3fb1a6940b9a11b61f6d8455
f139e6e90893d9a4eb455a/analysis/; classtype:trojan-activity; sid:32853; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
Potential Redirect from Compromised WordPress site to Fedex - Spammed Malware
Download attempt"; flow:to_server,established; urilen:1; content:"GET";
http_method; content:"/wp-admin/"; fast_pattern:only; http_header; content:"Host:
www.fedex.com|0D 0A|"; http_header;
pcre:"/Referer\x3a\x20[\x20-\x7E]*?\/wp\x2dadmin\/[a-z\d\x2d]+?\.php\r\n/Hi";
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.hybrid-
analysis.com/sample/a531bc62b0460eba5b0003b535a2e9cceae0b623aecfdc6f0331743fbee77e5
6/; classtype:trojan-activity; sid:32888; rev:2;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IMAGE Microsoft and
libpng multiple products PNG large image width overflow attempt";
flow:to_server,established; flowbits:isset,file.png; file_data; content:"|89|PNG|0D
0A 1A 0A|"; content:"IHDR"; within:8; byte_test:4,>,32767,0,relative;
metadata:ruleset community, service smtp; reference:bugtraq,11523;
reference:cve,2004-0990; reference:cve,2004-1244; reference:cve,2007-5503;
reference:url,sourceforge.net/p/png-mng/mailman/message/33173462/;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-009;
classtype:attempted-user; sid:32889; rev:1;)
# alert tcp $EXTERNAL_NET 488 -> $HOME_NET any (msg:"MALWARE-BACKDOOR
Win.Trojan.Wiper inbound communication attempt"; flow:to_client,established;
content:"|60 DB 37 37 37 37 37 37|"; fast_pattern:only; metadata:impact_flag red,
ruleset community; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32911; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 488 (msg:"MALWARE-BACKDOOR
Win.Trojan.Wiper outbound communication attempt"; flow:to_server,established;
content:"|60 DB 37 37 37 37 37 37|"; fast_pattern:only; metadata:impact_flag red,
ruleset community; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32912; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-BACKDOOR
Win.Trojan.Wiper download attempt"; flow:to_client,established; file_data;
content:"|4C 4C|"; depth:2; offset:16; content:"|75 14 2A 2A|"; within:4;
distance:4; metadata:impact_flag red, ruleset community, service ftp-data, service
http, service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32913; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-BACKDOOR
Win.Trojan.Wiper download attempt"; flow:to_client,established; file_data;
content:"|8A 10 80 C2 67 80 F2 24 88 10|"; fast_pattern:only; metadata:impact_flag
red, ruleset community, service ftp-data, service http, service imap, service pop3;
reference:url,us-cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity;
sid:32914; rev:1;)
# alert tcp $EXTERNAL_NET 488 -> $HOME_NET any (msg:"MALWARE-BACKDOOR
Win.Trojan.Wiper inbound communication attempt"; flow:to_client,established;
content:"|65 DB 37 37 37 37 37 37|"; fast_pattern:only; metadata:impact_flag red,
ruleset community; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32915; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 488 (msg:"MALWARE-BACKDOOR
Win.Trojan.Wiper outbound communication attempt"; flow:to_server,established;
content:"|65 DB 37 37 37 37 37 37|"; fast_pattern:only; metadata:impact_flag red,
ruleset community; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32916; rev:1;)
# alert tcp $EXTERNAL_NET [547,8080,133,117,189,159] -> $HOME_NET any
(msg:"MALWARE-BACKDOOR Win.Trojan.Wiper inbound communication attempt";
flow:to_client,established; content:"|7B 08 2A 2A|"; offset:17; content:"|08 2A 2A
01 00|"; distance:0; metadata:impact_flag red, ruleset community; reference:url,us-
cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity; sid:32917; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-BACKDOOR
Win.Trojan.Wiper download attempt"; flow:to_client,established; file_data;
content:"Sleepy!@#qaz13402scvsde890"; fast_pattern:only; metadata:impact_flag red,
ruleset community, service ftp-data, service http, service imap, service pop3;
reference:url,us-cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity;
sid:32918; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper download attempt"; flow:to_client,established; file_data;
content:"|C9 06 D9 96 FC 37 23 5A FE F9 40 BA 4C 94 14 98|"; depth:16;
metadata:impact_flag red, ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32919; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper download attempt"; flow:to_client,established; file_data;
content:"|AA 64 BA F2 56|"; depth:50; metadata:impact_flag red, ruleset community,
service ftp-data, service http, service imap, service pop3; reference:url,us-
cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity; sid:32920; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper download attempt"; flow:to_client,established; file_data;
content:"|AA 74 BA F2 B9 75|"; depth:74; metadata:impact_flag red, ruleset
community, service ftp-data, service http, service imap, service pop3;
reference:url,us-cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity;
sid:32921; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|0C 1F 1F 1F 4D 5A 4C 4F 50 51 4C 5A 3F 2D 2F 2F 3F 50 54 3E 3E 3E|";
depth:22; metadata:impact_flag red, ruleset community, service ftp-data, service
http, service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32922; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|D3 C4 D2 D1 CE CF D2 C4 A1 B3 B1 B1 A1 CE CA A0 A0 A0|"; depth:18;
metadata:impact_flag red, ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32923; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|17 08 14 13 67 0F 13 13 17 67 15 02 16 12 02 14 13 78 47 47|"; depth:24;
metadata:impact_flag red, ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32924; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|4F 50 4C 4B 3F 57 4B 4B 4F 3F 4D 5A 4E 4A 5A 4C 4B 20 1F|"; depth:23;
metadata:impact_flag red, ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32925; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|15 02 14 17 08 09 14 02 67 75 77 77 67 08 0C 66 66 66|"; depth:22;
metadata:impact_flag red, ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32926; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|09 22 33 30 28 35 2C|"; fast_pattern:only; metadata:impact_flag red,
ruleset community, service ftp-data, service http, service imap, service pop3;
reference:url,us-cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity;
sid:32927; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|13 2F 22 35 22 67 26 35 22 29 27 33 67 28 37 22 29 67 37 28 35 33 34
69|"; fast_pattern:only; metadata:impact_flag red, ruleset community, service ftp-
data, service http, service imap, service pop3; reference:url,us-
cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity; sid:32928; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|43 47 47 47 45 67 47 47 43 47 47 47 44 67 47 47|"; fast_pattern:only;
metadata:impact_flag red, ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32929; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|43 47 47 47 42 67 47 47 43 47 47 47 4F 67 47 47 43 47 47 47 43 67 47 47
43 47 47 47 4E 67 47 47|"; fast_pattern:only; metadata:impact_flag red, ruleset
community, service ftp-data, service http, service imap, service pop3;
reference:url,us-cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity;
sid:32930; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|D1 CE D2 D5 A1 C9 D5 D5 D1 A1 D3 C4 D0 D4 C4 D2 D5 BE|"; depth:18;
metadata:impact_flag red, ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32931; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|17 08 14 13 67 0F 13 13 17 67 15 02 16 12 02 14 13 78|"; depth:18;
metadata:impact_flag red, ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32932; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper listener download attempt"; flow:to_client,established; file_data;
content:"|0C 1F 1F 1F 4F 50 4C 4B 3F 57 4B 4B 4F 3F 4D 5A 4E 4A 5A 4C 4B 20|";
fast_pattern:only; metadata:impact_flag red, ruleset community, service ftp-data,
service http, service imap, service pop3; reference:url,us-
cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity; sid:32933; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper download attempt"; flow:to_client,established; file_data;
content:"|8A 10 80 EA 62 80 F2 B4 88 10|"; fast_pattern:only; metadata:impact_flag
red, ruleset community, service ftp-data, service http, service imap, service pop3;
reference:url,us-cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity;
sid:32934; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER
Win.Trojan.Wiper download attempt"; flow:to_client,established; file_data;
content:"|8A 10 80 C2 4E 80 F2 79 88 10|"; fast_pattern:only; metadata:impact_flag
red, ruleset community, service ftp-data, service http, service imap, service pop3;
reference:url,us-cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity;
sid:32935; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-TOOLS
Win.Trojan.Wiper proxy tools download attempt"; flow:to_client,established;
file_data; content:"|8A 10 80 C2 3A 80 F2 73 88 10|"; fast_pattern:only;
metadata:impact_flag red, ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32936; rev:1;)
# alert tcp any any -> any any (msg:"MALWARE-TOOLS Win.Trojan.Wiper proxy
communication attempt"; flow:established; content:!"HTTP/1"; content:"|E2 1D 49
49|"; depth:4; fast_pattern; content:"|49 49 49 49|"; within:4; distance:4;
metadata:impact_flag red, ruleset community; reference:url,us-
cert.gov/ncas/alerts/TA14-353A; classtype:trojan-activity; sid:32937; rev:1;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-TOOLS
Win.Trojan.Wiper proxy tool download attempt"; flow:to_client,established;
file_data; content:"|82 F4 DE D4 D3 C2 CA F5 C8 C8 D3 82 FB F4 DE D4 D3 C2 CA 94 95
FB D4 D1 C4 CF C8 D4 D3 89 C2 DF C2 87 8A CC 87 00|"; fast_pattern:only;
metadata:impact_flag red, ruleset community, service ftp-data, service http,
service imap, service pop3; reference:url,us-cert.gov/ncas/alerts/TA14-353A;
classtype:trojan-activity; sid:32938; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Android.CoolReaper.Trojan outbound connection"; flow:to_server, established;
content:"POST"; http_method; content:"/dmp/api/"; fast_pattern:only; http_uri;
content:"User-Agent|3A 20|UAC/1.0.0 (Android "; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/94b3d27488d10ec2dd73f39513a6d7845ab50b395d
6b3adb614b94f8a8609f0e/analysis/; classtype:trojan-activity; sid:32956; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.TinyZBot outbound SOAP connection attempt"; flow:to_server,established;
content:"POST"; http_method; urilen:17; content:"/checkupdate.asmx";
fast_pattern:only; http_uri; content:"SOAPAction|3A 20|"; http_header;
content:"User-Agent|3A 20|Mozilla/4.0|20 28|compatible|3B 20|MSIE 6.0|3B 20|MS Web
Services Client Protocol"; pcre:"/SOAPAction\x3a[^\r\n]*Get(ServerTime|FileList|
File)\x22/i"; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0d1f479842cd5bde4f18ab8c85a099da39e13a4051
a7c21334e33d55b6f18d76/analysis/; classtype:trojan-activity; sid:32957; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.TinyZBot response connection attempt"; flow:to_client, established;
file_data; content:"<?xml"; content:"<soap:Body><GetFileListResponse xmlns=|22|
http|3A 2F 2F|"; within:70; distance:200;
content:"<GetFileListResult><string>[ALL]__"; within:75; fast_pattern;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/0d1f479842cd5bde4f18ab8c85a099da39e13a4051
a7c21334e33d55b6f18d76/analysis/; classtype:trojan-activity; sid:32958; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kuluos variant outbound connection"; flow:to_server, established;
content:"POST"; http_method; content:"/w1/feed.php"; fast_pattern:only; http_uri;
urilen:12; content:!"Connection|3A 20|"; http_header; content:!"Accept";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/48936d3242ccd9decedf1057b08eacf5f952efeb1b
7bb2f354bb02028a361ac2/analysis/; classtype:trojan-activity; sid:32976; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kuluos variant outbound connection"; flow:to_server, established;
content:"POST"; http_method; content:"/w1/form.php"; fast_pattern:only; http_uri;
urilen:12; content:!"Connection|3A 20|"; http_header; content:!"Accept";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/48936d3242ccd9decedf1057b08eacf5f952efeb1b
7bb2f354bb02028a361ac2/analysis/; classtype:trojan-activity; sid:32977; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC User-Agent known
malicious user-agent string - realupdate - Win.Backdoor.Upatre";
flow:to_server,established; content:"/0/ HTTP/1."; content:"User-Agent: realupdate|
0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:33047; rev:3;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.Medusa
variant inbound connection"; flow:to_client,established; dsize:<510; content:"|00|
U|00|n|00|d|00|e|00|r|00 20 00|C|00|o|00|n|00|s|00|t|00|r|00|u|00|c|00|t|00|i|00|o|
00|n|00|<|00|/"; content:"|00 22 00 3E 00|w|00|w|00|w|00|.|00|m|00|i|00|c|00|r|00|
o|00|s|00|o|00|f|00|t|00 2E 00|c|00|o|00|m|00 3C|"; distance:0;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:33058; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Medusa variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/bbc_mirror/"; http_uri; content:"search?
id="; distance:0; http_uri; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:33059; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Medusa variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"CNN_Mirror/EN"; http_uri; content:"search?
id="; distance:0; http_uri; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:33060; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Heur variant outbound connection"; flow:to_server, established;
content:"GET"; http_method; urilen:17; content:"/01/WindowsUpdate";
fast_pattern:only; http_uri; content:!"User-Agent:"; http_header;
content:!"Accept"; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/2fb5c3859df3b46cc7e2e2176654cb7e5f739f2bc9
faf3e813736b37c6d3b6bc/analysis/; classtype:trojan-activity; sid:33153; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC User-Agent known
malicious user-agent string - Mazilla/5.0 - Win.Backdoor.Upatre";
flow:to_server,established; content:"User-Agent: Mazilla/5.0|0D 0A|";
fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http; classtype:trojan-activity;
sid:33207; rev:3;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"PUA-ADWARE
SoftPulse variant HTTP response attempt"; flow:to_client,established; file_data;
content:",|22|installerBehavior|22|:{|22|hideOnInstall|22|:"; fast_pattern:only;
content:"{|22|time|22|:"; content:"|22|country|22|"; within:30; content:",|22|
countryId|22|:"; within:20; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service ftp-data, service http,
service imap, service pop3;
reference:url,www.virustotal.com/en/file/7aa774bffa2eb38c691774c1cc59e0adf6186da62a
fc417baa6333670e1e3011/analysis/1421687954/; classtype:trojan-activity; sid:33212;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gamarue variant outbound connection"; flow:to_server,established;
urilen:9; content:"POST"; http_method; content:"/2ldr.php"; fast_pattern:only;
http_uri; content:"User-Agent: Mozilla/4.0|0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/eefe5370b09a32a7b295c136073a8560958c4a5882
2a7da5b501a10543266c6e/analysis/1421697833/; classtype:trojan-activity; sid:33219;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [25,587] (msg:"MALWARE-CNC
Win.Trojan.HawkEye keylogger exfiltration attempt"; flow:to_server,established;
content:"HawkEye Keylogger"; fast_pattern:only; content:"Subject: =?utf-8?B";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service smtp;
reference:url,www.virustotal.com/en/file/f4499928a6fee5d37fb711ed6d68708bf116cfc7f2
84d3295dd30ded7ecf64b2/analysis/; classtype:trojan-activity; sid:33220; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [25,587] (msg:"MALWARE-CNC
Win.Trojan.HawkEye Keylogger exfiltration attempt - clipboard and screenshot";
flow:to_server,established; content:"Subject|3A 20|=?utf-8?B?"; fast_pattern;
content:"=?=|0D 0A|"; within:150; flowbits:set,hawk.lgr; flowbits:noalert;
metadata:ruleset community, service smtp;
reference:url,www.virustotal.com/en/file/f4499928a6fee5d37fb711ed6d68708bf116cfc7f2
84d3295dd30ded7ecf64b2/analysis/; classtype:trojan-activity; sid:33221; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [25,587] (msg:"MALWARE-CNC
Win.Trojan.HawkEye Keylogger exfiltration attempt - clipboard and screenshot";
flow:to_server,established; flowbits:isset,hawk.lgr; content:"=0D=0AClipboard";
fast_pattern:only; content:"=0D=0AKeyboard"; nocase; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
smtp;
reference:url,www.virustotal.com/en/file/f4499928a6fee5d37fb711ed6d68708bf116cfc7f2
84d3295dd30ded7ecf64b2/analysis/; classtype:trojan-activity; sid:33222; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [25,587] (msg:"MALWARE-CNC
Win.Trojan.HawkEye Keylogger exfiltration attempt - clipboard and screenshot";
flow:to_server,established; flowbits:isset,hawk.lgr; content:"name=screenshot";
fast_pattern:only; pcre:"/name\x3dscreenshot\d+\x2e/i"; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
smtp;
reference:url,www.virustotal.com/en/file/f4499928a6fee5d37fb711ed6d68708bf116cfc7f2
84d3295dd30ded7ecf64b2/analysis/; classtype:trojan-activity; sid:33223; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
Win.Trojan.Blocker variant outbound connection attempt";
flow:to_server,established; content:"User-Agent: Mozilla/5.0 (Windows NT 6.3|3B|
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36|0D
0A|Host: checkip.dyndns.org|0D 0A|"; fast_pattern:only; http_header;
content:!"Accept"; http_header; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/79b75a8564e2e446789e1890f52c025792de919b63
719e02630a70d6ae9a3ca4/analysis/1421439683/; classtype:misc-activity; sid:33224;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Agent.BHHK variant outbound connection"; flow:to_server,established; dsize:136;
urilen:1; content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0 (compatible|3B|
MSIE 7.0|3B| Windows NT 6.0)|0D 0A|Host: windowsupdate.microsoft.com|0D 0A|
Connection: Close|0D 0A 0D 0A|"; fast_pattern:only; content:!"Accept"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/cab1fffe7a34b5bb7dab2cacd406cf15628d835ab6
3502d28df78c2faeaad366/analysis/1421677054/; classtype:trojan-activity; sid:33227;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kovter variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/form2.php"; fast_pattern:only; http_uri;
content:!"Accept"; http_header; pcre:"/[a-z\d\x2f\x2b\x3d]{100,300}/Pi";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/599dc4c4dae2d12f8c8ea00114c1cbddecbc171c55
2e7fbe5aba516ef11b08f0/analysis/; classtype:trojan-activity; sid:33228; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Upatre variant outbound connection"; flow:to_server,established;
content:"/js/jquery-"; fast_pattern; http_uri; content:".js?"; within:15;
distance:1; http_uri; pcre:"/\x2ejs\x3f[a-zA-Z0-9]{9,20}=Mozilla\x2f/UGi";
content:"Referer|3A 20|"; http_header; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/7a06565bb9d49aa92084b5bc32cf59d04dc1d60d63
827099ca7c14063f54967a/analysis/1421616162/; classtype:trojan-activity; sid:33282;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi variant outbound connection"; flow:to_server,established;
content:"/r1xpr/r1xe.html"; fast_pattern:only; http_uri; content:"User-Agent:
Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/4ca26daa7cfb81c8ee05c955f19ef527a9452f2dad
3c63674afa7f6796d96f02/analysis/; classtype:trojan-activity; sid:33443; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.SpyBanker variant outbound connection"; flow:to_server,established;
content:"/m343ff4ufbnmm4uu4nf34m443frr/"; fast_pattern:only; http_uri;
content:"User-Agent: Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A|";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/66e69ff2c4881a1c95eccd287af3b8db692fd5c9df
3caee464f8b4125d46c1a4/analysis/; classtype:trojan-activity; sid:33444; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.FileEncoder IP geolocation checkin attempt"; flow:to_server,established;
dsize:214; urilen:1; content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0
(compatible|3B| MSIE 6.0|3B| Windows NT 5.1|3B| SV1|3B| .NET4.0C|3B| .NET4.0E|
3B| .NET CLR 2.0.50727|3B| .NET CLR 3.0.4506.2152|3B| .NET CLR 3.5.30729)|0D 0A|
Host: ip-addr.es|0D 0A|Cache-Control: no-cache|0D 0A 0D 0A|"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/17edf82c40df6c7268191def7cbff6e60e78d73880
18408800d42581567f78cf/analysis/; classtype:trojan-activity; sid:33449; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.FileEncoder variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"="; depth:2; http_client_body;
content:"Content-Length: 128|0D 0A|"; fast_pattern:only; http_header;
content:"Content-Type: application/x-www-form-urlencoded|0D 0A|"; http_header;
content:"|3B 20|MSIE|20|"; http_header; content:!"Accept-Language:"; http_header;
pcre:"/[a-z]\x3d[a-f\d]{126}/P"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/17edf82c40df6c7268191def7cbff6e60e78d73880
18408800d42581567f78cf/analysis/; classtype:trojan-activity; sid:33450; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-TOOLBARS
Win.Toolbar.Crossrider variant outbound connection"; flow:to_server,established;
content:".gif?action="; http_uri; content:"&browser="; distance:0; http_uri;
content:"&osbuild="; distance:0; http_uri; content:"&osprod="; distance:0;
http_uri; metadata:policy balanced-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/en/file/06f3bd3df0326b5c3c5b03070d9d870507b868ee4e
1acff62f0d301c43492709/analysis/; classtype:trojan-activity; sid:33452; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kovter variant outbound connection"; flow:to_server,established;
urilen:13; content:"POST"; http_method; content:"/12/index.php"; fast_pattern:only;
http_uri; content:"User-Agent: Mozilla/5.0 (Windows NT 6.1|3B| Trident/7.0|3B|
rv:11.0) like Gecko|0D 0A|"; http_header; content:!"Accept"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/db8952943708f4eefa72ad04ff01bdf9acb33fdd89
a5ad98b0ec2649fb116a52/analysis/1422981882/; classtype:trojan-activity; sid:33453;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi variant outbound connection"; flow:to_server,established;
content:"GET"; http_method; content:"User-Agent: http://www.pershop.com.br/";
fast_pattern:only; http_header; content:".php"; http_uri; content:!"Referer:";
http_header; content:!"Accept-"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/609c2c8ab60a30822689a3955fb84f06b5c3962e0d
2b894f4794ac8ee5eee2eb/analysis/; classtype:trojan-activity; sid:33457; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user agent - ALIZER"; flow:to_server,established; content:"User-
Agent|3A 20|ALIZER|0D 0A|"; fast_pattern:only; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/958c004400ca2a736473c68d842cbea9038bde940d
1e44fb08cf08c4352c5f55/analysis/; classtype:trojan-activity; sid:33519; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Zusy inbound CNC response"; flow:to_client,established; file_data;
content:"|0A|Array|0A 28 0A 20 20 20 20 5B|"; fast_pattern; content:"] => ";
within:20; pcre:"/\x0aArray\x0a\x28\x0a\x20{4}\x5b[a-z\d]
{11}\x5d\x20\x3d\x3e\x20\d{16}\x0a\x29/i"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/958c004400ca2a736473c68d842cbea9038bde940d
1e44fb08cf08c4352c5f55/analysis/; classtype:trojan-activity; sid:33520; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zusy variant outbound connection"; flow:to_server,established;
content:"&pcname="; fast_pattern:only; http_client_body; content:"hwid="; depth:5;
http_client_body; content:"&mode="; within:50; http_client_body;
content:"&system="; within:32; http_client_body; content:"&version="; within:60;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/958c004400ca2a736473c68d842cbea9038bde940d
1e44fb08cf08c4352c5f55/analysis/; classtype:trojan-activity; sid:33521; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user-agent - DNS Changer"; flow:to_server,established;
content:"User-Agent|3A 20|DNS Check|0D 0A|"; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/2b16bd74ed6cf86938a7108b6a6fa9343ac4f890f0
228b964a98c45428cb4e3c/analysis/;
reference:url,www.virustotal.com/en/file/e5cbca1c1cca4ce5ef8beddca38869bdb18e089b96
9171e5ba337aa756371c36/analysis/; classtype:trojan-activity; sid:33522; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DNSChanger variant outbound connection"; flow:to_server,established;
content:"User-Agent|3A 20|NSIS_Inetc (Mozilla)|0D 0A|"; fast_pattern:only;
http_header; content:"/postinstall.php?"; http_uri; content:"src="; within:5;
http_uri; content:"&medium="; within:15; http_uri; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/2b16bd74ed6cf86938a7108b6a6fa9343ac4f890f0
228b964a98c45428cb4e3c/analysis/;
reference:url,www.virustotal.com/en/file/e5cbca1c1cca4ce5ef8beddca38869bdb18e089b96
9171e5ba337aa756371c36/analysis/; classtype:trojan-activity; sid:33523; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DNSChanger variant outbound connection"; flow:to_server,established;
content:"/updateb.xml?"; fast_pattern:only; http_uri; content:"rnd="; http_uri;
content:"&spfail="; within:20; http_uri; content:"&guid="; within:15; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/2b16bd74ed6cf86938a7108b6a6fa9343ac4f890f0
228b964a98c45428cb4e3c/analysis/;
reference:url,www.virustotal.com/en/file/e5cbca1c1cca4ce5ef8beddca38869bdb18e089b96
9171e5ba337aa756371c36/analysis/; classtype:trojan-activity; sid:33524; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Turla outbound connection"; flow:to_server,established; content:"POST";
http_method; content:"?uid="; http_uri; content:"&context="; distance:0; http_uri;
content:"&mode=text"; distance:0; fast_pattern; http_uri; content:"&data=";
distance:0; http_uri; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/1a488c6824bd39f3568346b2aaf3f6666f41b1d496
1a2d77360c7c65c7978b5e/analysis/; classtype:trojan-activity; sid:33547; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Linux.Trojan.XORDDoS outbound connection"; flow:to_server,established; urilen:<64;
content:"/check.action?iid="; http_uri; content:"&kernel="; within:8; distance:32;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/e8cb63cc050c952c1168965f597105a128b5611483
5eb7d40bdec964a0e243dc/analysis/; classtype:trojan-activity; sid:33646; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Linux.Trojan.XORDDoS outbound connection"; flow:to_server,established; urilen:>100;
content:"POST"; http_method; content:"/submit.action?username="; http_uri;
content:"&password="; within:30; http_uri; content:".tgz"; distance:0; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/e8cb63cc050c952c1168965f597105a128b5611483
5eb7d40bdec964a0e243dc/analysis/; classtype:trojan-activity; sid:33647; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Linux.Trojan.XORDDoS outbound connection"; flow:to_server,established; urilen:>100;
content:"/compiler.action?iid="; http_uri; content:"&username="; within:10;
distance:32; http_uri; content:"&password="; within:30; distance:1; http_uri;
content:"&kernel="; distance:0; http_uri; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/e8cb63cc050c952c1168965f597105a128b5611483
5eb7d40bdec964a0e243dc/analysis/; classtype:trojan-activity; sid:33648; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user agent - Google Omaha - Win.Trojan.ExtenBro";
flow:to_server,established; content:"User-Agent: Google Omaha|0D 0A|";
fast_pattern:only; http_header; metadata:policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/34a3667846bbdea8dc92150e6766e3bac129a2b5fd
4856c6f1512e794b90f23d/analysis/; classtype:trojan-activity; sid:33649; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Tinba outbound connection"; flow:to_server,established; content:"POST";
http_method; urilen:9; content:"/preview/"; http_uri; content:"Content-Length: 157|
0D 0A|"; http_header; content:!"User-Agent|3A 20|"; http_header; content:"|00 80 00
00 00|"; depth:5; offset:24; http_client_body; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/8eb2c85abe7acee219e344ae0592a2b1c159bdafa0
37be39ac062bdaeeb1f621/analysis/; classtype:trojan-activity; sid:33650; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Babar outbound connection"; flow:to_server,established;
content:"/bb/index.php"; http_uri; content:"User-Agent|3A 20|Mozilla/4.0
(compatible|3B| MSI 6.0|3B|"; fast_pattern:only; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/c72a055b677cd9e5e2b2dcbba520425d023d906e6e
e609b79c643d9034938ebf/analysis/; classtype:trojan-activity; sid:33677; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.FannyWorm outbound connection"; flow:to_server,established;
content:"User-Agent|3A 20|Mozilla/4.0 (compatible|3B|)|0D 0A|"; fast_pattern:only;
http_header; content:"/ads/QueryRecord"; http_uri; content:".html"; within:25;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/003315b0aea2fcb9f77d29223dd8947d0e6792b3a0
227e054be8eb2a11f443d9/analysis/; classtype:trojan-activity; sid:33678; rev:2;)
# alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IMAGE Microsoft emf
file download request"; flow:to_server,established; flowbits:isset,file.emf;
file_data; content:" EMF"; depth:4; offset:40; metadata:policy max-detect-ips drop,
ruleset community, service smtp; reference:bugtraq,10120; reference:bugtraq,28819;
reference:bugtraq,9707; reference:cve,2003-0906; reference:cve,2007-5746;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-011;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-032;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS05-053;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS06-001;
classtype:misc-activity; sid:33740; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Adware
Goobzo/CrossRider variant outbound connection"; flow:to_server,established;
content:"/install.ashx?id="; fast_pattern:only; http_uri; content:"User-Agent|3A
20|NSIS_Inetc (Mozilla)|0D 0A|"; http_header; metadata:ruleset community, service
http;
reference:url,www.virustotal.com/en/file/bace69ffe133e7693b3b77994a3c81e990288ca4b6
42cffe12938d705c7019df/analysis/; classtype:misc-activity; sid:33815; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Adware
Goobzo/CrossRider variant outbound connection"; flow:to_server,established;
content:"/ping.ashx?action="; fast_pattern:only; http_uri; content:"&usid=";
http_uri; content:"&aff="; distance:0; http_uri; metadata:ruleset community,
service http;
reference:url,www.virustotal.com/en/file/bace69ffe133e7693b3b77994a3c81e990288ca4b6
42cffe12938d705c7019df/analysis/; classtype:misc-activity; sid:33816; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Egamipload variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/service/related?sector="; fast_pattern:only;
http_uri; content:"Mozilla|2F|4.0 (compatible|3B| MSIE 8.0|3B| Windows NT 5.1|3B|
Trident/4.0)"; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/50d7dab7095d5b84a6ccb11769d82cc105b519d84a
b7aef4d540ed3703ae3e45/analysis/; classtype:trojan-activity; sid:33822; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET [139,445] (msg:"OS-WINDOWS Microsoft
Windows SMB NTLM NULL session attempt"; flow:to_server,established; content:"|FF|
SMB|73 00 00 00 00|"; depth:9; offset:4; content:"|00 00|"; within:2; distance:13;
content:"|FF|"; within:1; distance:9; content:"NTLMSSP|00 03 00 00 00|";
within:100; content:"|00 00 00 00 40 00 00 00|"; within:8; distance:24;
flowbits:set,smb.null_session; flowbits:noalert; metadata:ruleset community,
service netbios-ssn; reference:bugtraq,1163; reference:cve,2000-0347;
classtype:attempted-recon; sid:33825; rev:4;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE User-Agent
adware OutBrowse/Amonitize"; flow:to_server,established; content:"User-Agent|3A 20|
Mozilla"; http_header; content:" Loader|0D 0A|"; within:150; fast_pattern;
http_header; metadata:ruleset community, service http; classtype:trojan-activity;
sid:33833; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE User-Agent
adware OutBrowse/Amonitize"; flow:to_server,established; content:"User-Agent|3A
20|"; http_header; content:" Pi/3.1415926|0D 0A|"; within:150; fast_pattern;
http_header; metadata:ruleset community, service http; classtype:trojan-activity;
sid:33834; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE User-Agent
adware OutBrowse/Amonitize"; flow:to_server,established; content:"User-Agent|3A
20|"; http_header; content:" in my heart of heart.|0D 0A|"; within:150;
fast_pattern; http_header; metadata:ruleset community, service http;
classtype:trojan-activity; sid:33835; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Poseidon outbound connection"; flow:established,to_server;
content:"Mozilla/4.0 (compatible|3B| MSIE 8.0|3B| Windows NT 6.1|3B| Trident/4.0|
3B| SLCC2|3B| .NET CLR 2.0.50727|3B| .NET CLR 3.5.30729|3B| .NET CLR 3.0.30729|3B|
Media Center PC 6.0)"; fast_pattern:only; http_header; content:"uid="; depth:4;
http_client_body; content:"&uinfo="; within:26; http_client_body; content:"&win=";
distance:0; http_client_body; content:"&bits="; within:6; distance:3;
http_client_body; content:"&build="; within:20; distance:8; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,blogs.cisco.com/security/talos/poseidon; classtype:trojan-activity;
sid:33851; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Poseidon outbound connection"; flow:established,to_server;
content:"Mozilla/4.0 (compatible|3B| MSIE 8.0|3B| Windows NT 6.1|3B| Trident/4.0|
3B| SLCC2|3B| .NET CLR 2.0.50727|3B| .NET CLR 3.5.30729|3B| .NET CLR 3.0.30729|3B|
Media Center PC 6.0)"; http_header; content:"oprat="; depth:6; http_client_body;
content:"&uinfo="; within:10; distance:23; http_client_body; content:"&win=";
distance:0; http_client_body; content:"&vers="; within:6; distance:3;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,blogs.cisco.com/security/talos/poseidon; classtype:trojan-activity;
sid:33852; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Gh0st
variant outbound connection"; flow:to_server,established; content:"KrisR"; depth:5;
content:"|00 00 00|"; within:3; distance:1; content:"|00 00 78 9C|"; within:4;
distance:2; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community;
reference:url,virustotal.com/en/file/a4fd37b8b9eabd0bfda7293acbb1b6c9f97f8cc3042f3f
78ad2b11816e1f9a59/analysis/1425053730/; classtype:trojan-activity; sid:33885;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.VBPasswordStealer variant outbound connection";
flow:to_server,established; content:"/index.php?"; http_uri; content:"action=add";
fast_pattern; http_uri; content:"&username="; distance:0; http_uri;
content:"&password="; distance:0; http_uri; content:"&app="; distance:0; http_uri;
content:"&pcname="; distance:0; http_uri; content:"&sitename="; distance:0;
http_uri; content:!"Accept"; http_header; content:!"Connection"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/4f0988ac590d52b97b1a162f5ee098c38f6e640be7
83a511049d8e5006cac011/analysis/; classtype:trojan-activity; sid:34047; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
InstallMetrix precheck stage outbound connection"; flow:to_server,established;
content:"/installer_gate_client.php?"; fast_pattern:only; http_uri;
content:"download_id="; http_uri; content:"&mode=prechecking"; distance:0;
http_uri; content:!"Accept"; http_header; content:!"Connection"; http_header;
metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/d99db4f7f047cbf672eb19ea2e492a45d948338c0f
10ef4761db3b9e372ba90e/analysis/1426449298/; classtype:misc-activity; sid:34119;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
InstallMetrix fetch offers stage outbound connection"; flow:to_server,established;
content:"/installer_gate_client.php?"; fast_pattern:only; http_uri;
content:"download_id="; http_uri; content:"&mode=getcombo"; distance:0; http_uri;
content:"&offers="; distance:0; http_uri; content:!"Accept"; http_header;
content:!"Connection"; http_header; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/d99db4f7f047cbf672eb19ea2e492a45d948338c0f
10ef4761db3b9e372ba90e/analysis/1426449298/; classtype:misc-activity; sid:34120;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
InstallMetrix reporting binary installation stage status";
flow:to_server,established; content:"POST"; http_method; content:"User-Agent|3A 20|
NSIS_Inetc (Mozilla)|0D 0A|"; fast_pattern:only; http_header; content:"|22|
event_type|22|"; offset:1; http_client_body; content:"|22|environment|22|";
distance:0; http_client_body; content:"|22|machine_ID|22|"; distance:0;
http_client_body; content:"|22|result|22|"; distance:0; http_client_body;
content:"|22|failure_reason|22|"; distance:0; http_client_body; metadata:ruleset
community, service http;
reference:url,www.virustotal.com/en/file/d99db4f7f047cbf672eb19ea2e492a45d948338c0f
10ef4761db3b9e372ba90e/analysis/1426449298/; classtype:misc-activity; sid:34121;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
InstallMetrix reporting fetch offers stage status"; flow:to_server,established;
content:"/report.php?"; http_uri; content:"download_id="; distance:0; http_uri;
content:"&mode="; distance:0; http_uri; content:"&combo_id="; distance:0; http_uri;
content:"&os_name="; distance:0; http_uri; content:"&os_add="; distance:0;
http_uri; content:"&os_build="; distance:0; http_uri; content:"&proj_id=";
distance:0; http_uri; content:"&offer_id="; distance:0; http_uri;
content:!"Connection"; http_header; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/d99db4f7f047cbf672eb19ea2e492a45d948338c0f
10ef4761db3b9e372ba90e/analysis/1426449298/; classtype:misc-activity; sid:34122;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE User-Agent
Vitruvian"; flow:to_server,established; content:"User-Agent|3A 20|Vitruvian";
fast_pattern:only; http_header; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/a59f0e717dc530814dea3fdf65597faaad90ed8bfe
3c8b8f6cea0e708049a784/analysis/1426449345/; classtype:misc-activity; sid:34125;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Vitruvian
outbound connection"; flow:to_server,established; content:"/inst?"; http_uri;
content:"hid="; http_uri; content:"&sid="; distance:0; http_uri; content:"&tr=";
distance:0; http_uri; content:"&a="; distance:0; http_uri; content:"&adm=";
distance:0; http_uri; content:"&os="; distance:0; http_uri; content:"User-Agent|3A
20|Mozilla/4.0 (compatible|3B| Win32|3B| WinHttp.WinHttpRequest.";
fast_pattern:only; http_header; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/a59f0e717dc530814dea3fdf65597faaad90ed8bfe
3c8b8f6cea0e708049a784/analysis/1426449345/; classtype:misc-activity; sid:34126;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Vitruvian
outbound connection"; flow:to_server,established; content:"/inst?"; http_uri;
content:"sid="; http_uri; content:"&st="; distance:0; http_uri; content:"User-
Agent|3A 20|Mozilla/4.0 (compatible|3B| Win32|3B| WinHttp.WinHttpRequest.";
fast_pattern:only; http_header; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/a59f0e717dc530814dea3fdf65597faaad90ed8bfe
3c8b8f6cea0e708049a784/analysis/1426449345/; classtype:misc-activity; sid:34127;
rev:1;)
alert tcp $EXTERNAL_NET 1433 -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Banload
variant MSSQL response"; flow:to_client,established; content:"|0B|m|00|a|00|c|00|a|
00|v|00|e|00|r|00|d|00|e|00|m|00|2|00 06|m|00|a|00|s|00|t|00|e|00|r|00|";
fast_pattern:only; content:"|08|D|00|B|00|S|00|Q|00|0|00|0|00|1|00|7|00|";
metadata:policy balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/22ccd94c7e99a17753218708cea1abe162d289b7a0
105c3be9620bf224f36f3f/analysis/; classtype:trojan-activity; sid:34136; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
SearchProtect user-agent detection"; flow:to_server,established; content:"User-
Agent|3A 20|SearchProtect|3B|"; fast_pattern:only; http_header; metadata:ruleset
community, service http;
reference:url,www.virustotal.com/en/file/cbddccb934d302497ac60f924088034a1852c378cc
51df20c2e53b401ffc4651/analysis/; classtype:misc-activity; sid:34137; rev:2;)
# alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Dyre
publickey outbound connection"; flow:to_client,established; content:"|00 DE C5 45
99 14 1E F5 7E 56 78 DF 23 CE 8A 12|"; fast_pattern:only;
content:"LvtfOWStYYHNbdiE15aNsOyg"; metadata:impact_flag red, policy security-ips
drop, ruleset community, service http; reference:url,phishme.com/project-dyre-new-
rat-slurps-bank-credentials-bypasses-ssl;
reference:url,www.virustotal.com/en/file/417c9cd7c8abbd7bbddfc313c9f153758fd11bda47
f754b9c59bc308d808c486/analysis/; classtype:trojan-activity; sid:34140; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
SuperOptimizer installation status"; flow:to_server,established; content:"User-
Agent|3A 20|NSIS_Inetc (Mozilla)|0D 0A|"; fast_pattern:only; http_header;
content:"|22|event_type|22|"; depth:15; offset:1; http_client_body; content:"|22|
installation_session_id|22|"; within:100; http_client_body; content:"|22|
environment|22|"; distance:0; http_client_body; content:"|22|command_line|22|";
distance:0; http_client_body; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/1df4d1f316bd526e56b5fa0f84704bac365484c049
e6a7c76145cb45e5e32049/analysis/1426449377/; classtype:misc-activity; sid:34144;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
SuperOptimizer encrypted data transmission"; flow:to_server,established;
content:"User-Agent|3A 20|NSIS_Inetc (Mozilla)|0D 0A|"; fast_pattern:only;
http_header; content:"|22|encryptedKey|22|"; depth:20; offset:1; http_client_body;
content:"|22|encryptedData|22|"; distance:0; http_client_body; metadata:ruleset
community, service http;
reference:url,www.virustotal.com/en/file/1df4d1f316bd526e56b5fa0f84704bac365484c049
e6a7c76145cb45e5e32049/analysis/1426449377/; classtype:misc-activity; sid:34145;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
SuperOptimizer geolocation request"; flow:to_server,established; content:"/ip/?
client=sp"; fast_pattern:only; http_uri; content:"User-Agent|3A 20|NSIS_Inetc
(Mozilla)|0D 0A|"; http_header; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/1df4d1f316bd526e56b5fa0f84704bac365484c049
e6a7c76145cb45e5e32049/analysis/1426449377/; classtype:misc-activity; sid:34146;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Eorezo
outbound connection"; flow:to_server,established; urilen:30<>65; content:"/atJs/v";
fast_pattern; http_uri; content:"/Client/"; within:8; distance:1; http_uri;
content:!"Accept"; http_header; content:!"User-Agent"; http_header;
metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/a31d47e5d6885c32cad2fb5799033982e7f9d070ed
350cd2025dd8594d067651/analysis/1426449407/; classtype:misc-activity; sid:34236;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Eorezo get
advertisement"; flow:to_server,established; content:"/cgi-bin/advert/getads.cgi?";
http_uri; content:"did="; distance:0; http_uri; content:"User-Agent|3A 20|mpck_";
fast_pattern:only; http_header; metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/a31d47e5d6885c32cad2fb5799033982e7f9d070ed
350cd2025dd8594d067651/analysis/1426449407/; classtype:misc-activity; sid:34237;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Linux.Trojan.XORDDoS outbound connection"; flow:to_server,established; urilen:<64;
content:"/check?iid="; http_uri; content:"&kernel="; within:8; distance:32;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/92a260d856e00056469fb26f5305a37f6ab443d735
d1476281b053b10b3c4f86/analysis/; classtype:trojan-activity; sid:34261; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Linux.Trojan.XORDDoS outbound connection"; flow:to_server,established; urilen:>100;
content:"/compiler?iid="; http_uri; content:"&username="; within:10; distance:32;
http_uri; content:"&password="; within:30; distance:1; http_uri;
content:"&kernel="; distance:0; http_uri; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/92a260d856e00056469fb26f5305a37f6ab443d735
d1476281b053b10b3c4f86/analysis/; classtype:trojan-activity; sid:34262; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Linux.Trojan.XORDDoS outbound connection"; flow:to_server,established; urilen:<64;
content:"/upload/module"; http_uri; content:"build.tgz"; within:9; distance:32;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/92a260d856e00056469fb26f5305a37f6ab443d735
d1476281b053b10b3c4f86/analysis/; classtype:trojan-activity; sid:34263; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
vBulletin XSS redirect attempt"; flow:to_server,established; content:"/misc.php?
v="; http_uri; content:"&js=js"; within:12; http_uri; metadata:ruleset community,
service http;
reference:url,www.virustotal.com/en/url/6a7664105f1f144930f51e71dd0fec728607b4c9e33
037d376cd7bf8351273a9/analysis/1430224991/; classtype:web-application-attack;
sid:34287; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kraken outbound connection"; flow:to_server,established;
content:"/idcontact.php?"; http_uri; content:"&steam="; within:35; http_uri;
content:"&origin="; within:10; http_uri; content:"&webnavig="; within:12; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,itsjack.cc/blog/2015/02/krakenhttp-
not-sinking-my-ship-part-1;
reference:url,www.virustotal.com/en/file/27fa65a3166def75feb75f8feb25dd9784b8f2518c
73defcc4ed3e9f46868e76/analysis/; classtype:trojan-activity; sid:34292; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"/get_status.php?name="; fast_pattern:only; http_uri; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34307; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/products/fupdates.php?"; http_uri;
content:"account="; distance:0; http_uri; content:"&name="; distance:0; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34308; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"/products/file_order"; http_uri; content:".php?"; within:8; http_uri;
content:"name="; distance:0; http_uri; content:"&path="; distance:0; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34309; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"/add_user.php?name="; http_uri; content:"&user="; distance:0; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34310; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"/new/"; http_uri; content:"_flash"; within:12; http_uri; content:".php?";
within:15; http_uri; content:"name="; distance:0; http_uri; content:"&serial=";
distance:0; http_uri; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34311; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"/new/get_tree.php?"; http_uri; content:"name="; distance:0; http_uri;
content:"&date="; distance:0; http_uri; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34312; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"/new/add_tree.php?"; http_uri; content:"name="; distance:0; http_uri;
content:"&date="; distance:0; http_uri; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34313; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"/new/all_file_info1.php?"; http_uri; content:"name="; distance:0;
http_uri; content:"&user="; distance:0; http_uri; content:"&file="; distance:0;
http_uri; content:"&type="; distance:0; http_uri; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34314; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"/flupdate/"; http_uri; content:".html"; within:7; http_uri;
pcre:"/\/flupdate\/\d\.html/iU"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34315; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"/gget_rtemp.php?n="; fast_pattern:only; http_uri; content:"User-Agent|3A
20|SK"; nocase; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34316; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.DesertFalcon variant outbound connection"; flow:to_server,established;
content:"/aadd_rtemp.php?n="; fast_pattern:only; http_uri; content:"User-Agent|3A
20|SK"; nocase; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/015fbc0b216d197136df8692b354bf2fc7bd6eb243
e73283d861a4dbbb81a751/analysis/; classtype:trojan-activity; sid:34317; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.CryptoWall variant outbound connection"; flow:to_server,established;
urilen:<130; content:".php?"; nocase; http_uri; content:"|3D|"; within:1;
distance:1; http_uri; content:"Cache-Control: no-cache|0D 0A 0D 0A|"; nocase;
http_header; content:!"|0D 0A|Accept-"; http_header; content:"Content-Type:
application/x-www-form-urlencoded|0D 0A|"; fast_pattern:only; http_header;
content:"|3D|"; depth:2; offset:1; http_client_body; pcre:"/^[a-z]\x3d[a-f\d]
{80,140}$/Pi"; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/d14f1d1e07bd116ed0faf5896438177f36a05adacf
5af4f32910e313e9c1fd93/analysis/; classtype:trojan-activity; sid:34318; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Magento
remote code execution attempt"; flow:to_server,established; content:"/Adminhtml_";
http_uri; content:"forwarded="; distance:0; http_uri; metadata:ruleset community,
service http; reference:cve,2015-1398; classtype:attempted-admin; sid:34365;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.Beebone
outbound connection"; flow:to_server,established; content:"User-Agent|3A 20|
Mozilla/4.0 (compatible|3B| MSIE 7.0|3B| Windows NT 5.1|3B| SV1)|0D 0A|";
fast_pattern:only; content:"GET"; pcre:"/GET \/[a-z]{8,12}\?[a-z] HTTP\/1.1/i";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community;
reference:url,www.virustotal.com/en/file/b06c6ac1174a6992f423d935ccba6f34f107b65917
68a743d44d66423312d33a/analysis/; classtype:trojan-activity; sid:34366; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banload variant outbound connection"; flow:to_server,established;
urilen:16; content:"/arquivo/vrs.txt"; fast_pattern:only; http_uri;
content:"Accept: text/html, */*|0D 0A|Accept-Encoding: identity|0D 0A|";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/fc2cc624c2357bad23eaff951c4eac3a1f1c1c3ec5
133665c7e101f4f4e3bbba/analysis/1430145774/; classtype:trojan-activity; sid:34367;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banload variant outbound connection"; flow:to_server,established;
urilen:19; content:"/arquivo/cookie.txt"; fast_pattern:only; http_uri;
content:"Accept: text/html, */*|0D 0A|Accept-Encoding: identity|0D 0A|";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/fc2cc624c2357bad23eaff951c4eac3a1f1c1c3ec5
133665c7e101f4f4e3bbba/analysis/1430145774/; classtype:trojan-activity; sid:34368;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"/poppxr/popi.html"; fast_pattern:only; http_uri; content:"User-Agent:
Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A 0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/6ca7047c377ad26b9db86c4028b59aa2f6600bfbdb
74f1af3519ebf10314b3a6/analysis/; classtype:trojan-activity; sid:34452; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"sname="; depth:6; http_client_body; content:".php HTTP/1.0|0D 0A|";
content:"User-Agent: Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A 0D 0A|";
fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/6ca7047c377ad26b9db86c4028b59aa2f6600bfbdb
74f1af3519ebf10314b3a6/analysis/; classtype:trojan-activity; sid:34453; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [25] (msg:"MALWARE-CNC
Linux.Trojan.Mumblehard variant outbound connection"; flow:to_server,established;
content:"POST / HTTP/1.0|0D 0A|Host: "; depth:28; content:"Content-type:
application/x-www-form-urlencoded|0D 0A|Content-Length: "; within:100; content:"|0D
0A 0D 0A 0F 0F 09|"; within:25; fast_pattern; content:!"User-Agent: "; nocase;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,virustotal.com/file/9512cd72e901d7df95ddbcdfc42cdb16141ff155e0cb0f832
1069212e0cd67a8/analysis/1430996623; classtype:trojan-activity; sid:34461; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Linux.Downloader.Mumblehard variant outbound connection";
flow:to_server,established; urilen:1; content:"User-Agent: Mozilla/5.0 (Windows NT
6.1|3B| rv:7.0.1) Gecko/20100101 Firefox/7.0.1|0D 0A|"; fast_pattern:only;
http_header; content:"Accept: text/html,application/xhtml+xml,application/xml|3B|
q=0.8,*/*|3B|q=0.9|0D 0A|"; http_header; content:"Accept-Language: en-us,en|3B|
q=0.5|0D 0A|"; distance:0; http_header; content:"Accept-Encoding: gzip, deflate|0D
0A|"; distance:0; http_header; content:"Accept-Charset: ISO-8859-1,utf-8|3B|
q=0.7,*|3B|q=0.7|0D 0A|"; distance:0; http_header; content:"Connection: close|0D 0A
0D 0A|"; distance:0; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,virustotal.com/file/84dfe2ac489ba41dfb25166a983ee2d664022bbcc01058c56
a1b1de82f785a43/analysis/1430849540/; classtype:trojan-activity; sid:34462; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR
Win.Backdoor.Wekby Torn variant outbound connection"; flow:established, to_server;
dsize:16; content:"|00 00 00 11 C8 00 00 00 00 00 00 00 00 00 00 00|"; depth:16;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community;
reference:url,www.virustotal.com/en/file/1D6BCF409C85887861D587C8AABFC8C8393EA692FE
93C0A6836BE507A7F75985/analysis/; classtype:trojan-activity; sid:34500; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Backdoor.Wekby
Torn variant outbound connection"; flow:established, to_server; dsize:16;
content:"|00 00 00 11 D0 00 00 00|"; depth:8; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/1D6BCF409C85887861D587C8AABFC8C8393EA692FE
93C0A6836BE507A7F75985/analysis/; classtype:trojan-activity; sid:34501; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"/popkx3/popi.html"; fast_pattern:only; http_uri; content:"User-Agent:
Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A 0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/d6beeae945d570d98784bdea68310ddef17f4a0353
4632dec48c691677c67402/analysis/; classtype:trojan-activity; sid:34622; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user agent - EMERY - Win.Trojan.W97M"; flow:to_server,established;
content:"User-Agent|3A 20|EMERY|0D 0A|"; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/d0f0a446162c6dafc58e4034f4879275d3766f2033
6b6998cb5a5779d995a243/analysis/; classtype:trojan-activity; sid:34843; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
Metasploit Meterpreter reverse HTTPS certificate"; flow:to_client,established;
content:"|16 03 03|"; content:"|0B|"; within:1; distance:2; content:"|30 82|";
within:2; distance:9; content:"|30 82|"; within:2; distance:2; content:"|A0 03 02
01 02 02|"; within:6; distance:2; content:"|30 0D 06 09 2A 86 48 86 F7 0D 01 01|";
within:22; content:"|31|"; within:1; distance:5; content:"|30|"; within:1;
distance:1; content:"|06 03 55 04 03 0C|"; within:6; distance:1; content:"|30|";
within:10; distance:3; content:"|17 0D|"; within:2; distance:1; content:"Z|17 0D|";
within:3; distance:12; content:"Z|30|"; within:2; distance:12; content:"|31|";
within:1; distance:1; content:"|30|"; within:1; distance:1; content:"|06 03 55 04
03 0C|"; within:6; distance:1; content:"|30 82|"; within:9; distance:2; content:"|
30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82|"; within:17; distance:2;
content:"|30 82|"; within:2; distance:3; content:"|02 82|"; within:2; distance:2;
content:"|02 03 01 00 01 A3 0D 30 0B 30 09 06 03 55 1D 13 04 02 30 00 30 0D 06 09
2A 86 48 86 F7 0D 01 01 0B 05 00|"; fast_pattern:only; metadata:ruleset community,
service ssl; reference:url,blog.didierstevens.com; classtype:misc-activity;
sid:34864; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Rovnix variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/vbulletin/post.php?qu="; fast_pattern:only;
http_uri; content:!"User-Agent:"; http_header; content:!"Accept"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/a184775757cf30f9593977ee0344cd6c54deb4b14a
012a7af8e3a2cdbb85a749/analysis/; classtype:trojan-activity; sid:34868; rev:1;)
alert tcp $EXTERNAL_NET 21 -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Critroni
certificate exchange"; flow:to_client,established; content:"|00 D3 62 47 DA 62 4A
A1 34|"; content:"|3B 02 49 86 4B DF D7 D7 6C E2 2F 36 81 01 24 3F|"; within:400;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service ssl;
reference:url,www.virustotal.com/en/file/af7a9f581653394955bec5cf10a7dbafbf64f42d09
918807274b5d25849a1251/analysis/; classtype:trojan-activity; sid:34917; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bancos variant outbound connection"; flow:to_server,established;
content:"ID_MAQUINA="; fast_pattern:only; http_client_body; content:"&VERSAO=";
nocase; http_client_body; content:"&WIN="; within:50; nocase; http_client_body;
content:"&NAVEGADOR="; within:200; nocase; http_client_body; content:"&PLUGIN=";
within:50; nocase; http_client_body; content:"&AV="; within:50; nocase;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/7816d2b6507950177cf1af596744abe523cad492f4
d78e230962602b1b269044/analysis/; classtype:trojan-activity; sid:34931; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Prok variant outbound connection"; flow:to_server,established;
content:"/prok/"; http_uri; content:"Content-Type: multipart/form-data,
boundary=7DF051D"; fast_pattern:only; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/ada4a63abae42266f9d472f1d4ebd0bd22702270f8
b38ad7a824a16ce449ea2b/analysis/; classtype:trojan-activity; sid:34950; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Androm variant outbound connection"; flow:to_server,established;
urilen:16; content:"POST"; http_method; content:"/forum/image.php";
fast_pattern:only; http_uri; content:"|0D 0A|User-Agent: Mozilla/4.0|0D 0A|";
http_header; content:"|0D 0A|Content-Type: application/x-www-form-urlencoded|0D
0A|"; http_header; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/38c7d403660c98ceb0246192d7d89cd66e126c6721
008f6b347d4d53b4dc063b/analysis/; classtype:trojan-activity; sid:34958; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.SpyBanker variant outbound connection"; flow:to_server,established;
content:"texto=%0D%0A"; depth:12; http_client_body; content:"/consulta"; http_uri;
content:"User-Agent: Mozilla/3.0 (compatible|3B| Indy Library)|0D 0A 0D 0A|";
fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/33b598e185ba483c5c1571651a03b90359fb1f56b5
5e902c7038baf315c5dad9/analysis/; classtype:trojan-activity; sid:34959; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
Win.Adware.Sendori user-agent detection"; flow:to_server,established;
content:"User-Agent|3A 20|Sendori-Client-Win32"; fast_pattern:only; http_header;
metadata:ruleset community, service http;
reference:url,www.virustotal.com/en/file/26ee215c531b6c50d28ef9b9a48db05b08139e460b
997167de1813484beb7a9e/analysis/; classtype:misc-activity; sid:34964; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banbra variant outbound connection"; flow:to_server,established;
urilen:43; content:"/imagens/nacional/new/1/2/3/br/contador.php";
fast_pattern:only; http_uri; content:"User-Agent: Mozilla/5.0 (Windows NT 6.1|3B|
WOW64|3B| rv:12.0) Gecko/20100101 Firefox/12.0"; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/078f4f7bbd0a7fc3f1934a4988997e9f3b69ca8b9d
c1bfd37a6c85b44fb50b48/analysis/; classtype:trojan-activity; sid:34994; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banbra HTTP Header Structure"; flow:to_server,established; content:"|0D
0A|Accept: text/html, */*|0D 0A|Accept-Encoding: identity|0D 0A|User-Agent:
Mozilla/5.0 (Windows NT 6.1|3B| WOW64|3B| rv:12.0) Gecko/20100101 Firefox/12.0|0D
0A 0D 0A|"; fast_pattern:only; http_header; content:".php HTTP/1.1|0D 0A|Content-
Type: text/html|0D 0A|Host: "; content:".php"; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/078f4f7bbd0a7fc3f1934a4988997e9f3b69ca8b9d
c1bfd37a6c85b44fb50b48/analysis/; classtype:trojan-activity; sid:34995; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Agent-ALPW variant outbound connection"; flow:to_server,established;
content:"|0D 0A|Accept: text/html, */*|0D 0A|Accept-Encoding: identity|0D 0A|User-
Agent: Mozilla/5.0 (Windows NT 6.1|3B| WOW64|3B| rv:12.0) Gecko/20100101
Firefox/12.0|0D 0A 0D 0A|"; fast_pattern:only; http_header; content:"A="; depth:2;
http_client_body; content:".php"; http_uri; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/6452bea82dbef796eaed8d2403ffa7141e4379bb05
2fdb7b63a21400c04b0334/analysis/; classtype:trojan-activity; sid:34996; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Graftor
variant HTTP Response"; flow:to_client,established; dsize:<54; content:"HTTP/1.1
200 OK|0D 0A|Content-Length: "; content:"|0D 0A 0D 0A|session:"; within:15;
fast_pattern; pcre:"/\r\n\r\nsession\x3a\d{1,7}$/"; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/1ed49a78ee46c4a0d2eeb3b9ab707b40d3c87448c6
f399d7fceefc0c16c66d38/analysis/; classtype:trojan-activity; sid:34997; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established; urilen:9;
content:"/diff.php"; fast_pattern:only; http_uri; content:"|0D 0A|User-Agent:
Mozilla/4.0|0D 0A|"; http_header; content:"|0D 0A|Content-Type: application/octet-
stream|0D 0A|"; http_header; content:"|A0 CD 37 A4 5B|"; depth:5; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/a7009a6ed3ff0191e3c8e7f8b27b9b16afe2a82d1e
b131ecd27d8f8a5b17e819/analysis/1433243075/; classtype:trojan-activity; sid:35030;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Zusy
variant outbound connection"; flow:to_server,established; urilen:21;
content:"POST"; http_method; content:"/siganofi/rounder.php"; fast_pattern:only;
http_uri; content:"Cache-Control: no-cache"; http_header; content:"Pragma|3A| no-
cache|0D 0A|"; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.www.virustotal.com/en/file/857ae380e297f840b88146ec042286ef459a1c
4dc53680b117a9677b189e6c68/analysis/; classtype:trojan-activity; sid:35076; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Ursnif outbound connection"; flow:to_server,established;
content:"/photoLibrary/?user="; http_uri; content:"&ver="; http_uri;
content:"&os2="; fast_pattern:only; http_uri; content:"&type="; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,malware.dontneedcoffee.com/2015/07/a-fileless-ursnif-doing-some-
pos.html; classtype:trojan-activity; sid:35312; rev:3;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Cryptowall click fraud response"; flow:to_client,established; file_data;
content:"2|7C|http://"; depth:9; content:"/search.php|7C|http://"; within:60;
content:"|7C|Mozilla/4.0 "; within:100; content:"/r.php?key="; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/3b78dd891a81c18cffa5031e52f9c2329e2986ba83
c5c75a67dc4ae3d1f0bec3/analysis/; classtype:trojan-activity; sid:35344; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Elise.B variant outbound connection"; flow:to_server,established;
content:"User-Agent|3A 20|Mozilla/4.0 (compatible|3B| MSIE 8.0)";
fast_pattern:only; http_header; urilen:28; content:"/page_"; depth:6; offset:9;
nocase; http_uri; content:".html"; within:5; distance:8; nocase; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/9a226eeae1fc51a2bc2e72b098d5654238d0cc8eae
29c0cdaacb49ae9d997d04/analysis/; classtype:trojan-activity; sid:35353; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bedep initial outbound connection"; flow:to_server,established;
content:"protocolVersion|22|"; offset:2; http_client_body; content:"|22|rev|22|";
within:10; http_client_body; content:"|22|buildId|22|"; within:15;
http_client_body; content:"|22|tags|22 3A|"; distance:0; http_client_body;
content:"|22|type|22 3A 22|"; within:10; http_client_body; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,malware.dontneedcoffee.com/2015/07/a-fileless-ursnif-doing-
some-pos.html; classtype:trojan-activity; sid:35386; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Andromeda initial outbound connection"; flow:to_server,established;
content:"/forum.php"; depth:10; http_uri; content:"User-Agent|3A 20|Mozilla/4.0|0D
0A|"; fast_pattern:only; http_header; content:!"Accept"; http_header;
content:!"Referer"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,malware.dontneedcoffee.com/2015/07/a-fileless-ursnif-doing-some-
pos.html; classtype:trojan-activity; sid:35387; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Andromeda download request"; flow:to_server,established; content:".mod";
http_uri; pcre:"/[a-z]{2}_[a-z0-9]{8}\.mod/Ui"; content:"User-Agent|3A 20|
Mozilla/4.0|0D 0A|"; fast_pattern:only; http_header; content:!"Accept";
http_header; content:!"Referer"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,malware.dontneedcoffee.com/2015/07/a-fileless-ursnif-doing-some-
pos.html; classtype:trojan-activity; sid:35388; rev:1;)
# alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.TorrentLocker/Teerac self-signed certificate";
flow:to_client,established; ssl_state:server_hello; content:"|16 03 01 00 51 02|";
content:"|55 04 06 13 02|XX"; fast_pattern:only; content:"|55 04 07 0C 0C|Default
City"; content:"|55 04 0A 0C 13|Default Company Ltd"; distance:6;
metadata:impact_flag red, ruleset community, service ssl;
reference:url,www.virustotal.com/en/file/4072beeaf09fe6fef48365f1c14fd800e21b32cfa2
af561f515bc45372dd590d/analysis/; classtype:trojan-activity; sid:35393; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.TorrentLocker/Teerac payment page request"; flow:to_server,established;
content:".php?user_code="; http_uri; content:"&user_pass="; fast_pattern:only;
http_uri; content:"Referer|3A|"; http_header; content:"tor"; within:30; nocase;
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/4072beeaf09fe6fef48365f1c14fd800e21b32cfa2
af561f515bc45372dd590d/analysis/; classtype:trojan-activity; sid:35394; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established;
urilen:10; content:"/order.php"; http_uri; content:"|0D 0A|User-Agent: Mozilla/4.0|
0D 0A|"; http_header; content:"|0D 0A|Content-Type: application/octet-stream|0D
0A|"; http_header; content:"|A0 CD 37 A4 5B|"; depth:5; fast_pattern;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/a7009a6ed3ff0191e3c8e7f8b27b9b16afe2a82d1e
b131ecd27d8f8a5b17e819/analysis/1433243075/; classtype:trojan-activity; sid:35549;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Potao outbound connection"; flow:to_server,established; content:"|3C|
methodName|3E|10a7d030-1a61-11e3-beea-001c42e2a08b|3C 2F|methodName|3E|";
fast_pattern:only; http_client_body; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/c66955f667e9045ea5591ebf9b59246ad86227f174
ea817d1398815a292b8c88/analysis/; classtype:trojan-activity; sid:35733; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
WNDR4700 and R6200 admin interface authentication bypass attempt";
flow:to_server,established; content:"/BRS_03B_haveBackupFile_fileRestore.html";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,59406; reference:cve,2013-3071; classtype:attempted-admin;
sid:35734; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
Wild Neutron potential exploit attempt"; flow:to_server,established; urilen:>25;
content:".swf?"; http_uri; content:"styleid="; distance:0; http_uri;
content:"&langid="; distance:0; http_uri; content:"&sid="; distance:0; http_uri;
content:"&d="; distance:0; http_uri; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:url,securelist.com/blog/research/71275/wild-neutron-
economic-espionage-threat-actor-returns-with-new-tricks/; classtype:trojan-
activity; sid:35745; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Zeus variant outbound connection"; flow:to_server,established;
urilen:11; content:"/atomic.php"; fast_pattern:only; http_uri; content:"|0D 0A|
User-Agent: Mozilla/4.0|0D 0A|"; http_header; content:"|A0 CD 37 A4 5B|"; depth:5;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/a7009a6ed3ff0191e3c8e7f8b27b9b16afe2a82d1e
b131ecd27d8f8a5b17e819/analysis/; classtype:trojan-activity; sid:35746; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.IsSpace outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/SNews.asp?HostID="; fast_pattern:only;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http; reference:url,publicintelligence.net/fbi-
hack-tools-opm/; classtype:trojan-activity; sid:35749; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.IsSpace initial outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/STTip.asp"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,publicintelligence.net/fbi-hack-
tools-opm/; classtype:trojan-activity; sid:35750; rev:3;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"FILE-IDENTIFY JPEG file
upload detected"; flow:to_server,established; file_data; content:"|FF D8 FF E1|";
depth:4; flowbits:set,file.jpeg; flowbits:noalert; metadata:ruleset community,
service http; classtype:misc-activity; sid:35852; rev:6;)
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"FILE-IDENTIFY OLE
Document upload detected"; flow:to_server,established; file_data; content:"Content-
Disposition|3A|"; nocase; content:"Form-data|3B|"; within:20; nocase; content:"|D0
CF 11 E0 A1 B1 1A E1|"; within:200; fast_pattern; flowbits:set,file.ole;
flowbits:noalert; metadata:ruleset community, service http; classtype:misc-
activity; sid:36058; rev:7;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bagsu variant outbound connection"; flow:to_server,established;
content:"/rp?v="; fast_pattern:only; http_uri; content:!"User-Agent:"; http_header;
content:"&u="; http_uri; content:"&c="; within:3; distance:32; http_uri;
content:"&f="; distance:0; http_uri; content:"&a="; distance:0; http_uri;
content:"&d="; distance:0; http_uri; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/049bc9beeba4acd2a558dc695f65ad284b0ae1ff89
f69a38f743510d6ab640c0/analysis; classtype:trojan-activity; sid:36064; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bagsu variant outbound connection"; flow:to_server,established;
content:"/offers_new?v="; fast_pattern:only; http_uri; content:!"User-Agent";
http_header; content:"&a="; http_uri; content:"&i="; distance:0; http_uri;
content:"&f="; distance:0; http_uri; content:"&u="; distance:0; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/049bc9beeba4acd2a558dc695f65ad284b0ae1ff89
f69a38f743510d6ab640c0/analysis; classtype:trojan-activity; sid:36065; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Bagsu variant outbound connection"; flow:to_server,established;
content:"User-Agent: Mozilla/4.0 (compatible|3B| MyApp)|0D 0A 0D 0A|";
fast_pattern:only; http_header; content:"windows="; depth:8; http_client_body;
content:"&av="; within:50; http_client_body; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/1fbe27602da7de2ce95254ffd409f7063517937135
4b4914997de273f6be9422/analysis/; classtype:trojan-activity; sid:36066; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.FakeAV variant outbound connection"; flow:to_server,established;
content:"/purchase.php?a="; fast_pattern:only; http_uri; content:"&v="; http_uri;
content:"&u="; distance:0; http_uri; content:"&bgload="; within:8; distance:32;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/f4c10d33b8c46cc7922a6eebc9f14858a01b2f573e
e99dd1dc02a4534b537e18/analysis; classtype:trojan-activity; sid:36107; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Nimisi variant outbound connection"; flow:to_server,established;
content:!"User-Agent"; http_header; content:"/logs.php?&prog="; fast_pattern:only;
http_uri; content:"&url="; http_uri; content:"&user="; distance:0; http_uri;
content:"&pass="; distance:0; http_uri; content:"&comp="; distance:0; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/a1f8f8b509001e5bca811a168455a89517000a2534
d271018c0c87c6210bd69f/analysis/; classtype:trojan-activity; sid:36108; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Yakes variant dropper"; flow:to_server,established;
content:"/document.php?rnd="; fast_pattern:only; http_uri; content:"&id="; depth:4;
offset:22; http_uri; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/ff0ae81f0dece17baf8480d866c9462c9f3d49be9a
dde8b16f105e244eb31d67/analysis/; classtype:trojan-activity; sid:36202; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
Metasploit Meterpreter reverse HTTPS certificate"; flow:to_client,established;
content:"|16 03 01|"; content:"|0B|"; within:1; distance:2; content:"|30 82|";
within:2; distance:9; content:"|30 82|"; within:2; distance:2; content:"|A0 03 02
01 02 02|"; within:6; distance:2; content:"|30 0D 06 09 2A 86 48 86 F7 0D 01 01|";
within:22; content:"|31|"; within:1; distance:5; content:"|30|"; within:1;
distance:1; content:"|06 03 55 04 03 0C|"; within:6; distance:1;
byte_extract:1,0,string_size,relative; content:"|30|"; within:1;
distance:string_size; content:"|17 0D|"; within:2; distance:1; content:"Z|17 0D|";
within:3; distance:12; content:"Z|30|"; within:2; distance:12; content:"|31|";
within:1; distance:1; content:"|30|"; within:1; distance:1; content:"|06 03 55 04
03 0C|"; within:6; distance:1; byte_extract:1,0,string_size,relative; content:"|30
82|"; within:2; distance:string_size; content:"|30 0D 06 09 2A 86 48 86 F7 0D 01 01
01 05 00 03 82|"; within:17; distance:2; content:"|30 82|"; within:2; distance:3;
content:"|02 82|"; within:2; distance:2; content:"|02 03 01 00 01 A3 0D 30 0B 30 09
06 03 55 1D 13 04 02 30 00 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00|";
fast_pattern:only; metadata:ruleset community, service ssl;
reference:url,blog.didierstevens.com; classtype:misc-activity; sid:36611; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"INDICATOR-COMPROMISE
Metasploit Meterpreter reverse HTTPS certificate"; flow:to_client,established;
content:"|16 03 02|"; content:"|0B|"; within:1; distance:2; content:"|30 82|";
within:2; distance:9; content:"|30 82|"; within:2; distance:2; content:"|A0 03 02
01 02 02|"; within:6; distance:2; content:"|30 0D 06 09 2A 86 48 86 F7 0D 01 01|";
within:22; content:"|31|"; within:1; distance:5; content:"|30|"; within:1;
distance:1; content:"|06 03 55 04 03 0C|"; within:6; distance:1; content:"|30|";
within:10; distance:3; content:"|17 0D|"; within:2; distance:1; content:"Z|17 0D|";
within:3; distance:12; content:"Z|30|"; within:2; distance:12; content:"|31|";
within:1; distance:1; content:"|30|"; within:1; distance:1; content:"|06 03 55 04
03 0C|"; within:6; distance:1; content:"|30 82|"; within:9; distance:2; content:"|
30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82|"; within:17; distance:2;
content:"|30 82|"; within:2; distance:3; content:"|02 82|"; within:2; distance:2;
content:"|02 03 01 00 01 A3 0D 30 0B 30 09 06 03 55 1D 13 04 02 30 00 30 0D 06 09
2A 86 48 86 F7 0D 01 01 0B 05 00|"; fast_pattern:only; metadata:ruleset community,
service ssl; reference:url,blog.didierstevens.com; classtype:misc-activity;
sid:36612; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Potential
hostile executable served from compromised or malicious WordPress site";
flow:to_server,established; content:"/wp-admin/"; http_uri; content:".exe|20|
HTTP/1."; fast_pattern:only; pcre:"/\.exe$/U"; metadata:policy balanced-ips drop,
policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:36914; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kovter outbound connection"; flow:to_server,established;
content:"/counter/?"; fast_pattern:only; http_uri; content:"UA-CPU"; http_header;
content:"MSIE 7.0|3B|"; http_header; content:!"Referer"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,virustotal.com/en/file/e3da9c7f20e7f24891e0dec594dad6d9deebee14515361
1a5c05c69593284a27/analysis/;
reference:url,www.virustotal.com/en/file/9d6b1bd74848dd0549ad3883b7292d3ba0a4fa06d0
aaf562032b0bf6dc198249/analysis/; classtype:trojan-activity; sid:37045; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Chopper web shell connection"; flow:to_server,established;
content:"=@eval(base64_decode($_POST"; fast_pattern:only; http_client_body;
metadata:impact_flag red, ruleset community, service http;
reference:url,informationonsecurity.blogspot.com/2012/11/china-chopper-
webshell.html;
reference:url,www.virustotal.com/en/file/BE24561427D754C0C150272CAB5017D5A2DA64D41B
EC74416B8AE363FB07FD77/analysis/; classtype:trojan-activity; sid:37245; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Vawtrak variant outbound connection"; flow:to_server,established;
content:"/rss/feed/stream"; fast_pattern:only; http_uri; content:"|3F|"; depth:1;
offset:2; http_client_body; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/6ADFAFFEA064A9F89064FBA300CDFCD7634CFD0680
2BF250FA1B070CABFBEBF5/analysis/; classtype:trojan-activity; sid:37467; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.iSpySoft variant outbound connection"; flow:to_server,established;
content:"/Recoveries/Browser.txt"; fast_pattern:only; http_uri; content:!"User-
Agent"; http_header; content:!"Accept"; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/84409422426933e6f1ea227f042ff56d1f66868734
54959d2e3308b9f5daac61/analysis/; classtype:trojan-activity; sid:37521; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.iSpySoft variant outbound connection"; flow:to_server,established;
content:"/Recoveries/Mail.txt"; fast_pattern:only; http_uri; content:!"User-Agent";
http_header; content:!"Accept"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/84409422426933e6f1ea227f042ff56d1f66868734
54959d2e3308b9f5daac61/analysis/; classtype:trojan-activity; sid:37522; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.iSpySoft variant outbound connection"; flow:to_server,established;
content:"/Recoveries/OSKey.txt"; fast_pattern:only; http_uri; content:!"User-
Agent"; http_header; content:!"Accept"; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/84409422426933e6f1ea227f042ff56d1f66868734
54959d2e3308b9f5daac61/analysis/; classtype:trojan-activity; sid:37523; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Engr variant outbound connection"; flow:to_server,established;
urilen:7<>8; content:".php"; http_uri; content:"boundary=Xu02=$";
fast_pattern:only; http_header; content:!"User-Agent"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/54f6600db99fdab31453f3e23e8fb080438cd1ec36
b6fc2868ff86cf88f14bb0/analysis/; classtype:trojan-activity; sid:37552; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Symmi variant dropper download connection"; flow:to_client,established;
file_data; content:"|A6 4D AA E1 65 52 A5 E1 E3 58 76 E1 81 4D A5 E1 CE 48 9C E1 BB
4D A5 E1 CE 48 A9 E1 A1 4D A5 E1|"; fast_pattern:only; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/881bb1538b4d077976cd9b27523cd5af9bd86c0ae3
bce4edf453e74bba9f4c1b/analysis/; classtype:trojan-activity; sid:37646; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Symmi variant outbound connection"; flow:to_server,established;
content:"/vip.jpg"; fast_pattern:only; http_uri; urilen:8; content:"User-Agent:
Mozilla/4.0 (compatible)|0D 0A|"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/881bb1538b4d077976cd9b27523cd5af9bd86c0ae3
bce4edf453e74bba9f4c1b/analysis/; classtype:trojan-activity; sid:37647; rev:1;)
# alert udp any 53 -> $HOME_NET any (msg:"PROTOCOL-DNS glibc getaddrinfo A record
stack buffer overflow attempt"; flow:to_client; dsize:>2000; byte_test:1,&,2,2;
byte_test:1,&,0x80,2; byte_test:1,!&,0x78,2; content:"|00 01|"; depth:2; offset:4;
content:"|00 00 01 00 01|"; fast_pattern:only; metadata:policy max-detect-ips drop,
policy security-ips drop, ruleset community, service dns; reference:cve,2015-7547;
reference:url,googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-
getaddrinfo-stack.html; classtype:attempted-user; sid:37730; rev:5;)
# alert udp any 53 -> $HOME_NET any (msg:"PROTOCOL-DNS glibc getaddrinfo AAAA
record stack buffer overflow attempt"; flow:to_client; dsize:>2000;
byte_test:1,&,2,2; byte_test:1,&,0x80,2; byte_test:1,!&,0x78,2; content:"|00 01|";
depth:2; offset:4; content:"|00 00 1C 00 01|"; fast_pattern:only; metadata:policy
max-detect-ips drop, policy security-ips drop, ruleset community, service dns;
reference:cve,2015-7547;
reference:url,googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-
getaddrinfo-stack.html; classtype:attempted-user; sid:37731; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Dridex dropper variant outbound connection"; flow:to_server,established;
content:"/gt.jpg?"; fast_pattern; http_uri; content:"="; within:1; distance:15;
http_uri; content:"bytes=6433-"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/8a80760f60f42ce5574a8020c08123a6a8fc2a12d2
8e8802f3d5101f72c2ad0c/analysis/; classtype:trojan-activity; sid:37733; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1720 (msg:"POLICY-OTHER Polycom Botnet
inbound connection attempt"; flow:to_server,established; file_data; content:"|03
00|"; depth:2; content:"|08|"; distance:2; content:"|05|"; distance:4;
content:"MERA RTU"; within:100; fast_pattern; metadata:ruleset community;
reference:url,support.polycom.com/global/documents/support/documentation/H_3_2_3_Bo
tnet_Bulletin_v_1_2.pdf; classtype:trojan-activity; sid:37814; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 1720 (msg:"POLICY-OTHER Polycom Botnet
inbound connection attempt"; flow:to_server,established; file_data; content:"|03
00|"; depth:2; content:"|08 02|"; within:2; distance:2; content:"EE|A8 C6|3";
within:80; content:"ooh323"; distance:6; fast_pattern; metadata:ruleset community;
reference:url,support.polycom.com/global/documents/support/documentation/H_3_2_3_Bo
tnet_Bulletin_v_1_2.pdf; classtype:trojan-activity; sid:37815; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kazy variant outbound connection"; flow:to_server,established;
urilen:10; content:"post="; depth:5; fast_pattern; http_client_body;
content:"/index.php"; http_uri; content:!"User-Agent"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/522e5d4ea0771f5c0bc300c2d66a0445a66ae85bd4
b50c21a502365db0a638d9/analysis/; classtype:trojan-activity; sid:37816; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Locky variant outbound connection"; flow:to_server,established;
content:"/lockycrypt.rar"; fast_pattern:only; http_uri; content:!"User-Agent";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/ee6abe4a9530b78e997d9c28394356216778eaf2d4
6aa3503999e7d6bfbefe90/analysis/; classtype:trojan-activity; sid:37834; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Locky variant outbound connection"; flow:to_server,established;
content:"/34gf5y/r34f3345g"; fast_pattern:only; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/ee6abe4a9530b78e997d9c28394356216778eaf2d4
6aa3503999e7d6bfbefe90/analysis/; classtype:trojan-activity; sid:37835; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
malicious file download attempt"; flow:to_server,established; content:"|2F 70 6F
63|"; http_uri; pcre:"/\x2f\x70\x6f\x63(\d*|\x5f[\x61-\x7a]
+)\x2e(\x68\x74\x6d\x6c|\x78(\x6c\x73|\x73\x6c|\x6d\x6c)|\x6a(\x73|\x61\x76a)|\x61\
x73\x70|\x70(\x64f|\x70\x74|\x48\x70|\x73\x64)|\x66\x6c\x76|\x73\x77\x66|\x64\x6fc|
\x74\x74\x66|\x62\x6d\x70|\x6d(\x70\x33|\x33\x75))/Ui"; metadata:policy max-detect-
ips drop, ruleset community, service http; classtype:misc-activity; sid:37963;
rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win-
Linux.Trojan.Derusbi variant outbound connection"; flow:to_server,established;
content:"User-Agent|3A 20|Mozilla/4.0|0D 0A|"; fast_pattern:only; http_header;
content:"Pragma|3A 20|no-cache"; http_header; content:"Proxy-Connection|3A 20|Keep-
Alive|0D 0A|"; http_header; content:"POST"; http_method;
content:"/photos/photo.asp"; http_uri; content:!"Referer"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.fidelissecurity.com/sites/default/files/TA_Fidelis_Turbo_1602%283
%29.pdf; classtype:trojan-activity; sid:38255; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win-
Linux.Trojan.Derusbi variant outbound connection"; flow:to_server,established;
content:"CONNECT"; http_method; content:"User-Agent|3A 20|Mozilla/4.0|0D 0A|";
fast_pattern:only; http_header; content:"Pragma|3A 20|no-cache"; http_header;
content:"Proxy-Connection|3A 20|Keep-Alive|0D 0A|"; http_header; content:"Accept:
*/*"; http_header; content:"Accept-Encoding|3A| identity"; http_header;
content:!"Referer"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.fidelissecurity.com/sites/default/files/TA_Fidelis_Turbo_1602%283
%29.pdf; classtype:trojan-activity; sid:38256; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win-
Linux.Trojan.Derusbi variant outbound connection"; flow:to_server,established;
content:"User-Agent|3A 20|Mozilla/4.0 (compatible|3B| MSIE 6.0|3B| Windows NT 5.1)|
0D 0A|"; fast_pattern:only; http_header; content:"Pragma|3A 20|no-cache";
http_header; content:"Cache-Control|3A 20|no-cache"; http_header; content:"GET";
http_method; content:"/Query.asp?loginid="; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.fidelissecurity.com/sites/default/files/TA_Fidelis_Turbo_1602%283
%29.pdf; classtype:trojan-activity; sid:38257; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win/Linux.Trojan.Derusbi variant outbound connection"; flow:to_server,established;
content:"User-Agent|3A 20|Mozilla/4.0 (compatible|3B| MSIE 6.0|3B| Windows NT 5.1)|
0D 0A|"; fast_pattern:only; http_header; content:"Pragma|3A 20|no-cache";
http_header; content:"Cache-Control|3A 20|no-cache"; http_header; content:"POST";
http_method; content:"/login1.asp"; http_uri; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.fidelissecurity.com/sites/default/files/TA_Fidelis_Turbo_1602%283
%29.pdf; classtype:trojan-activity; sid:38258; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Locky variant outbound connection"; flow:to_server,established;
content:"POST"; http_method; content:"/main.php"; fast_pattern:only; http_uri;
urilen:9,norm; content:!"|0D 0A|Accept|2D|Language|3A|"; http_header; content:!"|0D
0A|Referer|3A|"; http_header; content:!"|0D 0A|Cookie|3A|"; http_header;
content:"Content-Length|3A 20|"; http_raw_header;
byte_test:10,>,95,0,relative,string,dec; byte_test:10,<,115,0,relative,string,dec;
content:"Connection|3A 20|Keep-Alive|0D 0A|Cache-Control|3A 20|no-cache";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/33ab0605b83356e065459559bb81ec5e7464be5630
59fce607760517fedaf603/analysis/; classtype:trojan-activity; sid:38331; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Linux.Trojan.Bifrose outbound connection"; flow:to_server; content:"|9B 4F B0 75 E2
76 96 04 5A F1 F9 43 D4 A2 6B|"; depth:15; offset:4; content:"|76 13 85 45 17 1B|";
within:6; distance:1; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0a0d7bed3c8aa0e0e87e484a37e62b0bd0e97981b0
bea55f6f3607316831ba5d/analysis/; classtype:trojan-activity; sid:38333; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NetWiredRC variant connection setup"; flow:to_server,established;
content:"|43 00 00 00 05|"; depth:5; dsize:<80; metadata:impact_flag red, policy
security-ips drop, ruleset community; reference:url,www.circl.lu/pub/tr-23/;
classtype:trojan-activity; sid:38353; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NetWiredRC variant failed read logs"; flow:to_server,established;
content:"|01 00 00 00 3C|"; depth:5; dsize:5; metadata:impact_flag red, policy
security-ips drop, ruleset community; reference:url,www.circl.lu/pub/tr-23/;
classtype:trojan-activity; sid:38354; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NetWiredRC variant keepalive"; flow:to_server,established; content:"|01
00 00 00 01|"; depth:5; dsize:5; metadata:impact_flag red, ruleset community;
reference:url,www.circl.lu/pub/tr-23/; classtype:trojan-activity; sid:38355;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NetWiredRC variant send credentials"; flow:to_server,established;
content:"|01 00 00 00 3D|"; depth:5; dsize:5; metadata:impact_flag red, policy
security-ips drop, ruleset community; reference:url,www.circl.lu/pub/tr-23/;
classtype:trojan-activity; sid:38357; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NetWiredRC variant send mail credentials"; flow:to_server,established;
content:"|01 00 00 00 41|"; depth:5; dsize:<10; metadata:impact_flag red, policy
security-ips drop, ruleset community; reference:url,www.circl.lu/pub/tr-23/;
classtype:trojan-activity; sid:38359; rev:1;)
alert tcp $EXTERNAL_NET 4043 -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Dridex
certificate exchange"; flow:to_client,established; content:"|16 03|"; content:"|
0B|"; distance:3; content:"|55 04 07 0C 06|Lisbon"; content:"|55 04 0A 0C 10|Souppi
Otiop SEM"; distance:6; content:"|55 04 03 0C 0E|wthcethesmw.ph";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service ssl;
reference:url,www.virustotal.com/en/file/f4bf52759270fa4fc4e5745d51dd8d73b49feae9de
5bedfd8f4e0a865e8047c4/analysis/1459264179/; classtype:trojan-activity; sid:38378;
rev:1;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Dridex file download attempt"; flow:to_client,established; file_data;
content:"FeintedEscalator"; fast_pattern:only; content:"InkingGrange";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service ftp-data, service http, service imap, service pop3;
reference:url,www.virustotal.com/en/file/f4bf52759270fa4fc4e5745d51dd8d73b49feae9de
5bedfd8f4e0a865e8047c4/analysis/1459264179/; classtype:trojan-activity; sid:38379;
rev:1;)
alert tcp $HOME_NET any -> $SMTP_SERVERS 25 (msg:"MALWARE-CNC Win.Trojan.Dridex
file download attempt"; flow:to_server,established; file_data;
content:"FeintedEscalator"; fast_pattern:only; content:"InkingGrange";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service smtp;
reference:url,www.virustotal.com/en/file/f4bf52759270fa4fc4e5745d51dd8d73b49feae9de
5bedfd8f4e0a865e8047c4/analysis/1459264179/; classtype:trojan-activity; sid:38380;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 21 (msg:"MALWARE-CNC
Win.Trojan.FTPKeyLogger outbound connection"; flow:to_server,established;
content:"USER [email protected]|0D 0A|"; fast_pattern:only; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
ftp;
reference:url,www.virustotal.com/en/file/44f956d41f5aea97884f88f60c1e28dc246b4b7318
a87b332367e7f0476ca8fc/analysis/1459279340/; classtype:trojan-activity; sid:38385;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 21 (msg:"MALWARE-CNC
Win.Trojan.FTPKeyLogger outbound connection"; flow:to_server,established;
content:"PASS Goodman1986|0D 0A|"; fast_pattern:only; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service ftp;
reference:url,www.virustotal.com/en/file/44f956d41f5aea97884f88f60c1e28dc246b4b7318
a87b332367e7f0476ca8fc/analysis/1459279340/; classtype:trojan-activity; sid:38386;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET 21 (msg:"MALWARE-CNC
Win.Trojan.FTPKeyLogger outbound connection"; flow:to_server,established;
content:"STOR Screenshot from|3A 20|"; fast_pattern; content:"|29|.png"; within:80;
metadata:impact_flag red, ruleset community, service ftp;
reference:url,www.virustotal.com/en/file/44f956d41f5aea97884f88f60c1e28dc246b4b7318
a87b332367e7f0476ca8fc/analysis/1459279340/; classtype:trojan-activity; sid:38387;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.FTPKeyLogger geolocation check"; flow:to_server,established; urilen:16;
content:"/geoip/geoip.php"; fast_pattern:only; http_uri; content:!"Accept";
http_header; content:!"User-Agent"; http_header; content:!"Referer"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/44f956d41f5aea97884f88f60c1e28dc246b4b7318
a87b332367e7f0476ca8fc/analysis/1459279340/; classtype:trojan-activity; sid:38388;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Boaxxe variant outbound connection"; flow:to_server,established;
content:"|7C 7C|CM01|7C|CM02|7C|CM03|7C|"; fast_pattern:only; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/efd9036e675507da76cd0946408aedb814aff9da62
d23de4f0680a4e7186a75c/analysis/1460471360/; classtype:trojan-activity; sid:38509;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.iSpySoft variant exfiltration attempt"; flow:to_server,established;
urilen:11; content:"POST"; http_method; content:"/api?upload"; fast_pattern:only;
http_uri; content:"Expect|3A 20|"; http_header; content:!"User-Agent"; http_header;
content:!"Accept"; http_header; content:!"Referer"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/146889acc9c4a5dbda2de339320159560567b14f84
6653df727284076f092e63/analysis/1460466642/; classtype:trojan-activity; sid:38510;
rev:1;)
alert udp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Sweeper
outbound connection"; flow:to_server,no_stream; dsize:9; content:"hi00";
fast_pattern:only; pcre:"/hi00[0-9]{5}/"; detection_filter:track by_src, count
1000, seconds 1; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/38221267218184b17a78d8814d1bd06b12143be859
488ae15ca0d754f32d60fc/analysis/1460472611/; classtype:trojan-activity; sid:38514;
rev:3;)
alert udp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Sweeper
outbound connection"; flow:to_server,no_stream; dsize:24; content:"|39 64 30 33 66
65 66 35 30 30 62 39 30 30 34 36 32 37 31 31 30 33 32 35|"; fast_pattern:only;
detection_filter:track by_src, count 1000, seconds 1; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/38221267218184b17a78d8814d1bd06b12143be859
488ae15ca0d754f32d60fc/analysis/1460472611/; classtype:trojan-activity; sid:38515;
rev:3;)
alert udp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Sweeper
outbound connection"; flow:to_server,no_stream; dsize:24; content:"|61 63 36 62 66
34 64 30 66 35 36 30 30 30 34 36 32 37 31 31 30 33 39 39|"; fast_pattern:only;
detection_filter:track by_src, count 1000, seconds 1; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/38221267218184b17a78d8814d1bd06b12143be859
488ae15ca0d754f32d60fc/analysis/1460472611/; classtype:trojan-activity; sid:38516;
rev:3;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-CNC binary
download while video expected"; flow:to_client,established; content:"Content-Type|
3A 20|video/quicktime|0D 0A 0D 0A|"; http_header; file_data; content:"MZ";
within:2; byte_jump:4,58,relative,little; content:"PE|00 00|"; within:4; distance:-
64; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service ftp-data, service http, service imap, service pop3;
reference:url,www.virustotal.com/en/file/38221267218184b17a78d8814d1bd06b12143be859
488ae15ca0d754f32d60fc/analysis/1460472611/; classtype:trojan-activity; sid:38517;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.GateKeylogger outbound connection"; flow:to_server,established;
content:"/News/gate.php"; fast_pattern:only; http_uri; content:"Connection|3A 20|
Keep-Alive"; http_header; content:!"Accept"; http_header; content:!"Content-Type";
http_header; content:"User-Agent|3A 20|"; http_header; pcre:"/User-Agent\x3a\x20[A-
F0-9]{32}\x0d\x0a/H"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/77c802db1731fa8dae1b03d978f89b046309adfa12
37b1497a69ccb9c2d82c16/analysis/1459520578/; classtype:trojan-activity; sid:38557;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.GateKeylogger outbound connection"; flow:to_server,established;
content:"/News/gate.php"; fast_pattern:only; http_uri; content:"="; depth:4;
http_client_body; content:"User-Agent|3A 20|"; http_header; pcre:"/User-
Agent\x3a\x20[A-F0-9]{32}\x0d\x0a/H"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/77c802db1731fa8dae1b03d978f89b046309adfa12
37b1497a69ccb9c2d82c16/analysis/1459520578/; classtype:trojan-activity; sid:38558;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.GateKeylogger outbound connection - keystorkes";
flow:to_server,established; content:"/News/gate.php?"; fast_pattern:only; http_uri;
content:"<br><br><b><big>"; http_client_body; pcre:"/\/News\/gate\.php\x3f[a-f0-9]
{32}\x3d\d/Ui"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/77c802db1731fa8dae1b03d978f89b046309adfa12
37b1497a69ccb9c2d82c16/analysis/1459520578/; classtype:trojan-activity; sid:38559;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.GateKeylogger outbound connection - screenshot";
flow:to_server,established; content:"/News/gate.php?"; fast_pattern:only; http_uri;
content:"JFIF"; http_client_body; pcre:"/\/News\/gate\.php\x3f[a-f0-9]
{32}\x3d\d/Ui"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/77c802db1731fa8dae1b03d978f89b046309adfa12
37b1497a69ccb9c2d82c16/analysis/1459520578/; classtype:trojan-activity; sid:38560;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.GateKeylogger plugins download attempt"; flow:to_server,established;
content:".p HTTP/1.1"; fast_pattern:only; content:"/plugins/"; http_uri;
pcre:"/\/plugins\/[a-z]{3,10}\.p/Ui"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/77c802db1731fa8dae1b03d978f89b046309adfa12
37b1497a69ccb9c2d82c16/analysis/1459520578/; classtype:trojan-activity; sid:38561;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.GateKeylogger initial exfiltration attempt"; flow:to_server,established;
content:"/gate.php"; fast_pattern:only; content:"pc="; nocase; http_client_body;
content:"&admin="; distance:0; nocase; http_client_body; content:"&os=";
distance:0; nocase; http_client_body; content:"&hid="; distance:0; nocase;
http_client_body; content:"&arc="; distance:0; nocase; http_client_body;
content:"User-Agent|3A 20|"; http_header; pcre:"/User-Agent\x3a\x20[A-F0-9]
{32}\x0d\x0a/H"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/77c802db1731fa8dae1b03d978f89b046309adfa12
37b1497a69ccb9c2d82c16/analysis/1459520578/; classtype:trojan-activity; sid:38562;
rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.GateKeylogger fake 404 response"; flow:to_client,established; file_data;
content:"200"; http_stat_code; content:"OK"; http_stat_msg; content:">404 Not
Found<"; fast_pattern:only; content:" requested URL / was not found ";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/77c802db1731fa8dae1b03d978f89b046309adfa12
37b1497a69ccb9c2d82c16/analysis/1459520578/; classtype:trojan-activity; sid:38563;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.GateKeylogger keylog exfiltration attempt"; flow:to_server,established;
content:"/post.php?"; fast_pattern:only; http_uri; content:"pl="; http_uri;
content:"&education="; distance:0; http_uri; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/77c802db1731fa8dae1b03d978f89b046309adfa12
37b1497a69ccb9c2d82c16/analysis/1459520578/; classtype:trojan-activity; sid:38564;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Sweeper variant dropper initial download attempt";
flow:to_server,established; content:"HEAD"; http_method; content:".bin";
fast_pattern:only; content:"User-Agent|3A 20|Microsoft BITS"; http_header;
content:"Accept-Encoding|3A 20|identity|0D 0A|"; content:!"Content-Length";
http_header; pcre:"/\/[a-f0-9]{32}\/\w+\.bin/U"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/70e6df66c76700afef596e2dd7c956f4f476acca5b
935b3f067084241638d182/analysis/1460636221/; classtype:trojan-activity; sid:38565;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Sweeper variant dropper download attempt"; flow:to_server,established;
content:".bin"; fast_pattern:only; content:"User-Agent|3A 20|Microsoft BITS";
http_header; content:"Accept-Encoding|3A 20|identity|0D 0A|"; content:"If-
Unmodified-Since"; http_header; content:"Range"; http_header; pcre:"/\/[a-f0-9]
{32}\/\w+\.bin/U"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/70e6df66c76700afef596e2dd7c956f4f476acca5b
935b3f067084241638d182/analysis/1460636221/; classtype:trojan-activity; sid:38566;
rev:1;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE RFT
document malformed header"; flow:to_client,established; flowbits:isset,file.rtf;
file_data; content:"|7B 5C|rtvpn"; depth:7; metadata:policy balanced-ips drop,
policy max-detect-ips drop, policy security-ips drop, ruleset community, service
ftp-data, service http, service imap, service pop3; reference:cve,2015-1641;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033;
classtype:attempted-user; sid:38580; rev:2;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE RFT document
malformed header"; flow:to_server,established; flowbits:isset,file.rtf; file_data;
content:"|7B 5C|rtvpn"; depth:7; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service smtp;
reference:cve,2015-1641; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms15-033; classtype:attempted-user; sid:38581; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.DFSCook variant JS dropper outbound connection";
flow:to_server,established; content:"/img/script.php?"; fast_pattern:only;
content:"Accept|3A 20|*/*|0D 0A|"; http_header; content:"UA-CPU|3A 20|";
http_header; content:!"Referer"; http_header; content:!"Accept-Language";
http_header; pcre:"/\/img\/script\.php\x3f.*\.mov$/Ui"; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/7a32e9d01e66f68461e410a29e38e147fb8a3d3695
f1e55f4cf0d2ad789d5b2d/analysis/1460564508/; classtype:trojan-activity; sid:38584;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.DFSCook variant outbound connection"; flow:to_server,established;
urilen:139<>200,norm; content:"/wp-includes.php?d="; fast_pattern:only;
content:"Accept|3A 20|*/*|0D 0A|"; http_header; content:"Connection|3A 20|close|0D
0A|"; content:!"User-Agent"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/7a32e9d01e66f68461e410a29e38e147fb8a3d3695
f1e55f4cf0d2ad789d5b2d/analysis/1460564508/; classtype:trojan-activity; sid:38585;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.DFSCook variant outbound connection"; flow:to_server,established;
urilen:>180,norm; content:"/api.php?d="; fast_pattern:only; http_uri;
content:"Accept|3A 20|*/*|0D 0A|"; http_header; content:"Connection|3A 20|close|0D
0A|"; http_header; content:!"User-Agent"; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/7a32e9d01e66f68461e410a29e38e147fb8a3d3695
f1e55f4cf0d2ad789d5b2d/analysis/1460564508/; classtype:trojan-activity; sid:38586;
rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Backdoor.DFSCook variant temporary redirect attempt";
flow:to_client,established; content:"307"; http_stat_code; content:"Temporary
Redirect"; http_stat_msg; content:"Set-Cookie|3A 20|DFSCOOK="; fast_pattern:only;
content:"Location: "; content:"/api.php?d="; distance:0; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/7a32e9d01e66f68461e410a29e38e147fb8a3d3695
f1e55f4cf0d2ad789d5b2d/analysis/1460564508/; classtype:trojan-activity; sid:38587;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.DFSCook variant outbound connection"; flow:to_server,established;
urilen:>185,norm; content:".php?d="; fast_pattern:only; http_uri; content:"Accept|
3A 20|*/*"; http_header; content:!"User-Agent"; http_header; content:!"Referer";
pcre:"/\.php\x3fd=[A-F0-9]{174}/U"; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/7a32e9d01e66f68461e410a29e38e147fb8a3d3695
f1e55f4cf0d2ad789d5b2d/analysis/1460564508/; classtype:trojan-activity; sid:38588;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"APP-DETECT Bloomberg
web crawler outbound connection"; flow:to_server,established; content:"User-Agent:
BLP_bbot"; fast_pattern:only; http_header; metadata:ruleset community, service
http; reference:url,irwebreport.com/20110223/bloomberg-bot-strikes-again-
transocean-earnings-leaked; classtype:misc-activity; sid:38594; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.UP007 variant outbound connection"; flow:to_server,established;
urilen:10; content:"/index.asp"; fast_pattern:only; http_uri; content:"User-Agent|
3A 20|Mozilla/4.0 (compatible|3B| MSIE 7.0|3B| Windows NT 5.1|3B|)"; http_header;
content:"Accept-Language|3A 20|en-us|0D 0A|"; http_header; content:"UP007";
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,citizenlab.org/2016/04/between-hong-kong-and-burma/;
classtype:trojan-activity; sid:38603; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Qakbot variant network speed test"; flow:to_server,established;
content:"/random750x750.jpg?x="; fast_pattern:only; http_uri; content:"&y=";
http_uri; content:"Accept|3A 20|application/x-shockwave-flash, image/gif,
image/jpeg, image/pjpeg, */*|0D 0A|"; http_header; content:"Cache-Control|3A 20|no-
cache|0D 0A|"; http_header; content:!"Accept-"; http_header; content:!"Referer";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/1826dba769dad9898acd95d6bd026a0b55d0a093a2
67b481695494f3ab547088/analysis/1461598351/; classtype:trojan-activity; sid:38606;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Qakbot variant outbound connection"; flow:to_server,established;
urilen:30<>35,norm; content:"btst="; http_cookie; content:"snkz="; http_cookie;
content:"Accept|3A 20|application/x-shockwave-flash, image/gif, image/jpeg,
image/pjpeg, */*|0D 0A|"; fast_pattern:only; http_header; content:"Cache-Control|3A
20|no-cache|0D 0A|"; http_header; content:!"Connection"; http_header;
content:!"Referer"; http_header; metadata:impact_flag red, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/1826dba769dad9898acd95d6bd026a0b55d0a093a2
67b481695494f3ab547088/analysis/1461598351/; classtype:trojan-activity; sid:38607;
rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.RockLoader variant outbound connection"; flow:to_server,established;
urilen:5; content:"/api/"; fast_pattern:only; http_uri; content:"Content-Type|3A
20|octet-stream"; http_header; content:"Cache-Control|3A 20|no-cache|0D 0A|";
http_header; content:!"User-Agent"; http_header; content:!"Referer"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/d3cd3630b5709535f9bfa59c4ec75c806126298591
9a43a175ec9d7e15c9419a/analysis/1461598531/; classtype:trojan-activity; sid:38608;
rev:1;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Godzilla downloader successful base64 binary download";
flow:to_client,established; content:"GODZILLA="; fast_pattern:only;
content:"GODZILLA="; http_cookie; metadata:impact_flag red, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/f597634ff5e2623baff35d99bfdb2aac1725c9f498
05b4903c13093c43172cb7/analysis/1461593386; classtype:trojan-activity; sid:38610;
rev:2;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"INDICATOR-
COMPROMISE Content-Type text/plain containing Portable Executable data";
flow:to_client,established; content:"Content-Type|3A 20|text/plain"; http_header;
file_data; content:"MZ"; depth:2; byte_jump:4,58,relative,little; content:"PE|00
00|"; within:4; distance:-64; metadata:policy max-detect-ips drop, policy security-
ips alert, ruleset community, service ftp-data, service http, service imap, service
pop3;
reference:url,www.virustotal.com/en/file/fc25709c4e05dbfbcc6ae0cf8a7c06e80156ae0517
9203021838259aeda9801a/analysis/1461600547/; classtype:trojan-activity; sid:38619;
rev:5;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Dridex
certificate exchange"; flow:to_client,established; content:"|16 03|"; content:"|
0B|"; distance:3; content:"|55 04 07 0C 0B|Ouagadougou"; content:"|55 04 0A 0C 16|
Tiongon Wledb A.M.B.A."; distance:6; content:"|55 04 03 0C 10|ina.themanyag.zm";
distance:6; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service ssl;
reference:url,www.virustotal.com/en/file/fc25709c4e05dbfbcc6ae0cf8a7c06e80156ae0517
9203021838259aeda9801a/analysis/1461600547/; classtype:trojan-activity; sid:38620;
rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Dridex certificate exchange"; flow:to_client,established; content:"|16
03|"; content:"|0B|"; distance:3; content:"|55 04 07 0C 09|Bujumbura"; content:"|55
04 0A 0C 10|Wiqur Hitin ehf."; distance:6; content:"|55 04 03 0C 11|
puppeitursilth.cz"; distance:6; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service ssl;
reference:url,www.virustotal.com/en/file/fc25709c4e05dbfbcc6ae0cf8a7c06e80156ae0517
9203021838259aeda9801a/analysis/1461600547/; classtype:trojan-activity; sid:38621;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Bayrob
variant outbound connection"; flow:to_server,established; dsize:8; content:"|4C 48
42 80 71 C2 A5 DF|"; depth:8; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/6b6b91cd104f4a6d32b5187131d905391160767207
6e6ed26ed51369e5329cad/analysis/1462889491/; classtype:trojan-activity; sid:38886;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Locky JS dropper outbound connection"; flow:to_server,established;
content:"/log.php?"; fast_pattern:only; http_uri; content:"UA-CPU"; http_header;
content:"Accept|3A 20|*/*"; http_header; content:!"Referer"; http_header;
pcre:"/\/log\.php\x3f[a-z]\x3d\d{3}/Ui"; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/11180a0ff4576e0dbbe48d77ed717e72678520516f
f13f523cad832d1b9fa9ac/analysis/1462906326/; classtype:trojan-activity; sid:38887;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Locky variant outbound connection"; flow:to_server,established;
urilen:13; content:"/userinfo.php"; fast_pattern:only; content:"Cache-Control|3A
20|no-cache|0D 0A|"; http_header; content:"Content-Type|3A 20|application/x-www-
form-urlencoded|0D 0A|"; http_header; content:!"Accept"; http_header;
content:!"Referer"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/2d766d57bc549b3ac7b87b604e2103318eaf41b526
086ffe0201d5778521c1b6/analysis/1462906540/; classtype:trojan-activity; sid:38888;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kirts exfiltration attempt"; flow:to_server,established; content:".php?
fname=Hawkeye_Keylogger"; fast_pattern:only; http_uri; content:"&data="; http_uri;
content:!"User-Agent"; http_header; content:!"Accept"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/f81128f3b9c0347f4ee5946ecf9a95a3d556e8e3a4
742d01e5605f862e1d116d/analysis/1462888129/; classtype:trojan-activity; sid:38890;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [25,587] (msg:"MALWARE-CNC
Win.Trojan.Kirts initial registration"; flow:to_server,established;
content:"Subject|3A 20|=?utf-8?B?SGF3a0V5ZSBMb2dnZXIg"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service smtp;
reference:url,www.virustotal.com/en/file/f81128f3b9c0347f4ee5946ecf9a95a3d556e8e3a4
742d01e5605f862e1d116d/analysis/1462888129/; classtype:trojan-activity; sid:38891;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.PassStealer passwords exfiltration attempt"; flow:to_server; file_data;
content:"Passwords Recorded On "; fast_pattern; content:"Time of Recording:";
within:20; distance:22; content:"IP Address"; within:12; distance:15;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service ftp;
reference:url,virustotal.com/en/file/5780e8408c8d5c84d1fbe5c53eeb77832a6af54fd41fab
7f720c89fc10989340/analysis/1463495191/; classtype:trojan-activity; sid:38950;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
Win.Adware.OpenSoftwareUpdater variant outbound connection attempt";
flow:to_server,established; content:"/installer.php?"; http_uri; content:"CODE=";
fast_pattern:only; content:"UID="; http_uri; content:"action="; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/829918eb3edb26deccd2d80c7ac8bc8ad58b4fb76a
370c11731884b408a21a73/analysis/1463575824/; classtype:trojan-activity; sid:38951;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
Win.Adware.OpenSoftwareUpdater variant outbound connection attempt";
flow:to_server,established; content:"/optin.php?"; fast_pattern:only; http_uri;
content:"f="; content:"quant="; http_uri; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/829918eb3edb26deccd2d80c7ac8bc8ad58b4fb76a
370c11731884b408a21a73/analysis/1463575824/; classtype:trojan-activity; sid:38952;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
Win.Adware.OpenSoftwareUpdater variant outbound connection attempt";
flow:to_server,established; content:"/info.php?"; http_uri; content:"quant=";
fast_pattern:only; content:"f="; http_uri; content:"h="; http_uri; content:"size=";
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/829918eb3edb26deccd2d80c7ac8bc8ad58b4fb76a
370c11731884b408a21a73/analysis/1463575824/; classtype:trojan-activity; sid:38953;
rev:1;)
alert tcp any any -> any $HTTP_PORTS (msg:"SQL use of sleep function in HTTP header
- likely SQL injection attempt"; flow:established,to_server; content:"User-Agent|
3A| "; http_header; content:"sleep("; within:200; fast_pattern; http_header;
pcre:"/User-Agent\x3A\x20[^\r\n]*sleep\x28/H"; metadata:policy balanced-ips drop,
policy max-detect-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,blog.cloudflare.com/the-sleepy-user-agent/; classtype:web-
application-attack; sid:38993; rev:8;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Sinrin initial JS dropper outbound connection";
flow:to_server,established; urilen:<31; content:"Accept|3A 20|*/*|0D 0A|UA-CPU|3A
20|"; fast_pattern:only; http_header; content:"Connection|3A 20|Keep-Alive|0D 0A|";
http_header; content:"Accept-Encoding|3A 20|gzip, deflate|0D 0A|"; http_header;
content:!"Referer"; http_header; pcre:"/\/[a-z0-9]{8,10}\x3f[A-Za-z]{7,10}\x3d[A-
Za-z]{6,10}/U"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/e0f8b6fd78c724b688f6467baf37f08c5ed198ea1b
4224f31f50c8acbad49742/analysis/; classtype:trojan-activity; sid:39064; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NetWiredRC variant connection setup"; flow:to_server,established;
content:"|3B 00 00 00 05|"; depth:5; dsize:<65; metadata:impact_flag red, ruleset
community;
reference:url,www.virustotal.com/en/file/5db3b9ce06e334cb61279dd936a40be75df6732228
bb692a7a84b1299eb09071/analysis/1464362377/; classtype:trojan-activity; sid:39080;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.LuminosityLink RAT variant outbound connection";
flow:to_server,established; content:"=P4CK3T="; depth:32; content:"8_=_8";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community;
reference:url,virustotal.com/en/file/0a6ee066b27f5f8dfeedb8e5f19659e47b70296a49a627
e2ce9d3d9456287051/analysis/; classtype:trojan-activity; sid:39106; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.LuminosityLink RAT variant inbound connection";
flow:to_client,established; content:"=P4CK3T="; depth:32; content:"8_=_8";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community;
reference:url,virustotal.com/en/file/0a6ee066b27f5f8dfeedb8e5f19659e47b70296a49a627
e2ce9d3d9456287051/analysis/; classtype:trojan-activity; sid:39107; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.JRat
inbound self-signed SSL certificate"; flow:to_client,established; content:"|16 03
01|"; content:"|02|"; distance:2; content:"|03 01|"; distance:3; content:"|55 04 06
13 02|FR"; content:"|55 04 0A 13 0C|assylias.Inc"; distance:6; content:"|55 04 03
13 08|assylias"; distance:6; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service ssl;
reference:url,www.virustotal.com/en/file/45e8df88b177cec3972f36284290eab652fb21806e
f7e9575be853fb30528f28/analysis/; classtype:trojan-activity; sid:39159; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.JRat
inbound self-signed SSL certificate"; flow:to_client,established; content:"|16 03
01|"; content:"|02|"; distance:2; content:"|03 01|"; distance:3; content:"|55 04 06
13 02|US"; content:"|55 04 08 13 0A|California"; distance:6; content:"|55 04 07 13
0E|Redwood Shores"; distance:6; content:"|55 04 0A 13 14|Oracle America, Inc.";
distance:6; content:"|55 04 0B 13 13|Code Signing Bureau"; distance:6; content:"|55
04 03 13 14|Oracle America, Inc."; distance:6; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service ssl;
reference:url,www.virustotal.com/en/file/9d54565f8fb7cf50df11bf9745f7efd04a49abb03e
85a3aafbf9a5b5fcd065c9/analysis/; classtype:trojan-activity; sid:39160; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Dridex
self-signed certificate exchange"; flow:to_client,established; content:"|16 03|";
content:"|59|"; distance:3; content:"|55 04 06 13 02|BN"; content:"|55 04 07 0C 13|
Bandar Seri Begawan"; distance:6; content:"|55 04 0A 0C 12|Cowchi Aromep LTD.";
distance:6; content:"|55 04 03 0C 17|tsre131.eollaieefi.jprs"; distance:6;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service ssl;
reference:url,www.virustotal.com/en/file/6467418eea0564f77c66844e30a17c8561089f2b83
01a7d306a71a34e4fef693/analysis/; classtype:trojan-activity; sid:39163; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Dridex self-signed certificate exchange"; flow:to_client,established;
content:"|16 03|"; content:"|59|"; distance:3; content:"|55 04 06 13 02|PW";
content:"|55 04 07 0C 08|Melekeok"; distance:6; content:"|55 04 0A 0C 0E|Merwh
Whena NL"; distance:6; content:"|55 04 03 0C 16|pepa634.omeewengreq.mz";
distance:6; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service ssl;
reference:url,www.virustotal.com/en/file/6467418eea0564f77c66844e30a17c8561089f2b83
01a7d306a71a34e4fef693/analysis/; classtype:trojan-activity; sid:39164; rev:1;)
alert tcp $HOME_NET any -> $SMTP_SERVERS [25,587] (msg:"MALWARE-CNC Win.Trojan.iSpy
variant initial outbound connection"; flow:to_server,established;
content:"=0D=0A=0D=0A"; fast_pattern:only; content:"iSpy Keylogger";
content:"Computer Information"; content:"Username:"; within:30;
content:"Installed"; within:50; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service smtp;
reference:url,www.virustotal.com/en/file/f4e902c1c2647e79167262bf948fe41368bab4d387
6255eb3d9edb5ae02097b7/analysis/; classtype:trojan-activity; sid:39409; rev:1;)
alert tcp $HOME_NET any -> $SMTP_SERVERS [25,587] (msg:"MALWARE-CNC Win.Trojan.iSpy
variant exfiltration outbound connection"; flow:to_server,established;
content:"=0D=0A"; fast_pattern:only; content:"iSpy Keylogger";
content:"=0D=0ABrowser"; content:"=0D=0AWebsite"; within:70;
content:"=0D=0AUsername"; within:70; content:"=0D=0APassword"; within:70;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service smtp;
reference:url,www.virustotal.com/en/file/f4e902c1c2647e79167262bf948fe41368bab4d387
6255eb3d9edb5ae02097b7/analysis/; classtype:trojan-activity; sid:39410; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Qbot variant outbound connection"; flow:to_server,established;
content:"zwlviewforumogaf.php"; fast_pattern:only; http_uri; content:"Host|3A|
a.topgunnphoto.com"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/020356457e95f7607c1941e03294b4c16e23daa402
d7e79cfd2ba91b23969480/analysis/1463667519/; classtype:trojan-activity; sid:39411;
rev:1;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE RTF
document incorrect file magic attempt"; flow:to_client,established;
flowbits:isset,file.rtf; file_data; content:"|7B 5C|rt|0D 3C|"; depth:6;
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service ftp-data, service http, service imap, service
pop3; reference:cve,2015-1641; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms15-033; classtype:attempted-user; sid:39526; rev:2;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE RTF document
incorrect file magic attempt"; flow:to_server,established; flowbits:isset,file.rtf;
file_data; content:"|7B 5C|rt|0D 3C|"; depth:6; metadata:policy balanced-ips drop,
policy max-detect-ips drop, policy security-ips drop, ruleset community, service
smtp; reference:cve,2015-1641; reference:url,technet.microsoft.com/en-
us/security/bulletin/ms15-033; classtype:attempted-user; sid:39527; rev:2;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE
Microsoft Office RTF WRAssembly ASLR bypass download attempt";
flow:to_client,established; flowbits:isset,file.rtf; file_data;
content:"WRAssembly"; fast_pattern:only; metadata:impact_flag red, policy balanced-
ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service ftp-data, service http, service imap, service pop3; reference:cve,2015-
1641; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033;
classtype:attempted-user; sid:39528; rev:4;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office
RTF WRAssembly ASLR bypass download attempt"; flow:to_server,established;
flowbits:isset,file.rtf; file_data; content:"WRAssembly"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service smtp; reference:cve,2015-1641;
reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033;
classtype:attempted-user; sid:39529; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Backdoor.NanoBot
variant outbound connection"; flow:to_server,established; dsize:12; content:"|08 00
00 00 27 C7 CC 6B C2 FD 13 0E|"; depth:12; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/d74fcf6b8f2f1c3a1ed742feb3f323f7826e9fc79a
3d642082cee46770a4697a/analysis/1461003042/; classtype:trojan-activity; sid:39573;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Backdoor.NanoBot
variant outbound connection"; flow:to_server,established; dsize:12; content:"|08 00
00 00 D7 75 FF F7 C7 62 B9 82|"; depth:12; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/d74fcf6b8f2f1c3a1ed742feb3f323f7826e9fc79a
3d642082cee46770a4697a/analysis/1461003042/; classtype:trojan-activity; sid:39574;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET [9000:] (msg:"MALWARE-CNC
Win.Backdoor.NanoBot variant outbound connection"; flow:to_server,established;
dsize:68; content:"|40 00 00 00|"; depth:4; byte_test:1,>,2,0,relative; content:!"|
0A|"; within:1; distance:1; metadata:impact_flag red, ruleset community;
reference:url,www.virustotal.com/en/file/d74fcf6b8f2f1c3a1ed742feb3f323f7826e9fc79a
3d642082cee46770a4697a/analysis/1461003042/; classtype:trojan-activity; sid:39575;
rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [9000:] (msg:"MALWARE-CNC
Win.Backdoor.NanoBot variant outbound connection"; flow:to_server,established;
dsize:36; content:"|20 00 00 00 AD|"; depth:5; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/d74fcf6b8f2f1c3a1ed742feb3f323f7826e9fc79a
3d642082cee46770a4697a/analysis/1461003042/; classtype:trojan-activity; sid:39576;
rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Backdoor.NanoBot
variant outbound connection"; flow:to_server,established; dsize:12; content:"|08 00
00 00 86 CC 02 89 8F F7 A6 67|"; depth:12; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/0a19499dec07ca2ade3aefdf910e13231d63d7a2e2
38776272b4fffd0ff3a527/analysis/1467727738/; classtype:trojan-activity; sid:39577;
rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.NanoBot
variant inbound connection"; flow:to_client,established; dsize:36; content:"|20 00
00 00 FE A5 0D 55 BB 10 A4 09 7A D9 86 FF 6C 81 E6 97 7C 91 BC DA EE 89 08 2A|";
depth:28; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community;
reference:url,www.virustotal.com/en/file/0a19499dec07ca2ade3aefdf910e13231d63d7a2e2
38776272b4fffd0ff3a527/analysis/1467727738/; classtype:trojan-activity; sid:39578;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Backdoor.NanoBot
variant outbound connection"; flow:to_server,established; dsize:60; content:"|38 00
00 00 FE A5 0D 55 BB 10 A4 09 7A D9 86 FF 6C 81 E6 97 7C 91 BC DA EE 89 08 2A|";
depth:28; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community;
reference:url,www.virustotal.com/en/file/0a19499dec07ca2ade3aefdf910e13231d63d7a2e2
38776272b4fffd0ff3a527/analysis/1467727738/; classtype:trojan-activity; sid:39579;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Backdoor.NanoBot
variant outbound connection"; flow:to_server,established; dsize:68; content:"|40 00
00 00 FE A5 0D 55 BB 10 A4 09 7A D9 86 FF 6C 81 E6 97 7C 91 BC DA EE 89 08 2A|";
depth:28; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community;
reference:url,www.virustotal.com/en/file/0a19499dec07ca2ade3aefdf910e13231d63d7a2e2
38776272b4fffd0ff3a527/analysis/1467727738/; classtype:trojan-activity; sid:39580;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NanoBot/Perseus initial outbound connection";
flow:to_server,established; dsize:60; content:"|38 00 00 00 F5 13 89 53|"; depth:8;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community;
reference:url,www.virustotal.com/en/file/4b16d1e205f198222bd2b2bb8dbd55886a9e2b79de
484eec0d8cce5db376d3c8/analysis/; classtype:trojan-activity; sid:39581; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.NanoBot/Perseus server heartbeat request attempt";
flow:to_client,established; dsize:36; content:"|20 00 00 00 2B FF 4B F4|"; depth:8;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community;
reference:url,www.virustotal.com/en/file/4b16d1e205f198222bd2b2bb8dbd55886a9e2b79de
484eec0d8cce5db376d3c8/analysis/; classtype:trojan-activity; sid:39582; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NanoBot/Perseus client heartbeat response attempt";
flow:to_server,established; dsize:52; content:"|30 00 00 00 2B FF 4B F4|"; depth:8;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community;
reference:url,www.virustotal.com/en/file/4b16d1e205f198222bd2b2bb8dbd55886a9e2b79de
484eec0d8cce5db376d3c8/analysis/; classtype:trojan-activity; sid:39583; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Zeus variant inbound connection"; flow:to_client,established;
content:"attachment|3B|"; http_header; content:"filename="; http_header;
content:"/us.xml"; within:20; fast_pattern; http_header; content:"Content-Type|3A
20|application/octet-stream|0D 0A|"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/292c12a4c9cf8724c7bfa9ec73e1b703bd51720ea1
8cd4528e9be516d05b5628/analysis/1468961317/; classtype:trojan-activity; sid:39705;
rev:3;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"INDICATOR-
COMPROMISE Content-Type image containing Portable Executable data";
flow:to_client,established; content:"Content-Type|3A 20|image/"; fast_pattern:only;
http_header; file_data; content:"MZ"; depth:2; byte_jump:4,58,relative,little;
content:"PE|00 00|"; within:4; distance:-64; metadata:ruleset community, service
ftp-data, service http, service imap, service pop3;
reference:url,www.virustotal.com/en/file/2dc752d12baa8c8441b82dd52abfd51c25abd28ba4
2344b22869ba7ae5a9a877/analysis/1469197722/; classtype:trojan-activity; sid:39729;
rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP HttpOxy
CGI application vulnerability potential man-in-the-middle attempt";
flow:to_server,established; content:"|0A|Proxy|3A|"; fast_pattern:only;
http_header; metadata:policy max-detect-ips drop, ruleset community, service http;
reference:cve,2016-5385; reference:cve,2016-5386; reference:cve,2016-5387;
reference:cve,2016-5388; reference:url,httpoxy.org; classtype:web-application-
attack; sid:39737; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Trans variant outbound connection"; flow:to_server,established;
content:"/site/images/banners/casecor21.gif"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/a4c1234bb748f9bcabeb9ab990614fd4c1035135c5
f5068fd42bace4b75fff0e/analysis/; classtype:trojan-activity; sid:39738; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Hancitor variant outbound connection"; flow:to_server,established;
content:"/gate.php"; fast_pattern:only; http_uri; content:"GUID="; depth:122;
http_client_body; content:"BUILD="; depth:122; http_client_body; content:"INFO=";
depth:122; http_client_body; content:"IP="; depth:122; http_client_body;
content:"TYPE="; depth:122; http_client_body; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/5ec4ba1a97500e664af6896f4c02846ca6777e671b
b600103dc8d49224e38f48/analysis/1469201551/; classtype:trojan-activity; sid:39800;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 900 (msg:"MALWARE-CNC Win.Trojan.Spyrat
variant outbound connection"; flow:to_server,established; content:"myversion|7C|
2.5.2."; depth:19; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/e64f536556739d50a673a952da7f110f1156fad0f7
360d401794e5a8d65ce63a/analysis/; classtype:trojan-activity; sid:39801; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 25 (msg:"FILE-OFFICE Microsoft Windows RTF
file with embedded object package SMTP upload attempt"; flow:to_server,established;
file_data; content:"{|5C|rt"; nocase; content:"{|5C|object|5C|objemb{|5C|*|5C|
objclass Package}"; distance:0; nocase; flowbits:set,file.rtf.embed;
metadata:policy max-detect-ips alert, ruleset community, service smtp;
reference:url,en.wikipedia.org/wiki/Rich_Text_Format; classtype:misc-activity;
sid:39903; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [25,587] (msg:"MALWARE-CNC
Win.Trojan.HawkEye keylogger exfiltration attempt"; flow:to_server,established;
content:"Subject: HawkEye Keylogger |7C|"; fast_pattern:only; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
smtp;
reference:url,www.virustotal.com/en/file/f4499928a6fee5d37fb711ed6d68708bf116cfc7f2
84d3295dd30ded7ecf64b2/analysis/; classtype:trojan-activity; sid:39911; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Locky variant outbound connection"; flow:to_server,established;
urilen:14; content:"/data/info.php"; fast_pattern:only; http_uri; content:"x-
requested-with: XMLHttpRequest"; http_header; content:"Referer|3A| http|3A|";
http_header; content:"/data"; within:25; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/f29ce76169727ff5a43ef7baa5c4e04f7d3302189e
3d2a31cfc9dec39e84ad03/analysis/; classtype:trojan-activity; sid:40011; rev:2;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"BROWSER-FIREFOX
Mozilla Firefox about field spoofing attempt"; flow:to_client,established;
file_data; content:"about:"; fast_pattern; nocase; content:"?"; within:15;
content:"<"; within:100; content:"location"; nocase; pcre:"/\babout:[a-z]+?\?[^\n]
+?\</i"; metadata:ruleset community, service http; reference:cve,2016-5268;
reference:url,bugzilla.mozilla.org/show_bug.cgi?id=1253673;
reference:url,www.mozilla.org/en-US/security/advisories/mfsa2016-83/;
classtype:attempted-user; sid:40015; rev:1;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-IDENTIFY XLSB
file magic detected"; flow:to_client,established; file_data; content:"PK|03 04|";
depth:4; flowbits:set,file.zip; flowbits:set,file.xlsb; flowbits:noalert;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; classtype:misc-activity; sid:40035; rev:7;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-IDENTIFY XLSB file magic
detected"; flow:to_server,established; file_data; content:"PK|03 04|"; depth:4;
flowbits:set,file.zip; flowbits:set,file.xlsb; flowbits:noalert; metadata:ruleset
community, service smtp; classtype:misc-activity; sid:40036; rev:7;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"OS-LINUX Linux Kernel
Challenge ACK provocation attempt"; flow:to_server,no_stream; flags:R;
detection_filter:track by_src, count 200, seconds 1; metadata:ruleset community;
reference:bugtraq,91704; reference:cve,2016-5696; reference:cve,2017-7285;
classtype:attempted-admin; sid:40063; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"EXPLOIT-KIT
Phoenix Exploit Kit inbound geoip.php bdr exploit attempt";
flow:to_server,established; content:"/geoip.php?bdr="; fast_pattern:only; http_uri;
metadata:policy security-ips drop, ruleset community, service http;
reference:url,github.com/rapid7/metasploit-
framework/blob/master/modules/exploits/multi/http/phoenix_exec.rb; classtype:web-
application-activity; sid:40184; rev:1;)
alert udp $HOME_NET [500,848,4500,4848] -> $EXTERNAL_NET any (msg:"SERVER-OTHER
Cisco IOS Group-Prime memory disclosure exfiltration attempt"; flow:to_client;
dsize:>2000; content:"|0B 10 05 00|"; depth:8; offset:16;
byte_test:4,>,2000,4,relative; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community; reference:cve,2016-
6415;
reference:url,tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-
sa-20160916-ikev1; classtype:attempted-recon; sid:40220; rev:5;)
alert udp $EXTERNAL_NET any -> $HOME_NET [500,848,4500,4848] (msg:"SERVER-OTHER
Cisco IOS Group-Prime MD5 memory disclosure attempt"; flow:to_server; dsize:>2000;
content:"|00 00 00 00 00 00 00 00|"; depth:8; offset:8; content:"|00 00 00 01 00 00
00 01|"; depth:8; offset:32; content:"|01 01 04 01|"; within:4; distance:4;
content:"|80 02 00 01 80 04 00 01 00 06|"; distance:0; fast_pattern;
byte_test:2,>,2000,0,relative; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community; reference:cve,2016-
6415;
reference:url,tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-
sa-20160916-ikev1; classtype:attempted-recon; sid:40221; rev:5;)
alert udp $EXTERNAL_NET any -> $HOME_NET [500,848,4500,4848] (msg:"SERVER-OTHER
Cisco IOS Group-Prime SHA memory disclosure attempt"; flow:to_server; dsize:>2000;
content:"|00 00 00 00 00 00 00 00|"; depth:8; offset:8; content:"|00 00 00 01 00 00
00 01|"; depth:8; offset:32; content:"|01 01 04 01|"; within:4; distance:4;
content:"|80 02 00 02 80 04 00 01 00 06|"; distance:0; fast_pattern;
byte_test:2,>,2000,0,relative; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community; reference:cve,2016-
6415;
reference:url,tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-
sa-20160916-ikev1; classtype:attempted-recon; sid:40222; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user-agent string - Win.Trojan.Perseus";
flow:to_server,established; content:"User-Agent|3A|
bUQ8QmvUpI57udWFxQHPkuyKDfc3T8u5"; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/e88709501e6c8923c7c9bf112f7a824f241f86b001
dd824eb12a4284778c8137/analysis/; classtype:trojan-activity; sid:40251; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Perseus
variant outbound connection"; flow:to_server,established; content:"mashine=";
fast_pattern:only; http_client_body; content:"publickey="; http_client_body;
content:"user="; http_client_body; content:"os="; http_client_body;
content:"processor="; http_client_body; content:"mac="; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/e88709501e6c8923c7c9bf112f7a824f241f86b001
dd824eb12a4284778c8137/analysis/; classtype:trojan-activity; sid:40252; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Osx.Trojan.Keydnap variant initial backdoor download attempt";
flow:to_server,established; content:"/icloudsyncd"; fast_pattern:only; http_uri;
content:"Accept|3A 20|*/*"; http_header; content:!"User-Agent|3A 20|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,blog.malwarebytes.com/cybercrime/2016/07/mac-malware-osx-keydnap-
steals-keychain/; reference:url,www.welivesecurity.com/2016/07/06/new-osxkeydnap-
malware-hungry-credentials/; classtype:trojan-activity; sid:40260; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Satana ransomware outbound connection"; flow:to_server,established;
content:"/add.php"; fast_pattern:only; http_uri; content:"id="; http_client_body;
content:"code="; http_client_body; content:"sdata="; http_client_body;
content:"name="; http_client_body; content:"md5="; http_client_body;
content:"dlen="; http_client_body; content:!"Connection"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/683a09da219918258c58a7f61f7dc4161a3a7a377c
f82a31b840baabfb9a4a96/analysis/1477327210/; classtype:trojan-activity; sid:40541;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.CryPy ransomware variant outbound connection";
flow:to_server,established; content:"/victim.php?info="; fast_pattern:only;
http_uri; content:"&ip="; http_uri; content:"info="; http_uri; content:"User-Agent|
3A 20|Python-urllib/"; http_header; content:!"Accept"; http_header;
content:!"Connection"; http_header; content:!"Referer"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/de6da70478e7f84cd06ace1a0934cc9d5732f35aa2
0e960dc121fd8cf2388d6e/analysis/1477329470/; classtype:trojan-activity; sid:40549;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Dexter Banker variant second stage download attempt";
flow:to_server,established; content:"/images/"; fast_pattern:only; http_uri;
content:".rar"; http_uri; content:"User-Agent|3A 20|Mozilla/4.0 (compatible|3B|
Synapse)|0D 0A|"; http_header; content:!"Accept"; http_header; content:!"Referer";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/25657a5b4e65add11d42c59aa854834977ddb3fe96
9f10efa2fa637b0329b3bb/analysis/1477407128/; classtype:trojan-activity; sid:40550;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Dexter Banker variant successful installation report attempt";
flow:to_server,established; content:"/LetsGo.php?A="; fast_pattern:only; http_uri;
content:"Sytem="; http_uri; content:"qual="; http_uri; content:!"Accept";
http_header; content:!"referer"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/25657a5b4e65add11d42c59aa854834977ddb3fe96
9f10efa2fa637b0329b3bb/analysis/1477407128/; classtype:trojan-activity; sid:40551;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.iSpy variant outbound connection"; flow:to_server,established;
content:"iSpyKelogger"; fast_pattern:only; http_uri; content:"gate=";
http_client_body; content:"token="; distance:0; http_client_body; content:"name=";
distance:0; http_client_body; content:!"User-Agent"; http_header;
content:!"Connection"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/11e611585bfb6ff1f823e3c035ef6cfae39dfe2209
e15ed01a8db8b3f9526519/analysis/1477417828/; classtype:trojan-activity; sid:40559;
rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC
Android.Trojan.SpyNote RAT variant inbound connection"; flow:to_client,established;
content:"Server Prent <please>|0D 0A|"; fast_pattern:only; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/14eb51b26fa4932fc660daf7e803600bf29a8a46fe
3f1d652194bc48e9617bd9/analysis/1478720273/; classtype:trojan-activity; sid:40762;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Android.Trojan.SpyNote RAT variant getSMS command response";
flow:to_server,established; content:"|7C|ge|7C|t|7C|SM|7C|S|7C|";
fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/14eb51b26fa4932fc660daf7e803600bf29a8a46fe
3f1d652194bc48e9617bd9/analysis/1478720273/; classtype:trojan-activity; sid:40763;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Android.Trojan.SpyNote RAT variant getContacts command response";
flow:to_server,established; content:"send|7C|G|7C 7C|Cont|7C|acts|7C|";
fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/14eb51b26fa4932fc660daf7e803600bf29a8a46fe
3f1d652194bc48e9617bd9/analysis/1478720273/; classtype:trojan-activity; sid:40764;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Locky variant outbound connection"; flow:to_server,established;
urilen:12; content:"/message.php"; fast_pattern:only; http_uri; content:"x-
requested-with|3A 20|XMLHttpRequest|0D 0A|"; http_header; content:"Referer|3A 20|";
http_header; content:"Accept|3A 20|*/*|0D 0A|Accept-Language|3A 20|en-us|0D 0A|";
http_header; content:"Cache-Control|3A 20|no-cache|0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/ab082d6047fb73b9de7ebc59fb12fa1f8c2d547949
d4add3b7a573d48172889b/analysis/1479147777/; classtype:trojan-activity; sid:40816;
rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE MindSpark
framework installer attempt"; flow:to_server,established; content:"User-Agent|3A
20|Mindspark MIP "; fast_pattern:only; http_header; metadata:ruleset community,
service http;
reference:url,www.virustotal.com/en/file/9f2cc1688bee96849ced91ade04d4d51e6fd18fa47
ab1dc2c12a029aa672f7ce/analysis/; classtype:trojan-activity; sid:40827; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Backdoor.Houdini
variant initial outbound connection"; flow:to_server,established;
content:"new_houdini|0D 0A|"; depth:13; offset:4; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community; classtype:trojan-
activity; sid:40831; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.Houdini
variant keylogger inbound init command attempt"; flow:to_client,established;
dsize:23; content:"silence_keylogger|0D 0A|"; depth:19; offset:4;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community; classtype:trojan-activity; sid:40832; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.Houdini
variant screenshot inbound init command attempt"; flow:to_client;
content:"screenshot_init|0D 0A|"; depth:17; offset:4; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community;
classtype:trojan-activity; sid:40833; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.Houdini
variant screenshot inbound silence command attempt"; flow:to_client; dsize:24;
content:"silence_screenshot|0D 0A|"; depth:20; offset:4; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community;
classtype:trojan-activity; sid:40834; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.Houdini
variant screen_thumb inbound init command attempt"; flow:to_client,established;
content:"screen_thumb|0D 0A|"; depth:14; offset:4; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community; classtype:trojan-
activity; sid:40835; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Backdoor.Houdini
variant file enumeration inbound init/root/faf command attempt";
flow:to_client,established; dsize:23; content:"file_manager_"; depth:13; offset:4;
pcre:"/file_manager_(init|root|faf)\x0d\x0a/"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community; classtype:trojan-
activity; sid:40836; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE Sokuxuan
outbound connection attempt"; flow:to_server,established; content:"/UpgSvr/";
fast_pattern:only; http_uri; content:".xml"; http_uri; metadata:ruleset community,
service http;
reference:url,www.virustotal.com/en/file/f35b65743142090ecf031731cb0bd77b15055e36dc
daa7a4ab09c5b2add13d15/analysis/1479759162/; classtype:trojan-activity; sid:40839;
rev:1;)
# alert tcp $HOME_NET 1024: -> $EXTERNAL_NET 1024: (msg:"PUA-OTHER Bitcoin Mining
subscribe Stratum protocol client request attempt"; flow:to_server,established;
content:"|7B 22|id|22 3A|"; content:"|22|method|22 3A 22|mining.subscribe|22|";
content:"|22|params|22 3A|"; distance:1; metadata:ruleset community;
reference:url,www.virustotal.com/en/file/f35b65743142090ecf031731cb0bd77b15055e36dc
daa7a4ab09c5b2add13d15/analysis/1479759162/; classtype:policy-violation; sid:40840;
rev:1;)
# alert tcp $HOME_NET 1024: -> $EXTERNAL_NET 1024: (msg:"PUA-OTHER Bitcoin Mining
authorize Stratum protocol client request attempt"; flow:to_server,established;
content:"|7B 22|id|22 3A|"; content:"|22|method|22 3A 22|mining.authorize|22|";
content:"|22|params|22 3A|"; distance:1; metadata:ruleset community;
reference:url,www.virustotal.com/en/file/f35b65743142090ecf031731cb0bd77b15055e36dc
daa7a4ab09c5b2add13d15/analysis/1479759162/; classtype:policy-violation; sid:40841;
rev:1;)
# alert tcp $HOME_NET 1024: -> $EXTERNAL_NET 1024: (msg:"PUA-OTHER Bitcoin Mining
extranonce Stratum protocol subscribe client request attempt";
flow:to_server,established; content:"|7B 22|id|22 3A|"; content:"|22|method|22 3A
22|mining.extranonce.subscribe|22|"; content:"|22|params|22 3A|"; distance:1;
metadata:ruleset community;
reference:url,www.virustotal.com/en/file/f35b65743142090ecf031731cb0bd77b15055e36dc
daa7a4ab09c5b2add13d15/analysis/1479759162/; classtype:policy-violation; sid:40842;
rev:1;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1040 (msg:"PROTOCOL-OTHER TP-Link TDDP
SET_CONFIG type buffer overflow attempt"; flow:to_server; dsize:>336; content:"|01
01 00|"; depth:3; byte_test:4,>=,0x0264,4,big; metadata:policy max-detect-ips drop,
policy security-ips drop, ruleset community;
reference:url,www.coresecurity.com/advisories/tp-link-tddp-multiple-
vulnerabilities; classtype:attempted-user; sid:40866; rev:3;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"BROWSER-FIREFOX Mozilla
Firefox ESR NotifyTimeChange use after free attempt"; flow:to_client,established;
file_data; content:".createElementNS"; content:"svg"; within:10;
content:".setAttribute"; content:"begin"; within:15; content:".setAttribute";
distance:0; content:"end"; within:10; content:".end"; within:20;
content:".setAttribute"; distance:0; content:"end"; within:10; content:".end";
within:20; content:".pauseAnimations"; fast_pattern:only; metadata:policy balanced-
ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2016-9079; reference:url,www.mozilla.org/en-
US/security/advisories/mfsa2016-92/; classtype:attempted-user; sid:40888; rev:3;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"BROWSER-FIREFOX Mozilla
Firefox ESR NotifyTimeChange use after free attempt"; flow:to_client,established;
file_data; content:".pauseAnimations"; fast_pattern:only; content:"svg"; nocase;
content:"animate"; nocase; content:"begin"; within:50; nocase; content:"end";
within:50; nocase; content:".end"; within:30; nocase; metadata:policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2016-9079; reference:url,www.mozilla.org/en-
US/security/advisories/mfsa2016-92/; classtype:attempted-user; sid:40896; rev:3;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1040 (msg:"PROTOCOL-OTHER TP-Link TDDP
Get_config configuration leak attempt"; flow:to_server; content:"|01 02 00|";
depth:3; content:"|00 00|"; within:2; distance:7; metadata:policy max-detect-ips
drop, policy security-ips drop, ruleset community;
reference:url,www.coresecurity.com/advisories/tp-link-tddp-multiple-
vulnerabilities; classtype:attempted-recon; sid:40907; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Rootkit.Sednit variant outbound connection"; flow:to_server,established;
urilen:11; content:"/search.php"; fast_pattern:only; http_uri; content:"as_ft=";
http_client_body; content:"as_q="; http_client_body; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,virustotal.com/en/file/471fbdc52b501dfe6275a32f89a8a6b02a2aa9a0e70937
f5de610b4185334668/analysis/1480953133/; classtype:trojan-activity; sid:40911;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 31337 (msg:"MALWARE-CNC Linux.DDoS.D93
outbound connection"; flow:to_server; content:"|4E 0F 42 07 27|"; depth:5;
dsize:25; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/2c017c94d9f40cba9a20e92c7c636e98de15c599bf
004fa06508d701ab9e3068/analysis/; classtype:trojan-activity; sid:40991; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
WNR2000 authentication bypass attempt"; flow:to_server,established;
content:"/apply_noauth.cgi"; depth:17; nocase; http_uri; metadata:policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2016-10176; reference:url,seclists.org/fulldisclosure/2016/Dec/72;
classtype:attempted-admin; sid:41095; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
WNR2000 hidden_lang_avi stack buffer overflow attempt"; flow:to_server,established;
content:"/lang_check"; nocase; http_uri; content:"hidden_lang_avi="; nocase;
http_client_body; isdataat:36,relative; content:!"&"; within:36; http_client_body;
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2016-10174;
reference:url,seclists.org/fulldisclosure/2016/Dec/72; classtype:attempted-admin;
sid:41096; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Locky variant outbound connection"; flow:to_server,established;
content:"/admin.php?f="; fast_pattern:only; http_uri; content:"UA-CPU|3A 20|";
http_header; content:"MSIE 7.0|3B|"; http_header; content:"Accept|3A 20|*/*";
http_header; content:!"Accept-Language"; http_header; content:!"Referer";
http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-
ips drop, ruleset community, service http;
reference:url,virustotal.com/en/file/b9cf176ddb51fa60c7512cdbafc5a598929ac3d0b3d044
3a80a7f33259aa70f2/analysis/1484673198/; classtype:trojan-activity; sid:41334;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Locky variant outbound connection"; flow:to_server,established;
urilen:12; content:"/checkupdate"; fast_pattern:only; http_uri; content:"x-
requested-with|3A 20|"; http_header; content:"Referer"; http_header; content:"=";
depth:15; http_client_body; content:"%"; within:2; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,virustotal.com/en/file/b9cf176ddb51fa60c7512cdbafc5a598929ac3d0b3d044
3a80a7f33259aa70f2/analysis/1484673198/; classtype:trojan-activity; sid:41335;
rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.Sysch variant outbound connection"; flow:to_server,established;
content:"time|3A 20|"; fast_pattern:only; http_header; content:"User-Agent|3A 20|
HttpEngine"; http_header; content:".do"; http_uri; pcre:"/\.(do|jar)$/Umi";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,virustotal.com/en/file/5a0bb7bba9153801fa88ef1bedfad564d95d2d61a23de8
cb87af8b589207277f/analysis/1484684079/;
reference:url,virustotal.com/en/file/82da35ab3b0a47fe8de8b0cc24d53711e17960f5887a16
769e76650d9556b399/analysis/1484684069/; classtype:trojan-activity; sid:41336;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.Sysch variant outbound connection"; flow:to_server,established;
content:"GZIPOK|3A 20|"; fast_pattern:only; http_header; content:"CompGZ|3A 20|";
http_header; content:"ReqType|3A 20|"; http_header; content:".do"; http_uri;
content:!"Accept"; http_header; content:!"Referer"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,virustotal.com/en/file/5a0bb7bba9153801fa88ef1bedfad564d95d2d61a23de8
cb87af8b589207277f/analysis/1484684079/;
reference:url,virustotal.com/en/file/82da35ab3b0a47fe8de8b0cc24d53711e17960f5887a16
769e76650d9556b399/analysis/1484684069/; classtype:trojan-activity; sid:41337;
rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Western
Digital MyCloud command injection attempt"; flow:to_server,established;
content:"/web/google_analytics.php"; fast_pattern:only; http_uri;
content:"cmd=set"; nocase; http_uri; content:"arg="; nocase; http_uri;
content:"isAdmin=1"; nocase; http_cookie; content:"username=admin"; nocase;
http_cookie; content:"local_login=1"; nocase; http_cookie; pcre:"/[?&]arg=[^&]*?
([\x60\x3b\x7c]|\x24\x28)/Ui"; metadata:policy max-detect-ips drop, policy
security-ips drop, ruleset community, service http; reference:cve,2016-10108;
classtype:web-application-attack; sid:41346; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Western
Digital MyCloud command injection attempt"; flow:to_server,established;
content:"/web/google_analytics.php"; fast_pattern:only; http_uri;
content:"cmd=set"; nocase; http_raw_uri; content:"arg="; nocase; http_raw_uri;
content:"%26"; distance:0; http_raw_uri; content:"isAdmin=1"; nocase; http_cookie;
content:"username=admin"; nocase; http_cookie; content:"local_login=1"; nocase;
http_cookie; pcre:"/[?&]arg=[^&]*?%26/Ii"; metadata:policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http; reference:cve,2016-
10108; classtype:web-application-attack; sid:41347; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Western
Digital MyCloud command injection attempt"; flow:to_server,established;
content:"/web/google_analytics.php"; fast_pattern:only; http_uri;
content:"cmd=set"; nocase; http_client_body; content:"arg="; nocase;
http_client_body; content:"isAdmin=1"; nocase; http_cookie;
content:"username=admin"; nocase; http_cookie; content:"local_login=1"; nocase;
http_cookie; pcre:"/(^|&)arg=[^&]*?([\x60\x3b\x7c]|\x24\x28|%60|%3b|%7c|%26|
%24%28)/Pim"; metadata:policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http; reference:cve,2016-10108; classtype:web-
application-attack; sid:41348; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Western
Digital MyCloud command injection attempt"; flow:to_server,established;
content:"/web/google_analytics.php"; fast_pattern:only; http_uri;
content:"cmd=set"; nocase; http_client_body; content:"arg"; nocase;
http_client_body; content:"Content-Disposition"; nocase; http_client_body;
content:"isAdmin=1"; nocase; http_cookie; content:"username=admin"; nocase;
http_cookie; content:"local_login=1"; nocase; http_cookie;
pcre:"/name\s*=\s*[\x22\x27]?arg((?!^--).)*?[\r\n]{2,}((?!^--).)*?
([\x60\x3b\x7c\x26]|\x24\x28)/Psim"; metadata:policy max-detect-ips drop, policy
security-ips drop, ruleset community, service http; reference:cve,2016-10108;
classtype:web-application-attack; sid:41349; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NetWiredRC variant registration message"; flow:to_server,established;
content:"|41 00 00 00 83|"; depth:5; dsize:<80; metadata:impact_flag red, policy
security-ips drop, ruleset community;
reference:url,virustotal.com/en/file/6f179a4dc1c0393b6f2dac5aaa9c20b120ced4e82ba257
bb45e693472c56a88b/analysis/1484683135/; classtype:trojan-activity; sid:41374;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NetWiredRC variant check logs"; flow:to_server,established; content:"|38
00 00 00 85|"; depth:5; dsize:<80; metadata:impact_flag red, policy security-ips
drop, ruleset community;
reference:url,virustotal.com/en/file/6f179a4dc1c0393b6f2dac5aaa9c20b120ced4e82ba257
bb45e693472c56a88b/analysis/1484683135/; classtype:trojan-activity; sid:41375;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NetWiredRC variant keepalive"; flow:to_server,established; content:"|01
00 00 00 81|"; depth:5; dsize:5; metadata:impact_flag red, policy security-ips
drop, ruleset community;
reference:url,virustotal.com/en/file/6f179a4dc1c0393b6f2dac5aaa9c20b120ced4e82ba257
bb45e693472c56a88b/analysis/1484683135/; classtype:trojan-activity; sid:41376;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"POLICY-OTHER Cisco
WebEx explicit use of web plugin"; flow:to_server,established; content:"cwcsf-
nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html"; fast_pattern:only;
http_uri; metadata:ruleset community, service ftp-data, service http, service imap,
service pop3; reference:cve,2017-3823; reference:cve,2017-6753;
reference:url,tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-
sa-20170717-webex; classtype:policy-violation; sid:41409; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC User-Agent known
malicious user-agent string - X-Mas"; flow:to_server,established; content:"User-
Agent|3A 20|Useragents"; fast_pattern:only; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,virustotal.com/en/file/2aa91ed4e591da10499708bde44b1f9d0000eaee9a8101
8cb0f36bd44844df7a/analysis/1484847335/;
reference:url,virustotal.com/en/file/83a2b429b969fc5cd38b6c5072391c3513b3b914f54ea8
0e245b243dbd5377be/analysis/1484847306/; classtype:trojan-activity; sid:41441;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Ransomware.X-Mas
outbound connection"; flow:to_server,established; content:"WebKitFormBoundary";
content:"|20|form-data|3B 20|name=|22|uid|22|"; fast_pattern; content:"|20|form-
data|3B 20|name=|22|uname|22|"; distance:0; content:"|20|form-data|3B 20|name=|22|
cname|22|"; distance:0; content:"|20|form-data|3B 20|name=|22|ltime|22|";
distance:0; content:"|20|form-data|3B 20|name=|22|uright|22|"; distance:0;
content:"|20|form-data|3B 20|name=|22|sysinfo|22|"; distance:0;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,virustotal.com/en/file/2aa91ed4e591da10499708bde44b1f9d0000eaee9a8101
8cb0f36bd44844df7a/analysis/1484847335/;
reference:url,virustotal.com/en/file/83a2b429b969fc5cd38b6c5072391c3513b3b914f54ea8
0e245b243dbd5377be/analysis/1484847306/; classtype:trojan-activity; sid:41442;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Ransomware.X-Mas variant keylogger outbound connection";
flow:to_server,established; content:"/gate.php"; fast_pattern:only; http_uri;
content:"163="; http_client_body; content:"&x="; distance:0; http_client_body;
content:"&z="; distance:0; http_client_body; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,virustotal.com/en/file/b49d2b3c6978584408f3c668863cc88e892bd333a9db9c
3de14964d59fc3298f/analysis/1484847208/; classtype:trojan-activity; sid:41443;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Ransomware.X-Mas variant keylogger outbound connection";
flow:to_server,established; content:"/gate.php?"; fast_pattern:only; http_uri;
content:"|3C|br|3E 3C|br|3E 3C|b|3E 3C|big|3E 3C|font color=|22|";
http_client_body; content:"|22 3E 20 5B|"; within:12; http_client_body;
content:!"Accept-"; http_header; content:!"Referer"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,virustotal.com/en/file/b49d2b3c6978584408f3c668863cc88e892bd333a9db9c
3de14964d59fc3298f/analysis/1484847208/; classtype:trojan-activity; sid:41444;
rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-OTHER QNAP
remote buffer overflow attempt"; flow:to_server,established; content:"/cgi-
bin/cgi.cgi"; fast_pattern:only; http_uri; content:"u="; http_uri; content:"p=";
http_uri; isdataat:263,relative; content:!"&"; within:263; http_uri; content:!"|0D
0A|"; within:263; http_uri; metadata:ruleset community, service http;
reference:url,seclists.org/bugtraq/2017/Jan/5; classtype:attempted-admin;
sid:41445; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP WordPress
get_post authentication bypass attempt"; flow:to_server,established; content:"/wp-
json/"; fast_pattern:only; http_uri; content:"id="; nocase; http_uri; pcre:"/[?
&]id=[^&]*?[^\d&]/Ui"; metadata:policy balanced-ips drop, policy connectivity-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:url,wordpress.org/news/2017/01/wordpress-4-7-2-security-
release/; classtype:web-application-attack; sid:41495; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP WordPress
get_post authentication bypass attempt"; flow:to_server,established; content:"/wp-
json/"; fast_pattern:only; http_uri; content:"id="; nocase; http_client_body;
pcre:"/[?&]id=[^&]*?[^\d&]/Pi"; metadata:policy balanced-ips drop, policy
connectivity-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,wordpress.org/news/2017/01/wordpress-4-7-2-security-release/;
classtype:web-application-attack; sid:41496; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP WordPress
get_post authentication bypass attempt"; flow:to_server,established; content:"/wp-
json/"; fast_pattern:only; http_uri; content:"|22|id|22|"; nocase;
http_client_body; pcre:"/\x22id\x22\s*\x3A\s*\x22[^\x22]*?[^\d\x22]/Pi";
metadata:policy balanced-ips drop, policy connectivity-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,wordpress.org/news/2017/01/wordpress-4-7-2-security-release/;
classtype:web-application-attack; sid:41497; rev:2;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Ransomware.CryptoLocker binary download response attempt";
flow:to_client,established; content:"Set-Cookie|3A 20|mediaplanBAK|3D|";
fast_pattern:only; content:"Set-Cookie|3A 20|mediaplan|3D|"; content:"Content-Type|
3A 20|text/plain"; http_header; file_data; content:"MZ";
byte_jump:4,58,relative,little; content:"PE|00 00|"; within:4; distance:-64;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,virustotal.com/en/file/571a7014d1ee4e359e7eb5d2c7b3e6c527f4fcef322781
f1c56a1b5bf28c8eb2/analysis/1485884599/; classtype:trojan-activity; sid:41498;
rev:1;)
alert tcp $EXTERNAL_NET [139,445] -> $HOME_NET any (msg:"SERVER-SAMBA Microsoft
Windows SMBv2/SMBv3 Buffer Overflow attempt"; flow:to_client,established;
content:"|FE|SMB|40 00|"; depth:6; offset:4; content:"|03 00|"; within:2;
distance:6; byte_test:3, >, 200, 1; metadata:policy balanced-ips drop, policy
connectivity-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community; reference:cve,2017-0016; classtype:attempted-dos; sid:41499;
rev:6;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
passwordrecovered.cgi insecure admin password disclosure attempt";
flow:to_server,established; content:"/passwordrecovered.cgi"; fast_pattern:only;
http_uri; content:"id="; nocase; metadata:policy max-detect-ips drop, policy
security-ips drop, ruleset community, service http; reference:bugtraq,95457;
reference:cve,2017-5521; reference:url,kb.netgear.com/30632/Web-GUI-Password-
Recovery-and-Exposure-Security-Vulnerability; classtype:attempted-recon; sid:41504;
rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Osx.Downloader.MacDownloader variant outbound connection";
flow:to_server,established; urilen:14; content:"/Servermac.php"; fast_pattern:only;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,virustotal.com/en/file/7a9cdb9d608b88bd7afce001cb285c2bb2ae76f5027977
e8635aa04bd064ffb7/analysis/; classtype:trojan-activity; sid:41663; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN2200 ping.cgi command injection attempt"; flow:to_server,established;
content:"/ping.cgi"; nocase; http_uri; content:"ping_IPAddr="; fast_pattern:only;
http_client_body; pcre:"/(^|&)ping_IPAddr=[^&]*?([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28|
%60|%3b|%7c|%26|%3c%28|%3e%28|%24%28)/Pim"; metadata:policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http; reference:cve,2017-6077;
reference:url,seclists.org/fulldisclosure/2017/Feb/50; classtype:web-application-
attack; sid:41698; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN2200 ping.cgi command injection attempt"; flow:to_server,established;
content:"/ping.cgi"; nocase; http_uri; content:"ping_IPAddr="; fast_pattern:only;
http_uri; content:"%26"; http_raw_uri; pcre:"/[?&]ping_IPAddr=[^&]*?%26/Ii";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2017-6077;
reference:url,seclists.org/fulldisclosure/2017/Feb/50; classtype:web-application-
attack; sid:41699; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN2200 ping.cgi command injection attempt"; flow:to_server,established;
content:"/ping.cgi"; nocase; http_uri; content:"ping_IPAddr="; fast_pattern:only;
http_uri; pcre:"/[?&]ping_IPAddr=[^&]*?([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28)/Ui";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2017-6077;
reference:url,seclists.org/fulldisclosure/2017/Feb/50; classtype:web-application-
attack; sid:41700; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
Binary file download request from internationalized domain name using Microsoft
BITS"; flow:to_server,established; content:"User-Agent|3A| Microsoft BITS";
http_header; content:"Host|3A 20|xn--"; fast_pattern:only; http_header; pcre:"/
(\x2ebat|\x2eexe)$/smiU"; metadata:policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; classtype:trojan-activity; sid:41710;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Houdini
variant initial outbound connection"; flow:to_server,established;
content:"new_slave|0D 0A|"; depth:11; offset:4; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,virustotal.com/en/file/8d75e47c04bb2cc0f4c2e973475d4ff1fc8f32039794e3
ea5ca2494c66d80d3f/analysis/; classtype:trojan-activity; sid:41711; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Houdini backdoor file download request"; flow:to_server,established;
content:"/ChromeSetup.bat"; fast_pattern:only; http_uri; content:"User-Agent|3A|
Microsoft BITS"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,virustotal.com/en/file/8d75e47c04bb2cc0f4c2e973475d4ff1fc8f32039794e3
ea5ca2494c66d80d3f/analysis/; classtype:trojan-activity; sid:41712; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
DotNetNuke installation attempt detected"; flow:to_server,established;
content:"/Install/InstallWizard.aspx"; fast_pattern:only; http_uri;
content:"executeinstall"; http_uri; metadata:ruleset community, service http;
reference:cve,2015-2794; reference:url,www.exploit-db.com/exploits/39777;
classtype:attempted-admin; sid:41713; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 4786 (msg:"SERVER-OTHER Cisco IOS Smart
Install protocol backup config command attempt"; flow:to_server,established;
content:"|00 00 00 01 00 00 00 01 00 00 00 08|"; depth:12; content:"://";
metadata:policy balanced-ips drop, policy connectivity-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community;
reference:url,tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-
sr-20170214-smi; classtype:attempted-admin; sid:41722; rev:4;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 4786 (msg:"SERVER-OTHER Cisco IOS Smart
Install protocol download config command attempt"; flow:to_server,established;
content:"|00 00 00 01 00 00 00 01 00 00 00 03|"; depth:12; content:"tftp://";
nocase; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy
max-detect-ips drop, policy security-ips drop, ruleset community;
reference:url,tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-
sr-20170214-smi; classtype:attempted-admin; sid:41723; rev:3;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 4786 (msg:"SERVER-OTHER Cisco IOS Smart
Install protocol download image command attempt"; flow:to_server,established;
content:"|00 00 00 01 00 00 00 01 00 00 00 02|"; depth:12; content:"tftp://";
nocase; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy
max-detect-ips drop, policy security-ips drop, ruleset community;
reference:url,tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-
sr-20170214-smi; classtype:attempted-admin; sid:41724; rev:3;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 4786 (msg:"SERVER-OTHER Cisco IOS Smart
Install protocol version command attempt"; flow:to_server,established; content:"|00
00 00 02 00 00 00 01 00 00 00 05|"; depth:12; content:"tftp://"; nocase;
metadata:policy balanced-ips drop, policy connectivity-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community; reference:cve,2018-0156;
reference:url,tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-
sa-20180328-smi;
reference:url,tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-
sr-20170214-smi; classtype:attempted-admin; sid:41725; rev:4;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN2200 dnslookup.cgi command injection attempt"; flow:to_server,established;
content:"/dnslookup.cgi"; fast_pattern:only; http_uri; content:"host_name"; nocase;
http_client_body; content:"Content-Disposition"; nocase; http_client_body;
pcre:"/name\s*=\s*[\x22\x27]?host_name((?!^--).)*?[\r\n]{2,}((?!^--).)*?
([\x60\x3b\x7c\x26]|[\x3c\x3e\x24]\x28)/Psim"; metadata:policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http; reference:cve,2017-6334;
classtype:web-application-attack; sid:41748; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN2200 dnslookup.cgi command injection attempt"; flow:to_server,established;
content:"/dnslookup.cgi"; fast_pattern:only; http_uri; content:"host_name=";
nocase; http_client_body; pcre:"/(^|&)host_name=[^&]*?([\x60\x3b\x7c]|
[\x3c\x3e\x24]\x28|%60|%3b|%7c|%26|%3c%28|%3e%28|%24%28)/Pim"; metadata:policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2017-6334; classtype:web-application-attack; sid:41749; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN2200 dnslookup.cgi command injection attempt"; flow:to_server,established;
content:"/dnslookup.cgi"; fast_pattern:only; http_uri; content:"host_name=";
nocase; http_uri; content:"%26"; http_raw_uri; pcre:"/[?&]host_name=[^&]*?%26/Ii";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2017-6334; classtype:web-application-attack; sid:41750;
rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN2200 dnslookup.cgi command injection attempt"; flow:to_server,established;
content:"/dnslookup.cgi"; fast_pattern:only; http_uri; content:"host_name=";
nocase; http_uri; pcre:"/[?&]host_name=[^&]*?([\x60\x3b\x7c]|
[\x3c\x3e\x24]\x28)/Ui"; metadata:policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; reference:cve,2017-6334; classtype:web-
application-attack; sid:41751; rev:3;)
alert tcp any any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows SMB remote
code execution attempt"; flow:to_server,established; content:"|FF|SMB3|00 00 00
00|"; depth:9; offset:4; byte_extract:2,26,TotalDataCount,relative,little;
byte_test:2,>,TotalDataCount,20,relative,little; metadata:policy balanced-ips drop,
policy connectivity-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service netbios-ssn; reference:cve,2017-0144;
reference:cve,2017-0146;
reference:url,blog.talosintelligence.com/2017/05/wannacry.html;
reference:url,isc.sans.edu/forums/diary/ETERNALBLUE+Possible+Window+SMB+Buffer+Over
flow+0Day/22304/; reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-
010; classtype:attempted-admin; sid:41978; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user-agent string - Andr.Trojan.Agent"; flow:to_server,established;
content:"User-Agent|3A| Ray-Downer|0D 0A|"; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/a3a849ef491a40c0fc1cb4c5e4769447da27ca0255
2a5fd270b9c2b8dbc0ff70/analysis/; classtype:trojan-activity; sid:42019; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.Agent variant outbound connection"; flow:to_server,established;
content:"/wroot/v3"; fast_pattern:only; http_uri; content:".do"; http_uri;
content:"uuid="; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/a3a849ef491a40c0fc1cb4c5e4769447da27ca0255
2a5fd270b9c2b8dbc0ff70/analysis/; classtype:trojan-activity; sid:42021; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Ransomware.Sage variant outbound connection"; flow:to_server,established;
content:"Host: mbfce24rgn65bx3g."; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/c1c31129a39441607c060a7da57855d3969cf47ce4
119cda9beaf65b63faca60/analysis/; classtype:trojan-activity; sid:42059; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Ismdoor variant outbound connection"; flow:to_server,established;
content:"User-Agent|3A| WinHttpClient"; fast_pattern:only; http_header;
content:"//Home/"; http_raw_uri; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,blog.vectranetworks.com/blog/an-analysis-of-the-shamoon-2-malware-
attack; classtype:trojan-activity; sid:42128; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Ismdoor variant outbound connection"; flow:to_server,established;
content:"commandId="; fast_pattern:only; http_uri; content:"/Home/"; depth:6;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,blog.vectranetworks.com/blog/an-analysis-of-the-shamoon-2-malware-
attack; classtype:trojan-activity; sid:42129; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [995,80,53,443] (msg:"MALWARE-CNC
Win.Trojan.RedLeaves outbound connection"; flow:established,to_server; dsize:12;
content:"|7A 8D 9B DC|"; depth:4; offset:4; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red
%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf; classtype:trojan-activity;
sid:42225; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 3389 (msg:"OS-WINDOWS Microsoft Windows
empty RDP cookie negotiation attempt"; flow:to_server,established; content:"|08 E0
00 00 00 00|"; depth:6; offset:4; content:"|0D 0A|"; within:2; distance:1;
isdataat:!1,relative; metadata:policy max-detect-ips drop, policy security-ips
drop, ruleset community, service rdp; reference:cve,2017-0176; reference:cve,2017-
9073; reference:url,www.securitytracker.com/id/1038264; classtype:policy-violation;
sid:42255; rev:4;)
alert tcp any any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows SMB anonymous
user session setup request detected"; flow:to_server,established; content:"|FF|SMB|
73 00 00 00 00|"; depth:13; offset:4; content:"|01 00 00 00 00 00 00 00|";
within:8; distance:38; content:"|00 00 00 00 00|"; within:5; distance:6;
flowbits:set,smb.null_session; flowbits:noalert; metadata:ruleset community,
service netbios-ssn; reference:url,msdn.microsoft.com/en-us/library/ee441638.aspx;
classtype:policy-violation; sid:42256; rev:4;)
alert tcp any any -> $HOME_NET 445 (msg:"MALWARE-CNC Win.Trojan.Doublepulsar
variant process injection command"; flow:to_server,established; content:"|FF|SMB|32
00 00 00 00|"; depth:9; offset:4; content:"|42 00|"; within:2; distance:21;
content:"|0E 00|"; within:2; distance:29; content:!"|00 00|"; within:2;
flowbits:set,smb.trans2.mid66; metadata:impact_flag red, policy balanced-ips drop,
policy max-detect-ips alert, policy security-ips drop, ruleset community, service
netbios-ssn; reference:url,countercept.com/our-thinking/analyzing-the-doublepulsar-
kernel-dll-injection-technique/;
reference:url,www.virustotal.com/file/15ffbb8d382cd2ff7b0bd4c87a7c0bffd1541c2fe8686
5af445123bc0b770d13/analysis/; classtype:trojan-activity; sid:42331; rev:3;)
alert tcp any any -> $HOME_NET 445 (msg:"MALWARE-CNC Win.Trojan.Doublepulsar
variant ping command"; flow:to_server,established; content:"|FF|SMB|32 00 00 00
00|"; depth:9; offset:4; content:"|41 00|"; within:2; distance:21; content:"|0E 00
0D 00 00 00 00 00 00 00 00 00 00 00 00 00 00|"; within:17; distance:29;
flowbits:set,smb.trans2.mid65; flowbits:noalert; metadata:policy max-detect-ips
alert, ruleset community, service netbios-ssn; reference:url,countercept.com/our-
thinking/analyzing-the-doublepulsar-kernel-dll-injection-technique/;
reference:url,www.virustotal.com/file/15ffbb8d382cd2ff7b0bd4c87a7c0bffd1541c2fe8686
5af445123bc0b770d13/analysis/; classtype:trojan-activity; sid:42332; rev:6;)
alert tcp any any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows SMB large NT
RENAME transaction request memory leak attempt"; flow:to_server,established;
content:"|FF|SMB|A0|"; depth:5; offset:4; content:"|05 00|"; within:2; distance:64;
byte_test:2,>,1024,0,relative,little; metadata:policy balanced-ips drop, policy
max-detect-ips drop, policy security-ips drop, ruleset community, service netbios-
ssn; reference:url,msdn.microsoft.com/en-us/library/ee441910.aspx;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-010;
classtype:attempted-recon; sid:42338; rev:3;)
alert tcp $HOME_NET 445 -> any any (msg:"OS-WINDOWS Microsoft Windows SMB possible
leak of kernel heap memory"; flow:to_client,established; content:"Frag";
fast_pattern; content:"Free"; content:"|FA FF FF|"; content:"|F8 FF FF|"; within:3;
distance:5; content:"|F8 FF FF|"; within:3; distance:5; metadata:policy balanced-
ips alert, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service netbios-ssn; reference:cve,2017-0147;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-010;
classtype:attempted-recon; sid:42339; rev:3;)
# alert tcp any any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows SMB
anonymous session IPC share access attempt"; flow:to_server,established;
flowbits:isset,smb.null_session; content:"|FF|SMB|75 00 00 00 00|"; depth:9;
offset:4; content:"|00 5C 00|I|00|P|00|C|00|$|00 00 00|"; fast_pattern:only;
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service netbios-ssn; reference:url,msdn.microsoft.com/en-us/library/ee441910.aspx;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-010;
classtype:attempted-recon; sid:42340; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [995,80,53,443] (msg:"MALWARE-CNC
Win.Trojan.RedLeaves outbound connection"; flow:to_server,established;
content:"856"; depth:3; offset:1; content:"856|9A F3 EC 89|"; within:7; distance:1;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community; reference:url,github.com/nccgroup/Cyber-
Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note
%20v1.0.pdf; classtype:trojan-activity; sid:42398; rev:3;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"OS-WINDOWS
Microsoft Malware Protection Engine type confusion attempt";
flow:to_client,established; file_data; content:"Error"; content:".toString.call";
within:50; fast_pattern; content:"message"; within:25; metadata:policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service ftp-data, service http, service imap, service pop3; reference:cve,2017-
0290; reference:url,technet.microsoft.com/en-us/library/security/4022344.aspx;
classtype:attempted-admin; sid:42820; rev:2;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"OS-WINDOWS Microsoft Malware
Protection Engine type confusion attempt"; flow:to_server,established; file_data;
content:"Error"; content:".toString.call"; within:50; fast_pattern;
content:"message"; within:25; metadata:policy balanced-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service smtp;
reference:cve,2017-0290; reference:url,technet.microsoft.com/en-
us/library/security/4022344.aspx; classtype:attempted-admin; sid:42821; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Chopper web shell connection"; flow:to_server,established; content:"X-
Forwarded-For"; nocase; http_header; content:"z9=base64%5fdecode";
fast_pattern:only; http_client_body; content:"=%40eval"; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,www.fireeye.com/blog/threat-
research/2013/08/breaking-down-the-china-chopper-web-shell-part-ii.html;
classtype:trojan-activity; sid:42834; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Chopper web shell connection"; flow:to_server,established; content:"X-
Forwarded-For"; nocase; http_header; content:"=edoced_46esab"; fast_pattern:only;
http_client_body; content:"z0="; http_client_body; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-
chopper-web-shell-part-ii.html; classtype:trojan-activity; sid:42835; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.Chopper web shell connection"; flow:to_server,established;
content:"=@eval(get_magic_quotes_gpc()?stripslashes($_POST["; fast_pattern:only;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-
chopper-web-shell-part-ii.html; classtype:trojan-activity; sid:42836; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP MVPower
DVR Shell arbitrary command execution attempt"; flow:to_server,established;
content:"/shell?"; fast_pattern:only; http_uri; urilen:>16,norm; metadata:policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; reference:url,www.pentestpartners.com/blog/pwning-cctv-
cameras/; classtype:attempted-admin; sid:42857; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Deputy Dog
implant outbound connection"; flow:established,to_server; content:"Connect.php?
id="; fast_pattern:only; http_uri; content:"SessionID:"; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; classtype:trojan-activity; sid:42880; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Deputy Dog
implant outbound connection"; flow:to_server,established; content:"/JP-ja/js?";
fast_pattern:only; http_uri; content:"SessionID:"; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:42881; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC ZoxPNG
initial outbound connection"; flow:established, to_server; content:"/search?
q=Google&go=&qs=n&form="; fast_pattern:only; http_uri; content:"pq=google&sc=8-
1&sp=-1&sk="; http_uri; content:"Cookie|3A 20|SESSIONID="; nocase; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:42882; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.MadMax implant outbound connection attempt"; flow:established,to_server;
content:"/mm.jpg"; depth:7; fast_pattern; http_uri; content:"User-Agent|3A 20|
Mozilla/5.0 (compatible"; http_header; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:42883; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.MadMax implant outbound connection"; flow:established,to_server;
content:"/logon.aspx?Id="; fast_pattern:only; http_uri; content:"Cookie|3A 20|
SessionData="; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:42884; rev:2;)
alert tcp $HOME_NET any <> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC WashingTon
ssl certificate negotiation attempt"; flow:to_server,established;
content:"WashingTon"; fast_pattern:only; content:"[email protected]";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:42885; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
Win.Trojan.Agent malicious user agent"; flow:to_server,established; content:"User-
Agent|3A| HttpBrowser/1.0"; fast_pattern:only; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http; classtype:trojan-activity; sid:42886; rev:2;)
alert tcp any any -> $HOME_NET 445 (msg:"OS-WINDOWS Microsoft Windows SMB remote
code execution attempt"; flow:to_server,established; content:"|FF|SMB|A0 00 00 00
00|"; depth:9; offset:4; content:"|01 00 00 00 00|"; within:5; distance:59;
byte_test:4,>,0x8150,-33,relative,little; metadata:policy balanced-ips drop, policy
connectivity-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service netbios-ssn; reference:cve,2017-0144;
reference:cve,2017-0146;
reference:url,isc.sans.edu/forums/diary/ETERNALBLUE+Possible+Window+SMB+Buffer+Over
flow+0Day/22304/; reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-
010; classtype:attempted-admin; sid:42944; rev:2;)
alert tcp any any -> $HOME_NET 445 (msg:"PROTOCOL-OTHER NETBIOS SMB IPC share
access attempt"; flow:to_server,established; content:"|FF|SMB|75 00 00 00 00|";
depth:9; offset:4; content:"IPC$|00|"; fast_pattern:only;
flowbits:set,smb.tree.connect.ipc; flowbits:noalert; metadata:ruleset community,
service netbios-ssn; classtype:misc-activity; sid:43002; rev:4;)
alert tcp any any -> $HOME_NET 445 (msg:"PROTOCOL-OTHER NETBIOS SMB IPC share
access attempt"; flow:to_server,established; content:"|FF|SMB|75 00 00 00 00|";
depth:9; offset:4; content:"I|00|P|00|C|00|$|00 00 00|"; fast_pattern:only;
flowbits:set,smb.tree.connect.ipc; flowbits:noalert; metadata:ruleset community,
service netbios-ssn; classtype:misc-activity; sid:43003; rev:4;)
alert tcp any any -> $HOME_NET 445 (msg:"SERVER-SAMBA Samba is_known_pipe arbitrary
module load code execution attempt"; flow:to_server,established;
flowbits:isset,smb.tree.connect.ipc; content:"|FF|SMB|A2 00 00 00 00|"; depth:9;
offset:4; byte_extract:2,72,len,relative,little; content:"/"; within:1;
content:"/"; within:len; distance:1; metadata:policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service netbios-ssn;
reference:cve,2017-7494; reference:url,www.samba.org/samba/security/CVE-2017-
7494.html; classtype:attempted-user; sid:43004; rev:4;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kabob outbound connection"; flow:to_server,established; content:"@|E9 03
00 00 00 00 00 00 00 00 64|"; fast_pattern:only; http_client_body;
pcre:"/\/\d{8}\/\w{4}\/[A-F0-9]{4}\/[A-F0-9]{4}\/[A-Z0-9\-_~]{12}\.[aj]sp/Ui";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:43063; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.HiddenCobra variant outbound connection"; flow:to_server,established;
content:"|18 17 E9 E9 E9 E9|"; fast_pattern:only; isdataat:!7; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community;
reference:url,www.us-cert.gov/ncas/alerts/TA17-164A; classtype:trojan-activity;
sid:43193; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.HiddenCobra variant outbound connection"; flow:to_server,established;
content:"|1B 17 E9 E9 E9 E9|"; depth:6; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community; reference:url,www.us-
cert.gov/ncas/alerts/TA17-164A; classtype:trojan-activity; sid:43194; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/.svn/entries file access attempt"; flow:to_server,established;
content:"/.svn/entries"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:43285; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/cgi-bin/sh file access attempt"; flow:to_server,established; content:"/cgi-
bin/sh"; fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:43286; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/etc/inetd.conf file access attempt"; flow:to_server,established;
content:"/etc/inetd.conf"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:43287; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/etc/motd file access attempt"; flow:to_server,established; content:"/etc/motd";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
classtype:attempted-recon; sid:43288; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/etc/shadow file access attempt"; flow:to_server,established;
content:"/etc/shadow"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:43289; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
/ws_ftp.log file access attempt"; flow:to_server,established;
content:"/ws_ftp.log"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:attempted-recon; sid:43290; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP
Oracle Application Server 9i unauthenticated application deployment attempt";
flow:to_server,established; content:"/soap/soaplet/soaprouter"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:cve,2001-1371;
classtype:attempted-recon; sid:43291; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"POLICY-OTHER Teleopti
WFM database information request detected"; flow:to_server,established;
content:"/TeleoptiWFM/Administration/GetOneTenant"; fast_pattern:only; http_uri;
metadata:ruleset community, service http;
reference:url,seclists.org/fulldisclosure/2017/Feb/13; classtype:attempted-recon;
sid:43562; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"POLICY-OTHER Teleopti
WFM administrative user credentials request detected"; flow:to_server,established;
content:"/TeleoptiWFM/Administration/Users"; fast_pattern:only; http_uri;
metadata:ruleset community, service http;
reference:url,seclists.org/fulldisclosure/2017/Feb/13; classtype:attempted-recon;
sid:43563; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"POLICY-OTHER Teleopti
WFM administrative user creation detected"; flow:to_server,established;
content:"/TeleoptiWFM/Administration/AddFirstUser"; fast_pattern:only; http_uri;
metadata:ruleset community, service http;
reference:url,seclists.org/fulldisclosure/2017/Feb/13; classtype:attempted-admin;
sid:43564; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"SERVER-OTHER WSFTP IpSwitch
custom SITE command execution attempt"; flow:to_server,established; content:"SITE
SETC"; nocase; metadata:ruleset community, service ftp; reference:cve,2004-1885;
classtype:attempted-admin; sid:43663; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 9080 (msg:"SERVER-WEBAPP Kaspersky Linux
File Server WMC cross site request forgery attempt"; flow:to_server,established;
content:"/cgi-bin/cgictl?action=setTaskSettings"; fast_pattern:only; http_uri;
content:"settings={|22|"; nocase; http_client_body; content:"taskId=";
http_client_body; metadata:policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http; reference:bugtraq,99330; reference:cve,2017-9810;
reference:url,coresecurity.com/advisories/Kaspersky-Anti-Virus-File-Server-
Multiple-Vulnerabilities; classtype:web-application-attack; sid:43809; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 9080 (msg:"SERVER-WEBAPP Kaspersky Linux
File Server WMC directory traversal attempt"; flow:to_server,established;
content:"/cgi-bin/cgictl"; fast_pattern:only; http_uri; content:"reportId=";
nocase; http_uri; content:"../"; http_uri; pcre:"/[?
&]reportId=[^&]*?\x2e\x2e\x2f/Ui"; metadata:policy max-detect-ips drop, policy
security-ips drop, ruleset community, service http; reference:bugtraq,99330;
reference:cve,2017-9812; reference:url,coresecurity.com/advisories/Kaspersky-Anti-
Virus-File-Server-Multiple-Vulnerabilities; classtype:web-application-attack;
sid:43810; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
Kaspersky Linux File Server WMC directory traversal attempt";
flow:to_server,established; content:"/cgi-bin/cgictl"; fast_pattern:only; http_uri;
content:"reportId="; nocase; http_client_body; pcre:"/(^|&)reportId=[^&]*?(\x2e|
%2e){2}([\x2f\x5c]|%2f|%5c)/Pim"; metadata:policy max-detect-ips drop, policy
security-ips drop, ruleset community, service http; reference:bugtraq,99330;
reference:cve,2017-9812; reference:url,coresecurity.com/advisories/Kaspersky-Anti-
Virus-File-Server-Multiple-Vulnerabilities; classtype:web-application-attack;
sid:43811; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
Kaspersky Linux File Server WMC directory traversal attempt";
flow:to_server,established; content:"/cgi-bin/cgictl"; fast_pattern:only; http_uri;
content:"reportId"; nocase; http_client_body; content:"Content-Disposition";
nocase; http_client_body; pcre:"/name\s*=\s*[\x22\x27]?reportId((?!
^--).)*?\x2e\x2e[\x2f\x5c]/Psim"; metadata:policy max-detect-ips drop, policy
security-ips drop, ruleset community, service http; reference:bugtraq,99330;
reference:cve,2017-9812; reference:url,coresecurity.com/advisories/Kaspersky-Anti-
Virus-File-Server-Multiple-Vulnerabilities; classtype:web-application-attack;
sid:43812; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
Kaspersky Linux File Server WMC cross site scripting attempt";
flow:to_server,established; content:"/cgi-bin/cgictl"; fast_pattern:only; http_uri;
content:"scriptName="; nocase; http_uri; pcre:"/[?&]scriptName=[^&]*?
([\x22\x27\x3c\x3e\x28\x29]|script|onload|src)/Ui"; metadata:ruleset community,
service http; reference:bugtraq,99330; reference:cve,2017-9813;
reference:url,coresecurity.com/advisories/Kaspersky-Anti-Virus-File-Server-
Multiple-Vulnerabilities; classtype:attempted-user; sid:43813; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Osx.Trojan.XAgent outbound connection"; flow:to_server,established;
content:"(unknown version)"; http_header; content:"Darwin/"; within:30;
http_header; content:"Accept|3A 20|*/*|0D 0A|"; http_header; pcre:"/\/(search|find|
results|open|search|close|watch)\/\x3f[a-zA-Z0-9]{2,8}\x3d/Ui"; content:!"Referer";
http_header; metadata:impact_flag red, ruleset community, service http;
reference:url,contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-
samples.html;
reference:url,download.bitdefender.com/resources/files/News/CaseStudies/study/143/B
itdefender-Whitepaper-APT-Mac-A4-en-EN-web.pdf; classtype:trojan-activity;
sid:43825; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Ubiquiti
Networks UniFi Cloud Key Firm v0.6.1 Host Remote Command Execution attempt";
flow:to_server,established; urilen:11,norm; content:"/api/status";
fast_pattern:only; http_uri; pcre:"/^Host\x3A[^\x0a]*?([\x60\x3b\x7c]|
[\x3c\x3e\x24]\x28|%60|%3b|%7c|%26|%3c%28|%3e%28|%24%28)/Him"; metadata:ruleset
community, service http; reference:url,cxsecurity.com/issue/WLB-2017080038;
classtype:web-application-attack; sid:43957; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection"; flow:to_server,established;
content:"/gate.php"; fast_pattern:only; http_uri; content:"WebKitFormBoundary";
http_header; content:"name=|22|getconfig|22|"; content:"Referer|3A 20|";
http_header; content:"Connection|3A 20|close|0D 0A|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,virustotal.com/#/file/01092ea6b5eb749254cf61a58c7c8fe5f67001976432712
02fe420ac7cc68d1f/detection; classtype:trojan-activity; sid:43972; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.Femas variant outbound connection"; flow:to_server,established;
content:"did="; http_client_body; content:"/update/upfolder/updatefun.php";
fast_pattern:only; http_uri; content:"Dalvik/"; http_header; content:"Android";
within:25; http_header; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,blog.lookout.com/blog/2017/02/16/viperrat-mobile-apt/;
reference:url,securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-
strongest-chain/; classtype:trojan-activity; sid:43981; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.Femas variant outbound connection"; flow:to_server,established;
content:"did="; http_client_body; content:"/pockemon/squirtle/functions.php";
fast_pattern:only; http_uri; content:"Dalvik/"; http_header; content:"Android";
within:25; http_header; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,blog.lookout.com/blog/2017/02/16/viperrat-mobile-apt/;
reference:url,securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-
strongest-chain/; classtype:trojan-activity; sid:43982; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"POLICY-OTHER Cisco
DDR2200 ASDL gateway file download detected"; flow:to_server,established;
content:"download.conf"; fast_pattern:only; http_uri; content:"filename="; nocase;
http_uri; metadata:ruleset community, service http; reference:cve,2017-11587;
reference:url,seclists.org/fulldisclosure/2017/Jul/26; classtype:web-application-
attack; sid:44004; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Cisco
DDR2200 ADSL gateway command injection attempt"; flow:to_server,established;
content:"waitPingqry"; fast_pattern:only; http_uri; content:"pingAddr="; nocase;
http_uri; pcre:"/[?&]pingAddr=[^&]*?([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28)/Ui";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2017-11588;
reference:url,seclists.org/fulldisclosure/2017/Jul/26; classtype:web-application-
attack; sid:44005; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Cisco
DDR2200 ADSL gateway command injection attempt"; flow:to_server,established;
content:"waitPingqry"; fast_pattern:only; http_uri; content:"pingAddr="; nocase;
http_uri; content:"%26"; http_raw_uri; pcre:"/[?&]pingAddr=[^&]*?%26/Ii";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2017-11588;
reference:url,seclists.org/fulldisclosure/2017/Jul/26; classtype:web-application-
attack; sid:44006; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Cisco
DDR2200 ADSL gateway command injection attempt"; flow:to_server,established;
content:"waitPingqry"; fast_pattern:only; http_uri; content:"pingAddr="; nocase;
http_client_body; pcre:"/(^|&)pingAddr=[^&]*?([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28|
%60|%3b|%7c|%26|%3c%28|%3e%28|%24%28)/Pim"; metadata:policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http; reference:cve,2017-
11588; reference:url,seclists.org/fulldisclosure/2017/Jul/26; classtype:web-
application-attack; sid:44007; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Cisco
DDR2200 ADSL gateway command injection attempt"; flow:to_server,established;
content:"waitPingqry"; fast_pattern:only; http_uri; content:"pingAddr"; nocase;
http_client_body; content:"Content-Disposition"; nocase; http_client_body;
pcre:"/name\s*=\s*[\x22\x27]?pingAddr((?!^--).)*?[\r\n]{2,}((?!^--).)*?
([\x60\x3b\x7c\x26]|[\x3c\x3e\x24]\x28)/Psim"; metadata:policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,seclists.org/fulldisclosure/2017/Jul/26; classtype:web-application-
attack; sid:44008; rev:2;)
alert tcp $EXTERNAL_NET [443,447,449] -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Trickbot self-signed certificate exchange"; flow:to_client,established;
content:"|16 03|"; content:"|30 82|"; distance:13; content:"3t2t3rgeg";
content:"fg2eq34df"; fast_pattern:only; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service ssl;
reference:url,virustotal.com/#/file/604bd405cf8edd910b25c52b63ab7e4b6c2242bc6eaf6ec
a4cccb718e1d291e2; classtype:trojan-activity; sid:44399; rev:1;)
alert tcp $EXTERNAL_NET [443,447,449] -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Trickbot self-signed certificate exchange"; flow:to_client,established;
content:"|16 03|"; content:"|30 82|"; distance:13; content:"f2tee4";
content:"rvgvtfdf"; fast_pattern:only; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service ssl;
reference:url,virustotal.com/#/file/604bd405cf8edd910b25c52b63ab7e4b6c2242bc6eaf6ec
a4cccb718e1d291e2; classtype:trojan-activity; sid:44400; rev:1;)
alert tcp $EXTERNAL_NET [443,447,449] -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Trickbot self-signed certificate exchange"; flow:to_client,established;
content:"|16 03|"; content:"|30 82|"; distance:13; content:"|00 92 93 45 3A 42 8B
15 4C|"; fast_pattern:only; content:"London"; content:"example.com";
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service ssl; reference:url,malware-traffic-
analysis.net/2017/08/12/index.html; classtype:trojan-activity; sid:44401; rev:1;)
alert tcp $EXTERNAL_NET [443,447,449] -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Trickbot self-signed certificate exchange"; flow:to_client,established;
content:"|16 03|"; content:"|30 82|"; distance:13; content:"|00 DC 5E AE E6 3E EC
78 EC|"; content:"Alaska"; content:"[email protected]"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service ssl;
reference:url,virustotal.com/en/file/70041c335a374d84f64c6c31d59ff09bd8473fd049cfcb
46fe085d1eb92ac0b8/analysis/1502073944/; classtype:trojan-activity; sid:44402;
rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Potential
hostile executable served from compromised or malicious WordPress site attempt";
flow:to_server,established; content:"/wp-admin"; fast_pattern:only; http_uri;
pcre:"/(exe|dll|scr|rar|ps1|bat)$/Ui"; metadata:impact_flag red, policy security-
ips drop, ruleset community, service http;
reference:url,blog.avast.com/2013/05/03/regents-of-louisiana-spreading-sirefef-
malware; classtype:trojan-activity; sid:44469; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Potential
hostile executable served from compromised or malicious WordPress site attempt";
flow:to_server,established; content:"/wp-includes"; fast_pattern:only; http_uri;
pcre:"/(exe|dll|scr|rar|ps1|bat)$/Ui"; metadata:impact_flag red, policy security-
ips drop, ruleset community, service http;
reference:url,blog.avast.com/2013/05/03/regents-of-louisiana-spreading-sirefef-
malware; classtype:trojan-activity; sid:44470; rev:1;)
alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.PandaZeus
malicious certificate exchange"; flow:to_client,established; content:"|16 03|";
content:"|30 82|"; within:2; distance:13; content:"Let's Encrypt";
content:"gloverkentok.us"; fast_pattern:only; metadata:impact_flag red, policy
balanced-ips drop, policy security-ips drop, ruleset community, service ssl;
reference:url,virustotal.com/#/file/220a2b2d7353a697496abcabf1b4c1990b8c9b7143e6dad
a17782ddd9ee2c232; classtype:trojan-activity; sid:44591; rev:1;)
alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.PandaZeus
self-signed certificate exchange"; flow:to_client,established; content:"|16 03|";
content:"|30 82|"; within:2; distance:13; content:"My Company Name LTD.";
content:"domain.com"; fast_pattern:only; metadata:impact_flag red, policy balanced-
ips drop, policy security-ips drop, ruleset community, service ssl;
reference:url,virustotal.com/#/file/00fa65c8fced0abfab3f544801014a349f7d960819d8d79
c47abe090bd75ccfc; classtype:trojan-activity; sid:44592; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 8291 (msg:"SERVER-OTHER Mikrotik
RouterOS denial of service attempt"; flow:to_server,established; content:"|12 02|";
depth:2; content:"|FF ED 00 00 00 00|"; distance:0; metadata:ruleset community;
reference:cve,2012-6050; classtype:denial-of-service; sid:44643; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Zusy
variant outbound connection"; flow:to_server,established;
content:"/QualityCheck/ni6.php"; fast_pattern:only; http_uri; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/en/file/5dea4247e021eeeb1347ff269a357dee77e8ac1837
383b0ef37fb123339639a1/analysis/; classtype:trojan-activity; sid:44652; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"POLICY-OTHER NetSupport
Manager RAT outbound connection detected"; flow:to_server,established;
content:"User-Agent|3A| NetSupport Manager/"; fast_pattern:only; content:"CMD=";
metadata:ruleset community, service http;
reference:url,www.virustotal.com/#/file/b87ef28981defd135496e25233cc7a47a376a75ddea
97fcd4c0927995dd22e47/detection; classtype:trojan-activity; sid:44678; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN1000 series routers authentication bypass attempt"; flow:to_server,established;
content:"/setup.cgi"; nocase; http_uri; content:"currentsetting.htm";
fast_pattern:only; http_uri; metadata:policy balanced-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:bugtraq,60281; reference:url,www.exploit-db.com/exploits/25978/;
classtype:attempted-admin; sid:44687; rev:3;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN1000 series routers arbitrary command execution attempt";
flow:to_server,established; content:"/setup.cgi"; nocase; http_uri;
content:"todo=syscmd"; fast_pattern:only; content:"cmd="; nocase; metadata:policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; reference:bugtraq,60281; reference:url,www.exploit-
db.com/exploits/25978/; classtype:attempted-admin; sid:44688; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gen variant outbound connection"; flow:established,to_server;
content:"/aspnet_client/system_web/4_0_30319/update/"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,us-cert.gov/ncas/alerts/TA17-293A;
classtype:trojan-activity; sid:44689; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Internal
field separator use in HTTP URI attempt"; flow:to_server,established;
content:"$IFS"; http_uri; metadata:ruleset community, service http; classtype:web-
application-attack; sid:44698; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Internal
field separator use in HTTP URI attempt"; flow:to_server,established; content:"$
{IFS}"; http_uri; metadata:ruleset community, service http; classtype:web-
application-attack; sid:44699; rev:2;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1900 (msg:"SERVER-OTHER libupnp command
buffer overflow attempt"; flow:to_server; content:"NOTIFY "; depth:7; content:"|3A|
device|3A|"; isdataat:180,relative; content:!"|3A|"; within:180; metadata:policy
security-ips drop, ruleset community, service ssdp; reference:cve,2012-5958;
reference:cve,2012-5962; classtype:attempted-admin; sid:44743; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.KopiLuwak variant outbound request detected";
flow:to_server,established; content:"User-Agent|3A|"; http_header;
content:"Mozilla/5.0 (Windows NT 6.1|3B| Win64|3B| x64)|3B| "; distance:0;
fast_pattern; http_header; pcre:"/Win64\x3B\sx64\x29\x3B\s[0-9]
{16}\w{16}\x0D\x0A/iH"; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,securelist.com/blog/research/77429/kopiluwak-a-new-javascript-
payload-from-turla/; classtype:trojan-activity; sid:44762; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.KopiLuwak variant outbound request detected";
flow:to_server,established; content:"%D0%8BTl%DC"; depth:11; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,www.proofpoint.com/us/threat-
insight/post/turla-apt-actor-refreshes-kopiluwak-javascript-backdoor-use-g20-
themed-attack; classtype:trojan-activity; sid:44763; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP MikroTik
RouterOS cross site request forgery attempt"; flow:to_server,established;
content:"/cfg"; fast_pattern:only; http_uri; content:"process=password"; nocase;
http_uri; content:"password1="; nocase; http_uri; content:"password2="; nocase;
http_uri; content:"button="; nocase; http_uri; metadata:ruleset community, service
http; reference:bugtraq,73013; reference:cve,2015-2350; classtype:policy-violation;
sid:44790; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 9251 (msg:"SERVER-OTHER QNAP transcode
server command injection attempt"; flow:to_server,established; content:"|01 00 00
00|"; depth:4; content:"|7C|"; distance:0; content:"|09|"; within:50;
metadata:ruleset community; reference:url,www.qnap.com/en-us/; classtype:attempted-
admin; sid:44971; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
WNR2000 information leak attempt"; flow:to_server,established;
content:"/BRS_netgear_success.html"; fast_pattern:only; http_uri; metadata:policy
max-detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2016-10175; reference:url,seclists.org/fulldisclosure/2016/Dec/72;
classtype:attempted-recon; sid:45001; rev:3;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Neuron variant inbound service request detected";
flow:to_server,established; content:"/ews/exchange/"; fast_pattern:only; http_uri;
content:"cadata="; http_client_body; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.ncsc.gov.uk/alerts/turla-group-malware; classtype:trojan-
activity; sid:45062; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Neuron variant inbound service request detected";
flow:to_server,established; content:"/ews/exchange/"; fast_pattern:only; http_uri;
content:"cadata="; http_client_body; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.ncsc.gov.uk/alerts/turla-group-malware; classtype:trojan-
activity; sid:45063; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Neuron variant inbound service request detected";
flow:to_server,established; content:"/W3SVC"; fast_pattern:only; http_uri;
content:"cadata="; http_client_body; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.ncsc.gov.uk/alerts/turla-group-malware; classtype:trojan-
activity; sid:45064; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Neuron variant inbound service request detected";
flow:to_server,established; content:"/W3SVC"; fast_pattern:only; http_uri;
content:"cadata="; http_client_body; metadata:impact_flag red, policy balanced-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.ncsc.gov.uk/alerts/turla-group-malware; classtype:trojan-
activity; sid:45065; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.StoneDrill server selection outbound connection";
flow:to_server,established; content:"public/Check_Exist.php"; fast_pattern:only;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,securelist.com/files/2017/03/Report_Shamoon_StoneDrill_final.pdf;
classtype:trojan-activity; sid:45090; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.StoneDrill login outbound connection"; flow:to_server,established;
content:"username=MD5Sum"; fast_pattern:only; http_client_body;
content:"password=MD5Sum"; http_client_body; content:"button=Login";
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,securelist.com/files/2017/03/Report_Shamoon_StoneDrill_final.pdf;
classtype:trojan-activity; sid:45091; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Backdoor.StoneDrill get commands outbound connection";
flow:to_server,established; content:"/insert/index?"; fast_pattern:only; http_uri;
content:"id="; http_uri; content:"hst="; http_uri; content:"ttype="; http_uri;
content:"state="; http_uri; metadata:impact_flag red, policy balanced-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,securelist.com/files/2017/03/Report_Shamoon_StoneDrill_final.pdf;
classtype:trojan-activity; sid:45092; rev:1;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 1900 (msg:"SERVER-OTHER SSDP M-SEARCH
ssdp-all potential amplified distributed denial-of-service attempt";
flow:to_server,no_stream; content:"M-SEARCH"; depth:9; content:"ssdp:all";
fast_pattern:only; detection_filter:track by_src,count 50,seconds 1;
metadata:ruleset community, service ssdp; reference:cve,2013-5211;
reference:url,www.us-cert.gov/ncas/alerts/TA14-017A; classtype:attempted-dos;
sid:45157; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
Osx.Adware.SurfBuyer adware outbound connection detected";
flow:to_server,established; content:"/report/?application="; fast_pattern:only;
http_uri; content:"guid="; http_uri; content:"details="; http_uri;
content:"action="; http_uri; metadata:policy security-ips drop, ruleset community,
service http;
reference:url,virustotal.com/en/file/baed00c6e6b157f3a53c76a200de84927f5c9d448cf764
38c55d62c18033ba1b/analysis/; classtype:trojan-activity; sid:45397; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
Osx.Adware.SurfBuyer adware outbound connection detected";
flow:to_server,established; urilen:>1000; content:"/click?h="; fast_pattern:only;
http_uri; content:"subid="; http_uri; content:"data_fb="; http_uri;
content:"data_rtt="; http_uri; content:"data_proto="; http_uri; content:"data_ic=";
http_uri; content:"data_ss="; http_uri; metadata:policy security-ips drop, ruleset
community, service http;
reference:url,virustotal.com/en/file/baed00c6e6b157f3a53c76a200de84927f5c9d448cf764
38c55d62c18033ba1b/analysis/; classtype:trojan-activity; sid:45398; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Osx.Trojan.OceanLotus outbound connection attempt"; flow:to_server,established;
content:"/sigstore.db?"; fast_pattern:only; content:"k="; http_uri; content:"?q=";
distance:0; http_uri; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-
application-bundle-pretending-to-be-an-adobe-flash-update; classtype:trojan-
activity; sid:45400; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"POLICY-OTHER
TrendMicro ServerProtect server configuration file download detected";
flow:to_server,established; content:"/activeupdate/ini_xml.zip"; fast_pattern:only;
http_uri; metadata:ruleset community, service http; reference:cve,2017-9035;
reference:url,www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-
vulnerabilities; classtype:attempted-recon; sid:45411; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Asus RT-
AC88U deleteOfflineClients memory corruption attempt"; flow:to_server,established;
urilen:>64; content:"/deleteOfflineClient.cgi"; fast_pattern:only; http_uri;
content:"delete_offline_client="; http_uri; pcre:"/[?&]delete_offline_client=[^&]
{14}/Ui"; metadata:policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; reference:cve,2017-12754; classtype:attempted-admin;
sid:45412; rev:3;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
Osx.Adware.Mughthesec outbound connection attempt"; flow:to_server,established;
content:"/screens/"; fast_pattern; http_uri; content:"/"; within:1; distance:8;
http_uri; content:"=="; within:2; distance:6; http_uri; metadata:ruleset community,
service http; reference:url,objective-see.com/blog/blog_0x20.html;
classtype:trojan-activity; sid:45545; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP MikroTik
RouterOS jsproxy readPostData memory corruption attempt";
flow:to_server,established; content:"/jsproxy"; depth:8; fast_pattern; nocase;
http_uri; content:"|0D 0A|Content-Length: "; nocase;
byte_test:10,>,0x20000,0,relative,string,dec; metadata:policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,forum.mikrotik.com/viewtopic.php?t=119308; classtype:attempted-admin;
sid:45555; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Unix.Trojan.Vpnfilter variant outbound connection attempt";
flow:to_server,established; content:"User-Agent: Mozilla/6.1 (compatible|3B| MSIE
9.0|3B| Windows NT 5.3|3B| Trident/5.0)|0D 0A|"; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,blog.talosintelligence.com/2018/05/VPNFilter.html; classtype:trojan-
activity; sid:45563; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Unix.Trojan.Vpnfilter variant outbound connection attempt";
flow:to_server,established; content:"User-Agent: Mozilla/5.0|0D 0A|Host: ";
fast_pattern:only; http_header; content:"Accept: */*|0D 0A|Content-Type:
application/x-www-form-urlencoded|0D 0A 0D 0A|"; http_header; content:!"Cookie:";
http_header; content:!"Referer:"; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,blog.talosintelligence.com/2018/05/VPNFilter.html; classtype:trojan-
activity; sid:45564; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Rokrat variant outbound connection detected";
flow:to_server,established; content:".php?id="; http_uri; content:"fp_vs=";
fast_pattern:only; http_uri; content:"os_vs="; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/#/file/3004196da6055c6f062c94a9aae8dc357fa19b953b0
71049083e69e840083cf9/detection; classtype:trojan-activity; sid:45607; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 1025: (msg:"MALWARE-CNC Vbs.Trojan.Agent
outbound connection"; flow:to_server,established; content:"Content-Length: 0";
fast_pattern:only; content:"User-Agent"; content:"|2D 7C 2D|"; within:10;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community;
reference:url,blog.talosintelligence.com/2018/02/targeted-attacks-in-middle-
east.html;
reference:url,virustotal.com/en/file/15f5aaa71bfa3d62fd558a3e88dd5ba26f7638bf2ac653
b8d6b8d54dc7e5926b/analysis/; classtype:trojan-activity; sid:45642; rev:2;)
alert tcp $EXTERNAL_NET 1025: -> $HOME_NET any (msg:"MALWARE-CNC Vbs.Trojan.Agent
inbound payload download"; flow:to_client,established; content:"s0|2D 7C 2D|";
fast_pattern:only; content:"Content-Length"; content:"s0|2D 7C 2D|"; within:200;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community;
reference:url,blog.talosintelligence.com/2018/02/targeted-attacks-in-middle-
east.html;
reference:url,virustotal.com/en/file/15f5aaa71bfa3d62fd558a3e88dd5ba26f7638bf2ac653
b8d6b8d54dc7e5926b/analysis/; classtype:trojan-activity; sid:45643; rev:3;)
alert tcp $EXTERNAL_NET 1025: -> $HOME_NET any (msg:"MALWARE-CNC Vbs.Trojan.Agent
inbound payload download"; flow:to_client,established; content:"s1|2D 7C 2D|";
fast_pattern:only; content:"Content-Length"; content:"s1|2D 7C 2D|"; within:200;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community;
reference:url,blog.talosintelligence.com/2018/02/targeted-attacks-in-middle-
east.html;
reference:url,virustotal.com/en/file/15f5aaa71bfa3d62fd558a3e88dd5ba26f7638bf2ac653
b8d6b8d54dc7e5926b/analysis/; classtype:trojan-activity; sid:45644; rev:3;)
alert tcp $EXTERNAL_NET 1025: -> $HOME_NET any (msg:"MALWARE-CNC Vbs.Trojan.Agent
inbound payload download"; flow:to_client,established; content:"s2|2D 7C 2D|";
fast_pattern:only; content:"Content-Length"; content:"s3|2D 7C 2D|"; within:200;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community;
reference:url,blog.talosintelligence.com/2018/02/targeted-attacks-in-middle-
east.html;
reference:url,virustotal.com/en/file/15f5aaa71bfa3d62fd558a3e88dd5ba26f7638bf2ac653
b8d6b8d54dc7e5926b/analysis/; classtype:trojan-activity; sid:45645; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 1025: (msg:"MALWARE-CNC Vbs.Trojan.Agent
outbound system information disclosure"; flow:to_server,established;
content:"POST /is-return "; depth:16; fast_pattern; content:"User-Agent";
content:"|2D 7C 2D|"; within:10; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community;
reference:url,blog.talosintelligence.com/2018/02/targeted-attacks-in-middle-
east.html;
reference:url,virustotal.com/en/file/15f5aaa71bfa3d62fd558a3e88dd5ba26f7638bf2ac653
b8d6b8d54dc7e5926b/analysis/; classtype:trojan-activity; sid:45646; rev:3;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.Silverstar outbound connection"; flow:to_server,established;
content:"response=fallback"; fast_pattern:only; http_uri; content:"/api.php?";
depth:9; http_uri; content:"gpu="; nocase; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/#/file/3f751799a501532f43ca5f12fe80aa0bad78f9f5d57
e76bf49b401bb99f355df/detection; classtype:trojan-activity; sid:45960; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Revenge
RAT initial outbound connection"; flow:to_server,established;
content:"Information"; depth:11; content:"false|2A 2D 5D|NK|5B 2D 2A|";
fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/518f7803ad1b8e630f50719d7cb3638ea5d67fa4d4
387a55f44ddca4ef55a3ee/analysis/;
reference:url,www.virustotal.com/en/file/79bdbf9ec639d5ccf3992e9c9fe9eeba21d191dc16
8194a80b50f3aa8068892a/analysis/;
reference:url,www.virustotal.com/en/file/edb115dd5ca7c7f9dd069746daa0a4ee6298bf94de
62510d3f8bebfa5f5a8bcd/analysis/; classtype:trojan-activity; sid:45961; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Revenge
RAT inbound heartbeat check"; flow:to_client,established; content:"PNC|2A 2D 5D|NK|
5B 2D 2A|"; depth:11; metadata:impact_flag red, policy balanced-ips drop, policy
max-detect-ips drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/518f7803ad1b8e630f50719d7cb3638ea5d67fa4d4
387a55f44ddca4ef55a3ee/analysis/;
reference:url,www.virustotal.com/en/file/79bdbf9ec639d5ccf3992e9c9fe9eeba21d191dc16
8194a80b50f3aa8068892a/analysis/;
reference:url,www.virustotal.com/en/file/edb115dd5ca7c7f9dd069746daa0a4ee6298bf94de
62510d3f8bebfa5f5a8bcd/analysis/; classtype:trojan-activity; sid:45962; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.UDPOS outbound command and control IP address check";
flow:to_server,established; content:"/index.php?udpool="; fast_pattern:only;
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,blogs.forcepoint.com/security-labs/udpos-exfiltrating-credit-card-
data-dns;
reference:url,www.virustotal.com/#/file/62688903adfc719c5514f25a17563547aac48019598
52f5d49faa93967ce86cf/detection; classtype:trojan-activity; sid:45963; rev:1;)
alert udp $HOME_NET any -> $EXTERNAL_NET 53 (msg:"MALWARE-CNC Win.Trojan.UDPOS
outbound system information disclousre"; flow:to_server; isdataat:150; content:"|
0F|"; content:"|03|bin"; within:4; distance:15; fast_pattern; metadata:impact_flag
red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service dns; reference:url,blogs.forcepoint.com/security-
labs/udpos-exfiltrating-credit-card-data-dns;
reference:url,www.virustotal.com/#/file/62688903adfc719c5514f25a17563547aac48019598
52f5d49faa93967ce86cf/detection; classtype:trojan-activity; sid:45964; rev:1;)
alert udp $HOME_NET any -> $EXTERNAL_NET 53 (msg:"MALWARE-CNC Win.Trojan.UDPOS
outbound heartbeat"; flow:to_server; isdataat:150; content:"|0F|"; content:"|04|
ping"; within:5; distance:15; fast_pattern; metadata:impact_flag red, policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service dns; reference:url,blogs.forcepoint.com/security-labs/udpos-
exfiltrating-credit-card-data-dns;
reference:url,www.virustotal.com/#/file/62688903adfc719c5514f25a17563547aac48019598
52f5d49faa93967ce86cf/detection; classtype:trojan-activity; sid:45966; rev:1;)
alert udp $HOME_NET any -> $EXTERNAL_NET 53 (msg:"MALWARE-CNC Win.Trojan.UDPOS
outbound data exfiltration"; flow:to_server; isdataat:150; content:"|0F|";
content:"|03|trp"; within:4; distance:15; fast_pattern; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service dns; reference:url,blogs.forcepoint.com/security-
labs/udpos-exfiltrating-credit-card-data-dns;
reference:url,www.virustotal.com/#/file/62688903adfc719c5514f25a17563547aac48019598
52f5d49faa93967ce86cf/detection; classtype:trojan-activity; sid:45967; rev:1;)
alert udp $HOME_NET any -> $EXTERNAL_NET 53 (msg:"MALWARE-CNC Win.Trojan.UDPOS
outbound data exfiltration"; flow:to_server; isdataat:150; content:"|0F|";
content:"|04|note"; within:5; distance:15; fast_pattern; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service dns; reference:url,blogs.forcepoint.com/security-
labs/udpos-exfiltrating-credit-card-data-dns;
reference:url,www.virustotal.com/#/file/62688903adfc719c5514f25a17563547aac48019598
52f5d49faa93967ce86cf/detection; classtype:trojan-activity; sid:45968; rev:1;)
alert tcp $HOME_NET 445 -> any any (msg:"OS-WINDOWS Microsoft Windows SMB kernel
heap memory leak attempt"; flow:to_client,established; content:"|FF|SMB|A0|";
depth:5; offset:4; isdataat:127; content:"|FF FF FF FF|"; within:4; distance:123;
byte_extract:4,28,ids; byte_test:4,=,ids,174,relative;
byte_extract:2,0,uid,relative; byte_test:2,=,uid,172,relative; metadata:policy
balanced-ips alert, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service netbios-ssn; reference:cve,2017-0143; reference:cve,2017-0146;
reference:cve,2017-0147; reference:url,technet.microsoft.com/en-
us/security/bulletin/MS17-010; classtype:attempted-recon; sid:45977; rev:1;)
alert tcp $HOME_NET 445 -> any any (msg:"OS-WINDOWS Microsoft Windows SMB kernel
heap memory leak attempt"; flow:to_client,established; content:"|FF|SMB|A0|";
depth:5; offset:4; isdataat:111; content:"|FA FF FF|"; within:3; distance:108;
content:"|FA FF FF|"; distance:0; byte_extract:4,28,ids;
byte_test:4,=,ids,242,relative; byte_extract:2,0,uid,relative;
byte_test:2,=,uid,240,relative; metadata:policy balanced-ips alert, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service netbios-ssn;
reference:cve,2017-0143; reference:cve,2017-0146; reference:cve,2017-0147;
reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-010;
classtype:attempted-recon; sid:45978; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
MultiOS.Trojan.OSCelestial variant outbound connection";
flow:to_server,established; content:"|72 00 17|com.net.LoginDataPacket";
fast_pattern:only; content:"|74 00 13|Lcom/net/LoginData"; nocase;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/9b4843ff0181af15a6c8478ca00aafd4296592a298
5a480575810f4f64442742/analysis/; classtype:trojan-activity; sid:45979; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC
MultiOS.Trojan.OSCelestial variant inbound connection"; flow:to_client,established;
content:"|74 00 29|net.oscp.client.keylogger.KeystrokeLogger"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/9b4843ff0181af15a6c8478ca00aafd4296592a298
5a480575810f4f64442742/analysis/; classtype:trojan-activity; sid:45980; rev:1;)
# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"POLICY-OTHER Sandvine
PacketLogic http redirection attempt"; flow:to_client,established;
content:"Temporary Redirect"; fast_pattern:only; id:13330; fragbits:!MDR; flags:FA;
content:"307"; depth:3; http_stat_code; content:"Temporary Redirect"; nocase;
http_stat_msg; metadata:ruleset community, service http;
reference:url,citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-
deploy-government-spyware-turkey-syria;
reference:url,github.com/citizenlab/badtraffic; classtype:misc-activity; sid:45983;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Gen variant outbound communication"; flow:established,to_server;
content:"/A56WY"; fast_pattern:only; http_uri; metadata:impact_flag red, policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; reference:url,us-cert.gov/ncas/alerts/TA17-293A;
classtype:trojan-activity; sid:46048; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.CrossRAT
outbound connection attempt"; flow:to_server,established; content:"[^8]&&&";
fast_pattern:only; content:"[^8]&&&"; isdataat:!0,relative; metadata:impact_flag
red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community;
reference:url,www.virustotal.com/#/file/da81aec00b563123d2fbd14fb6a76619c90f81e83c5
bd8aa0676922cae96b9ad/detection; classtype:trojan-activity; sid:46050; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.Bandook/Anbacas outbound connection attempt";
flow:to_server,established; content:"QDAwMD"; depth:6; fast_pattern; content:"&&&";
within:200; isdataat:!0,relative; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community;
reference:url,info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-
Caracal_srr_20180118_us_v.1.0.pdf;
reference:url,www.virustotal.com/#/file/bf600e7b27bdd9e396e5c396aba7f079c244bfb92ee
45c721c2294aa36586206/detection; classtype:trojan-activity; sid:46051; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent
known malicious user-agent string Uploador - Win.Trojan.CrossRAT";
flow:to_server,established; content:"User-Agent|3A| Uploador|0D 0A|";
fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy max-detect-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/#/file/da81aec00b563123d2fbd14fb6a76619c90f81e83c5
bd8aa0676922cae96b9ad/detection; classtype:trojan-activity; sid:46052; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.yty second stage downloader initial outbound connection";
flow:to_server,established; content:"/football/goal"; fast_pattern:only; http_uri;
content:"ball="; http_client_body; content:"score="; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.arbornetworks.com/blog/asert/donot-team-leverages-new-modular-
malware-framework-south-asia/; classtype:trojan-activity; sid:46066; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.yty plugin downloader initial outbound connection";
flow:to_server,established; content:"Expect: 100-continue"; fast_pattern:only;
http_header; content:"pc="; http_client_body; content:"pc_data="; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.arbornetworks.com/blog/asert/donot-team-leverages-new-modular-
malware-framework-south-asia/; classtype:trojan-activity; sid:46067; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.yty module download request"; flow:to_server,established;
content:"/football/download/"; depth:19; http_uri; content:!"User-Agent|3A|";
nocase; http_header; content:!"Accept|3A|"; nocase; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.arbornetworks.com/blog/asert/donot-team-leverages-new-modular-
malware-framework-south-asia/; classtype:trojan-activity; sid:46068; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.yty module request"; flow:to_server,established; content:"Expect: 100-
continue"; fast_pattern:only; http_header; content:"cnumber="; http_uri;
content:"orname="; http_uri; metadata:impact_flag red, policy balanced-ips drop,
policy max-detect-ips drop, policy security-ips drop, ruleset community, service
http; reference:url,www.arbornetworks.com/blog/asert/donot-team-leverages-new-
modular-malware-framework-south-asia/; classtype:trojan-activity; sid:46069;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.yty file exfiltration outbound request"; flow:to_server,established;
content:"Expect: 100-continue"; fast_pattern:only; http_header; content:"id=";
depth:3; http_client_body; content:"&pc="; http_client_body; metadata:impact_flag
red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.arbornetworks.com/blog/asert/donot-team-leverages-new-modular-
malware-framework-south-asia/; classtype:trojan-activity; sid:46070; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET [139,445] (msg:"NETBIOS MikroTik
RouterOS buffer overflow attempt"; flow:to_server,established; content:"|81 00|";
depth:2; byte_test:2,>,75,0,relative; byte_extract:2,0,len,relative; isdataat:!
len,relative; isdataat:len; metadata:policy max-detect-ips drop, policy security-
ips drop, ruleset community, service netbios-ssn; reference:bugtraq,103427;
reference:cve,2018-7445; classtype:attempted-user; sid:46076; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E-Series apply.cgi cross site scripting attempt"; flow:to_server,established;
content:"apply.cgi"; http_uri; content:"action="; distance:0; http_uri; pcre:"/[?&]
(wait_time|ping_ip|ping_size|submit_type|traceroute_ip)=[^&]*?
([\x22\x27\x3c\x3e\x28\x29]|script|onload|src)/Ui"; metadata:ruleset community,
service http; reference:url,s3cur1ty.de/m1adv2013-004; classtype:attempted-user;
sid:46080; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E-Series apply.cgi cross site scripting attempt"; flow:to_server,established;
content:"apply.cgi"; fast_pattern:only; http_uri; content:"action=";
http_client_body; pcre:"/(^|&)(wait_time|ping_ip|ping_size|submit_type|
traceroute_ip)=[^&]*?([\x22\x27\x3c\x3e\x28\x29]|script|onload|src)/Pim";
metadata:ruleset community, service http; reference:url,s3cur1ty.de/m1adv2013-004;
classtype:attempted-user; sid:46081; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E-Series apply.cgi ping function command injection attempt";
flow:to_server,established; content:"apply.cgi"; fast_pattern:only; http_uri;
content:"ping"; nocase; http_client_body; pcre:"/(^|&)ping(\x5f|%5f)(ip|size|
times)=[^&]*?([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28|%60|%3b|%7c|%26|%3c%28|%3e%28|
%24%28)/Pim"; metadata:ruleset community, service http; reference:cve,2013-3307;
classtype:web-application-attack; sid:46082; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E-Series apply.cgi directory traversal attempt"; flow:to_server,established;
content:"apply.cgi"; fast_pattern:only; http_uri; content:"next_page="; nocase;
http_client_body; pcre:"/(^|&)next_page=[^&]*?(\x2e|%2e){2}([\x2f\x5c]|%2f|
%5c)/Pim"; metadata:ruleset community, service http;
reference:url,s3cur1ty.de/m1adv2013-004; classtype:web-application-attack;
sid:46083; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E-Series apply.cgi directory traversal attempt"; flow:to_server,established;
content:"apply.cgi"; fast_pattern:only; http_uri; content:"next_page="; nocase;
http_uri; content:"../"; http_uri; pcre:"/[?&]next_page=[^&]*?\x2e\x2e\x2f/Ui";
metadata:ruleset community, service http; reference:url,s3cur1ty.de/m1adv2013-004;
classtype:web-application-attack; sid:46084; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E-Series apply.cgi ping function command injection attempt";
flow:to_server,established; content:"apply.cgi"; fast_pattern:only; http_uri;
content:"ping_"; nocase; http_uri; pcre:"/[?&]ping_(ip|size|times)=[^&]*?
([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28)/Ui"; metadata:ruleset community, service http;
reference:cve,2013-3307; classtype:web-application-attack; sid:46085; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E-Series apply.cgi ping function command injection attempt";
flow:to_server,established; content:"apply.cgi"; fast_pattern:only; http_uri;
content:"ping_"; nocase; http_uri; content:"%26"; http_raw_uri; pcre:"/[?
&]ping(\x5f|%5f)(ip|size|times)=[^&]*?%26/Ii"; metadata:ruleset community, service
http; reference:cve,2013-3307; classtype:web-application-attack; sid:46086; rev:2;)
# alert tcp $EXTERNAL_NET 32764 -> $HOME_NET any (msg:"PROTOCOL-OTHER use of
undocumented ScMM test interface in Cisco small business devices detected";
flow:to_client,established; isdataat:6; content:"MMcS"; depth:4; metadata:ruleset
community; reference:cve,2014-0659; classtype:misc-activity; sid:46121; rev:2;)
# alert tcp $EXTERNAL_NET 32764 -> $HOME_NET any (msg:"PROTOCOL-OTHER use of
undocumented ScMM test interface in Cisco small business devices detected";
flow:to_client,established; isdataat:6; content:"ScMM"; depth:4; metadata:ruleset
community; reference:cve,2014-0659; classtype:misc-activity; sid:46122; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 32764 (msg:"PROTOCOL-OTHER use of
undocumented ScMM test interface in Cisco small business devices detected";
flow:to_server,established; isdataat:6; content:"MMcS"; depth:4; metadata:ruleset
community; reference:cve,2014-0659; classtype:misc-activity; sid:46123; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 32764 (msg:"PROTOCOL-OTHER use of
undocumented ScMM test interface in Cisco small business devices detected";
flow:to_server,established; isdataat:6; content:"ScMM"; depth:4; metadata:ruleset
community; reference:cve,2014-0659; classtype:misc-activity; sid:46124; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.HW32 variant outbound connection"; flow:to_server,established;
content:"Cpa=+EXEC+"; depth:10; http_client_body; content:"%27%2C%27";
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/0b2e8a9413d3b34d532d553922bd402830c1784302
fc8ecaeeee17e826798d46/analysis/; classtype:trojan-activity; sid:46129; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banbra variant outbound connection"; flow:to_server,established;
content:"User-Agent: Mozilla/3.0 (compatible|3B| Indy Library)"; http_header;
content:"remetente="; depth:10; fast_pattern; http_client_body;
content:"&destinatario"; distance:0; http_client_body; metadata:impact_flag red,
policy max-detect-ips drop, policy security-ips drop, ruleset community, service
http; classtype:trojan-activity; sid:46136; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.Cidox
variant outbound connection attempt"; flow:to_server,established; content:"POST
/b/req/"; depth:12; content:" HTTP/1.1|0D 0A|Accept: */*|0D 0A|Content-Type:
application/octet-stream|0D 0A|Connection: Close|0D 0A|User-Agent: Mozilla/";
within:103; distance:24; content:")|0D 0A|Host: "; distance:0; metadata:impact_flag
red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community; classtype:trojan-activity; sid:46137; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Linksys
E series denial of service attempt"; flow:to_server,established;
content:"mfgtst.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; classtype:denial-of-service; sid:46287; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP QNAP
VioStor NVR and QNAP NAS command injection attempt"; flow:to_server,established;
content:"/cgi-bin/pingping.cgi"; fast_pattern:only; http_uri; content:"ping_ip=";
nocase; http_uri; pcre:"/[?&]ping_ip=[^&]*?([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28)/Ui";
metadata:ruleset community, service http; reference:cve,2013-0143; classtype:web-
application-attack; sid:46297; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP QNAP
VioStor NVR and QNAP NAS command injection attempt"; flow:to_server,established;
content:"/cgi-bin/pingping.cgi"; fast_pattern:only; http_uri; content:"ping_ip=";
nocase; http_uri; content:"%26"; http_raw_uri; pcre:"/[?&]ping(\x5f|%5f)ip=[^&]*?
%26/Ii"; metadata:ruleset community, service http; reference:cve,2013-0143;
classtype:web-application-attack; sid:46298; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP QNAP
VioStor NVR and QNAP NAS command injection attempt"; flow:to_server,established;
content:"/cgi-bin/pingping.cgi"; fast_pattern:only; http_uri; content:"ping";
nocase; http_client_body; pcre:"/(^|&)ping(\x5f|%5f)ip=[^&]*?([\x60\x3b\x7c]|
[\x3c\x3e\x24]\x28|%60|%3b|%7c|%26|%3c%28|%3e%28|%24%28)/Pim"; metadata:ruleset
community, service http; reference:cve,2013-0143; classtype:web-application-attack;
sid:46299; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP QNAP
VioStor NVR and QNAP NAS command injection attempt"; flow:to_server,established;
content:"/cgi-bin/pingping.cgi"; fast_pattern:only; http_uri; content:"ping_ip";
nocase; http_client_body; content:"Content-Disposition"; nocase; http_client_body;
pcre:"/name\s*=\s*[\x22\x27]?ping_ip((?!^--).)*?[\r\n]{2,}((?!^--).)*?
([\x60\x3b\x7c\x26]|[\x3c\x3e\x24]\x28)/Psim"; metadata:ruleset community, service
http; reference:cve,2013-0143; classtype:web-application-attack; sid:46300; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-OTHER QNAP QTS
X-Forwarded-For buffer overflow"; flow:to_server,established; content:"/cgi-
bin/filemanager/wfm2Login.cgi"; fast_pattern:only; http_uri; content:"X-Forwarded-
For"; nocase; http_raw_header; isdataat:90,relative; pcre:"/X-Forwarded-For:[^\n\r]
{90}/Hsmi"; metadata:policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; reference:url,www.qnap.com/en/security-advisory/nas-
201712-15; classtype:web-application-attack; sid:46301; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP QNAP WTS
4.2.1 command injection attempt"; flow:to_server,established; content:"/cgi-
bin/wizReq.cgi"; fast_pattern:only; http_uri; content:"SMB_"; nocase; http_uri;
pcre:"/[?&]SMB_(LOCATION|USERNAME)=[^&]*?([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28)/Ui";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; classtype:web-application-attack; sid:46305; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP QNAP WTS
4.2.1 command injection attempt"; flow:to_server,established; content:"/cgi-
bin/wizReq.cgi"; fast_pattern:only; http_uri; content:"SMB_"; nocase; http_uri;
content:"%26"; http_raw_uri; pcre:"/[?&]SMB(\x5f|%5f)(LOCATION|USERNAME)=[^&]*?
%26/Ii"; metadata:policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; classtype:web-application-attack; sid:46306; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP QNAP WTS
4.2.1 command injection attempt"; flow:to_server,established; content:"/cgi-
bin/wizReq.cgi"; fast_pattern:only; http_uri; content:"SMB"; nocase;
http_client_body; pcre:"/(^|&)SMB(\x5f|%5f)(LOCATION|USERNAME)=[^&]*?
([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28|%60|%3b|%7c|%26|%3c%28|%3e%28|%24%28)/Pim";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; classtype:web-application-attack; sid:46307; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP QNAP WTS
4.2.1 command injection attempt"; flow:to_server,established; content:"/cgi-
bin/wizReq.cgi"; fast_pattern:only; http_uri; content:"SMB_"; nocase;
http_client_body; content:"Content-Disposition"; nocase; http_client_body;
pcre:"/name\s*=\s*[\x22\x27]?SMB_(LOCATION|USERNAME)((?!^--).)*?[\r\n]{2,}((?!
^--).)*?([\x60\x3b\x7c\x26]|[\x3c\x3e\x24]\x28)/Psim"; metadata:policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http; classtype:web-
application-attack; sid:46308; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-OTHER QNAP
NVR/NAS Heap/Stack Overflow attempt"; flow:to_server,established; content:"/cgi-
bin/cgi.cgi"; fast_pattern:only; http_uri; content:"u="; nocase; http_uri;
content:"p="; nocase; http_uri; isdataat:260,relative; pcre:"/[?&]p=[^&\s]
{260}/smi"; metadata:policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; classtype:attempted-admin; sid:46309; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-OTHER QNAP
NVR/NAS Heap/Stack Overflow attempt"; flow:to_server,established; content:"/cgi-
bin/cgi.cgi"; fast_pattern:only; http_uri; content:"u="; nocase; http_uri;
isdataat:35,relative; pcre:"/[?&]u=[^&\s]{35}/smi"; metadata:policy max-detect-ips
drop, policy security-ips drop, ruleset community, service http;
classtype:attempted-admin; sid:46310; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
WNR2000 information disclosure attempt"; flow:to_server,established; content:"/cgi-
bin/NETGEAR_WNR2000.cfg"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:url,www.netgear.com/home/products/networking/wifi-
routers/WNR2000.aspx; classtype:attempted-recon; sid:46312; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
WNR2000 information disclosure attempt"; flow:to_server,established; content:"/cgi-
bin/upg_restore.cgi"; fast_pattern:only; http_uri; metadata:ruleset community,
service http; reference:url,www.netgear.com/home/products/networking/wifi-
routers/WNR2000.aspx; classtype:attempted-recon; sid:46313; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
WNR2000 information disclosure attempt"; flow:to_server,established;
content:"/router-info.htm"; fast_pattern:only; http_uri; metadata:ruleset
community, service http;
reference:url,www.netgear.com/home/products/networking/wifi-routers/WNR2000.aspx;
classtype:attempted-recon; sid:46314; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Joomla
restore.php PHP object injection attempt"; flow:to_server,established;
content:"/administrator/components/com_joomlaupdate/restore.php";
fast_pattern:only; http_uri; content:"factory="; nocase; http_uri;
content:"OjI2OiJraWNrc3RhcnQuc2V0dXAuc291cmNlZmlsZSI7"; content:"aHR0cDovL";
metadata:ruleset community, service http; reference:cve,2014-7228; classtype:web-
application-attack; sid:46315; rev:2;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Drupal 8
remote code execution attempt"; flow:to_server,established;
content:"element_parents="; fast_pattern:only; http_uri; content:"#value";
http_uri; content:"drupal_ajax"; http_uri; pcre:"/(%23|#)(submit|validate|
access_callback|pre_render|post_render|lazy_builder)/Pi"; metadata:policy balanced-
ips drop, policy connectivity-ips drop, policy max-detect-ips drop, policy
security-ips drop, ruleset community, service http; reference:cve,2018-7600;
reference:url,www.drupal.org/sa-core-2018-002; classtype:attempted-admin;
sid:46316; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 23 (msg:"SERVER-OTHER NETGEAR
TelnetEnable attempt"; flow:to_server,established; content:"|C0 F3 AC 2A 40 79 49
0C A3 6E 89 64 73 66 0F 0B|"; content:"|5D FC 67 3A 16 DC 00 56 A3 6E 89 64 73 66
0F 0B|"; metadata:ruleset community; classtype:attempted-admin; sid:46317; rev:2;)
# alert udp $EXTERNAL_NET any -> $HOME_NET 23 (msg:"SERVER-OTHER NETGEAR
TelnetEnable attempt"; flow:to_server; content:"|59 0D B1 E7 67 23 51 BA 5B 5D 52
33 91 0D 09 7F|"; content:"|09 44 80 0E DE B6 FA 3B 5B 5D 52 33 91 0D 09 7F|";
metadata:ruleset community; classtype:attempted-admin; sid:46318; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN2200B stored cross-site scripting attempt"; flow:to_server,established;
content:"/wlg_sec_profile_main.cgi"; fast_pattern:only; http_uri; content:"ssid=";
nocase; http_client_body; pcre:"/ssid=[^&]*?([\x22\x27\x3c\x3e\x28\x29]|script|
onload|src)/Pi"; metadata:policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.netgear.com/home/products/networking/dsl-modems-
routers/dgn2200.aspx; classtype:attempted-user; sid:46322; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Netgear
DGN2200B stored cross-site scripting attempt"; flow:to_server,established;
content:"/fw_serv_add.cgi"; fast_pattern:only; http_uri; content:"userdefined=";
nocase; http_client_body; pcre:"/userdefined=[^&]*?([\x22\x27\x3c\x3e\x28\x29]|
script|onload|src)/Pi"; metadata:policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.netgear.com/home/products/networking/dsl-modems-
routers/dgn2200.aspx; classtype:attempted-user; sid:46323; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $FTP_PORTS (msg:"SERVER-OTHER QNAP QTS
hard coded credential access attempt"; flow:to_server,established; content:"PASS
joxu06wj/|0D 0A|"; fast_pattern:only; metadata:ruleset community, service ftp;
reference:cve,2015-7261; classtype:default-login-attempt; sid:46335; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Ransomware.Matrix outbound connection"; flow:to_server,established;
content:"add.php?apikey="; http_uri; content:"&compuser="; http_uri;
content:"&sid="; http_uri; content:"&phase="; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,"www.virustotal.com/#/file/996ea85f12a17e8267dcc32eae9ad20cff44115182
e707153006162711fbe3c9/detection"; classtype:trojan-activity; sid:46339; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Akeeba
Kickstart restoration.php reconnaissance attempt"; flow:to_server,established;
content:"administrator/components/com_joomlaupdate/restoration.php";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:cve,2014-7229; classtype:web-application-attack; sid:46340; rev:2;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"SERVER-WEBAPP
Akeeba Kickstart cross site request forgery attempt"; flow:to_client,established;
file_data; content:"administrator/index.php"; fast_pattern:only;
content:"option=com_joomlaupdate"; nocase; content:"task=update.install"; nocase;
metadata:ruleset community, service ftp-data, service http, service imap, service
pop3; reference:cve,2014-7229; classtype:web-application-attack; sid:46341; rev:2;)
# alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"SERVER-OTHER QNAP
QTS cross site request forgery attempt"; flow:to_client,established; file_data;
content:"cgi-bin/create_user.cgi"; fast_pattern:only; content:"function="; nocase;
content:"subfun="; nocase; content:"NAME="; nocase; content:"PASSWD="; nocase;
content:"VERIFY="; nocase; metadata:ruleset community, service ftp-data, service
http, service imap, service pop3; reference:cve,2013-0144; classtype:attempted-
admin; sid:46342; rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-OTHER libgd
heap-overflow attempt"; flow:to_server,established; content:"gd2|00 00 02|";
fast_pattern; content:"|02|"; within:1; distance:7; byte_test:1,>,128,16,relative;
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2016-3074; classtype:web-application-attack; sid:46376;
rev:2;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-OTHER libgd
heap-overflow attempt"; flow:to_server,established; content:"gd2|00 00 02|";
fast_pattern; content:"|02|"; within:1; distance:7; byte_test:1,>,128,8,relative;
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2016-3074; classtype:web-application-attack; sid:46377;
rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $FILE_DATA_PORTS (msg:"MALWARE-CNC
Win.Trojan.Dropper variant outbound connection"; flow:established,to_server;
content:"IHkoeWRrcnkpIikqNy95ZCB5LSl5ZCB5"; depth:40; fast_pattern;
http_client_body; content:!"Referer|3A|"; nocase; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/fd08f6bc823cbfa495f0568ba4284e02f1cad57e56b
d04ef0a0b948ea9dddee4/details; classtype:trojan-activity; sid:46378; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Spyware.Autoit outbound connection"; flow:to_server,established;
content:"win32=FFD8FFE000104A464946"; fast_pattern:only; http_client_body;
metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/8ac4e164b463c313af059760ce1f830c19b0d5a280
ec80554e8f77939143e24e; classtype:trojan-activity; sid:46416; rev:1;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Kraens delivery attempt"; flow:to_client,established;
flowbits:isset,file.exe; file_data; content:"{|22|i|22|:|22|%s|22|,|22|l|22|:[";
fast_pattern:only; content:"RES_OK"; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service ftp-data, service http, service imap, service pop3;
reference:url,www.virustotal.com/#/file/426d7bb2f4b362c6ff6b982565aa2bdb47e70320da0
f60ba6c9bf04049e08829; classtype:trojan-activity; sid:46421; rev:1;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"MALWARE-CNC Win.Trojan.Kraens
delivery attempt"; flow:to_server,established; flowbits:isset,file.exe; file_data;
content:"{|22|i|22|:|22|%s|22|,|22|l|22|:["; fast_pattern:only; content:"RES_OK";
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service smtp;
reference:url,www.virustotal.com/#/file/426d7bb2f4b362c6ff6b982565aa2bdb47e70320da0
f60ba6c9bf04049e08829; classtype:trojan-activity; sid:46422; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Kraens initial outbound request"; flow:to_server,established;
content:"/up_d.php"; fast_pattern:only; http_uri; content:"{|22|i|22|:"; depth:5;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/426d7bb2f4b362c6ff6b982565aa2bdb47e70320da
0f60ba6c9bf04049e08829; classtype:trojan-activity; sid:46423; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Adware.Doyo initial connection"; flow:established, to_server;
content:"data=85702b2fccafcb2f"; depth:21; http_client_body; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/#/file/0692bfe17754036b12b862cd5618051d8b2def85aca
2a910188a12baa1ed0060; classtype:trojan-activity; sid:46433; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Adware.Doyo client outbound connection"; flow:established,to_server; content:"|
01 00 00 00 01 01 00 00 01 00 00 00 00 00 04 00 03 00 00 00 00 00 00 00 00 00 00
00|"; depth:28; metadata:impact_flag red, policy balanced-ips drop, policy
security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/0692bfe17754036b12b862cd5618051d8b2def85aca
2a910188a12baa1ed0060; classtype:trojan-activity; sid:46434; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Vbs.Downloader.Kryptik known malicious user-agent string ";
flow:to_server,established; content:"User-Agent|3A| USR-KL"; fast_pattern:only;
http_header; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/7975cbaa5657d89b45126bf739fd84acd5bbe724f3
72a20360bd4fc038b67541; classtype:trojan-activity; sid:46435; rev:2;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Vbs.Downloader.Agent inbound connection"; flow:to_client,established;
flowbits:isset,file.ole; file_data; content:"3832D640-CF90-11CF-8E43-00A0C911005A";
fast_pattern:only; content:"Workbook_Open"; nocase; content:"Document_Open";
nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy
security-ips drop, ruleset community, service ftp-data, service http, service imap,
service pop3;
reference:url,www.virustotal.com/#/file/7975cbaa5657d89b45126bf739fd84acd5bbe724f37
2a20360bd4fc038b67541; classtype:trojan-activity; sid:46436; rev:1;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"MALWARE-CNC
Vbs.Downloader.Agent inbound connection"; flow:to_server,established;
flowbits:isset,file.ole; file_data; content:"3832D640-CF90-11CF-8E43-00A0C911005A";
fast_pattern:only; content:"Workbook_Open"; nocase; content:"Document_Open";
nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy
security-ips drop, ruleset community, service smtp;
reference:url,www.virustotal.com/#/file/7975cbaa5657d89b45126bf739fd84acd5bbe724f37
2a20360bd4fc038b67541; classtype:trojan-activity; sid:46437; rev:1;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Vbs.Downloader.Agent inbound connection"; flow:to_client,established;
flowbits:isset,file.ole; file_data; content:"Shell"; nocase; content:"vbHide";
within:100; fast_pattern; content:"Chr"; nocase; content:"Asc"; within:100; nocase;
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service ftp-data, service http, service imap, service
pop3;
reference:url,www.virustotal.com/#/file/7975cbaa5657d89b45126bf739fd84acd5bbe724f37
2a20360bd4fc038b67541; classtype:trojan-activity; sid:46438; rev:1;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"MALWARE-CNC
Vbs.Downloader.Agent inbound delivery attempt"; flow:to_server,established;
flowbits:isset,file.ole; file_data; content:"Shell"; nocase; content:"vbHide";
within:100; fast_pattern; content:"Chr"; nocase; content:"Asc"; within:100; nocase;
metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service smtp;
reference:url,www.virustotal.com/#/file/7975cbaa5657d89b45126bf739fd84acd5bbe724f37
2a20360bd4fc038b67541; classtype:trojan-activity; sid:46439; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Installation
Keylogger Osx.Trojan.Mokes data exfiltration";
flow:established,to_server,only_stream; content:"GET /v1 HTTP/1.1"; depth:16;
fast_pattern; content:"Connection: "; http_header; content:"User-Agent: ";
http_header; content:"Accept-Encoding: "; http_header; content:"Accept-Language: ";
http_header; content:"Host: "; http_header; detection_filter:track by_src,count
3,seconds 6; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/664e0a048f61a76145b55d1f1a5714606953d69edc
cec5228017eb546049dc8c/analysis/; classtype:trojan-activity; sid:46482; rev:5;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
TwonkyMedia server directory listing attempt"; flow:to_server,established;
content:"/rpc/dir"; fast_pattern:only; http_uri; content:"path="; nocase; http_uri;
metadata:ruleset community, service http; reference:cve,2018-7171; classtype:web-
application-attack; sid:46485; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.Ammy
heartbeat"; flow:to_server,established; content:"id="; depth:3; offset:5;
content:"&os="; within:4; distance:8; content:"&priv="; distance:0;
content:"&cred="; distance:0; content:"&pcname="; distance:0;
content:"&build_time="; distance:0; fast_pattern; content:"&card="; distance:0;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:46487; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Ammy download attempt"; flow:to_server,established;
content:"/q2/index.php?"; fast_pattern:only; http_uri; content:"id="; http_uri;
content:"&c="; http_uri; content:"&mk="; http_uri; content:"&il="; http_uri;
content:"&vr="; http_uri; content:"&bt="; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http; classtype:trojan-activity; sid:46488; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Agent outbound request"; flow:to_server,established; content:".php?
&1001="; fast_pattern:only; http_uri; content:"99="; http_uri; content:"f1=";
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/123275cc76ef377986715c98abb0fec50cbd53f01d
c3976080009dc7cdafbe86/analysis/; classtype:trojan-activity; sid:46501; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Agent outbound request"; flow:to_server,established; content:".php?
&1001="; fast_pattern:only; http_uri; content:"1="; http_client_body; content:"2=";
http_client_body; pcre:"/(^|&)\d{1,2}=[^&]*?\d{4}/Pm"; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/123275cc76ef377986715c98abb0fec50cbd53f01d
c3976080009dc7cdafbe86/analysis/; classtype:trojan-activity; sid:46502; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin
N750 F9K1103 wireless router command injection attempt";
flow:to_server,established; content:"/twonky_cmd.cgi"; fast_pattern:only; http_uri;
content:"path="; nocase; http_uri; pcre:"/[?&]path=[^&]*?([\x60\x3b\x7c]|
[\x3c\x3e\x24]\x28)/Ui"; metadata:policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; reference:cve,2018-1143; classtype:web-
application-attack; sid:46510; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin
N750 F9K1103 wireless router command injection attempt";
flow:to_server,established; content:"/twonky_cmd.cgi"; fast_pattern:only; http_uri;
content:"path="; nocase; http_uri; content:"%26"; http_raw_uri; pcre:"/[?
&]path=[^&]*?%26/Ii"; metadata:policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; reference:cve,2018-1143; classtype:web-
application-attack; sid:46511; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin
N750 F9K1103 wireless router command injection attempt";
flow:to_server,established; content:"/twonky_cmd.cgi"; fast_pattern:only; http_uri;
content:"path="; nocase; http_client_body; pcre:"/(^|&)path=[^&]*?([\x60\x3b\x7c]|
[\x3c\x3e\x24]\x28|%60|%3b|%7c|%26|%3c%28|%3e%28|%24%28)/Pim"; metadata:policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2018-1143; classtype:web-application-attack; sid:46512; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin
N750 F9K1103 wireless router command injection attempt";
flow:to_server,established; content:"/twonky_cmd.cgi"; fast_pattern:only; http_uri;
content:"path"; nocase; http_client_body; content:"Content-Disposition"; nocase;
http_client_body; pcre:"/name\s*=\s*[\x22\x27]?path((?!^--).)*?[\r\n]{2,}((?!
^--).)*?([\x60\x3b\x7c\x26]|[\x3c\x3e\x24]\x28)/Psim"; metadata:policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2018-1143; classtype:web-application-attack; sid:46513; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin
N750 F9K1103 wireless router command injection attempt";
flow:to_server,established; content:"/proxy.cgi"; fast_pattern:only; http_uri;
content:"url="; nocase; http_uri; pcre:"/[?&]url=[^&]*?([\x60\x3b\x7c]|
[\x3c\x3e\x24]\x28)/Ui"; metadata:policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http; reference:cve,2018-1144; classtype:web-
application-attack; sid:46514; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin
N750 F9K1103 wireless router command injection attempt";
flow:to_server,established; content:"/proxy.cgi"; fast_pattern:only; http_uri;
content:"url="; nocase; http_uri; content:"%26"; http_raw_uri; pcre:"/[?
&]url=[^&]*?%26/Ii"; metadata:policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http; reference:cve,2018-1144; classtype:web-
application-attack; sid:46515; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin
N750 F9K1103 wireless router command injection attempt";
flow:to_server,established; content:"/proxy.cgi"; fast_pattern:only; http_uri;
content:"url="; nocase; http_client_body; pcre:"/(^|&)url=[^&]*?([\x60\x3b\x7c]|
[\x3c\x3e\x24]\x28|%60|%3b|%7c|%26|%3c%28|%3e%28|%24%28)/Pim"; metadata:policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2018-1144; classtype:web-application-attack; sid:46516; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin
N750 F9K1103 wireless router command injection attempt";
flow:to_server,established; content:"/proxy.cgi"; fast_pattern:only; http_uri;
content:"url"; nocase; http_client_body; content:"Content-Disposition"; nocase;
http_client_body; pcre:"/name\s*=\s*[\x22\x27]?url((?!^--).)*?[\r\n]{2,}((?!
^--).)*?([\x60\x3b\x7c\x26]|[\x3c\x3e\x24]\x28)/Psim"; metadata:policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2018-1144; classtype:web-application-attack; sid:46517; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin
N750 F9K1103 wireless router remote telnet enable attempt";
flow:to_server,established; content:"/set.cgi"; fast_pattern:only; http_uri;
content:"n=TLNET_EN"; nocase; http_uri; content:"v=1"; nocase; http_uri;
metadata:ruleset community, service http; reference:cve,2018-1146;
classtype:policy-violation; sid:46518; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin
N750 F9K1103 wireless router remote telnet enable attempt";
flow:to_server,established; content:"/set.cgi"; fast_pattern:only; http_uri;
content:"n=TLNET_EN"; nocase; http_client_body; content:"v=1"; nocase;
http_client_body; metadata:ruleset community, service http; reference:cve,2018-
1146; classtype:policy-violation; sid:46519; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banload second stage download request"; flow:established,to_server;
isdataat:!100; content:!"Referer|3A|"; http_header; content:!"Accept"; http_header;
content:!"User-Agent|3A 20|http"; http_header; content:".zip HTTP/1.1|0D 0A|Host|3A
20|"; fast_pattern:only; pcre:"/GET \/\w*.zip
HTTP\/1.1\r\nHost\x3a\x20\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(?:\x3a\d{1,5})?\r\n/i";
metadata:impact_flag red, ruleset community, service http; classtype:trojan-
activity; sid:46611; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Unruy outbound callout"; flow:to_server,established; content:".php?q=";
fast_pattern:only; http_uri; content:"Accept-Language: en-us"; http_header;
content:"Accept-Encoding: gzip, deflate"; http_header; content:"Connection: Keep-
Alive"; http_header; content:"Referer: http://www.google.com"; http_header;
pcre:"/.php\?q=\d{1,4}\.\d{2,4}\.\d{1,3}\.\d{1,3}\.\d{1,3}\.[0-9a-f]
{64}\.1.\d{4,6}/U"; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
classtype:trojan-activity; sid:46612; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Digital
Guardian Management Console arbitrary file upload attempt";
flow:to_server,established;
content:"/DigitalGuardian/Management/ServerSettingsPDFTemplates.aspx";
fast_pattern:only; http_uri; content:"inputFilePath"; nocase; http_client_body;
content:".asp"; distance:0; nocase; http_client_body; content:"Content-
Disposition"; nocase; http_client_body;
pcre:"/name\s*=\s*[\x22\x27]inputFilePath[\x22\x27]\x3b((?!^--).)*?
filename\s*=\s*[\x22\x27]\S+?\x2easpx?[\x22\x27][\r\n]{2,}/Psim"; metadata:policy
max-detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2018-10173; classtype:web-application-attack; sid:46665; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Digital
Guardian Management Console arbitrary file upload attempt";
flow:to_server,established; content:"/DigitalGuardian/Policies/PromptSkin.aspx";
fast_pattern:only; http_uri; content:"skinFile"; nocase; http_client_body;
content:".asp"; distance:0; nocase; http_client_body; content:"Content-
Disposition"; nocase; http_client_body;
pcre:"/name\s*=\s*[\x22\x27]skinFile[\x22\x27]\x3b((?!^--).)*?
filename\s*=\s*[\x22\x27]\S+?\x2easpx?[\x22\x27][\r\n]{2,}/Psim"; metadata:policy
max-detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:cve,2018-10173; classtype:web-application-attack; sid:46666; rev:1;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Dropper malicious script download attempt"; flow:to_client,established;
file_data; content:"<script"; nocase; content:"ActiveXObject"; nocase;
content:"WScript.Shell"; fast_pattern; nocase; content:"p o w e r s h e l l";
nocase; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community, service ftp-data, service http,
service imap, service pop3;
reference:url,virustotal.com/#/file/76afa767b0374bde95d9a93074aceaec88228ba234caa13
dd01313076baf02ee/detection; classtype:trojan-activity; sid:46742; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $FILE_DATA_PORTS (msg:"MALWARE-CNC
Win.Trojan.Dropper initial outbound connection attempt";
flow:to_server,established; content:".php?utma"; fast_pattern:only; http_uri;
content:!"Referer:"; nocase; http_header; pcre:"/(stem|slick)\.php\?utma/iU";
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service ftp-data, service http,
service imap, service pop3;
reference:url,virustotal.com/#/file/76afa767b0374bde95d9a93074aceaec88228ba234caa13
dd01313076baf02ee/detection; classtype:trojan-activity; sid:46743; rev:1;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.Dropper malicious executable download attempt";
flow:to_client,established; content:"Content-Type:"; nocase; http_header;
content:"application/java-vm"; within:50; fast_pattern; http_header; file_data;
content:"MZ"; depth:2; metadata:impact_flag red, policy balanced-ips drop, policy
max-detect-ips drop, policy security-ips drop, ruleset community, service ftp-data,
service http, service imap, service pop3;
reference:url,virustotal.com/#/file/76afa767b0374bde95d9a93074aceaec88228ba234caa13
dd01313076baf02ee/detection; classtype:trojan-activity; sid:46744; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Qarallax
outbound connection"; flow:established,to_server; content:"|00 07|nemesis";
depth:10; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/658f67dbf509fc017ace6db7ed38b3591fe72b9ba9
50a59054869cd718b4da2b/analysis; classtype:trojan-activity; sid:46747; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Qarallax
outbound connection"; flow:established,to_server; content:"|00 05|child|01 00 16|";
depth:11; content:"|22|magic|22|"; within:100; metadata:impact_flag red, policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community;
reference:url,www.virustotal.com/en/file/658f67dbf509fc017ace6db7ed38b3591fe72b9ba9
50a59054869cd718b4da2b/analysis; classtype:trojan-activity; sid:46748; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Nagios
XI SQL injection attempt"; flow:to_server,established;
content:"/nagiosql/admin/helpedit.php"; fast_pattern:only; http_uri;
content:"selInfoKey1="; nocase; http_uri; pcre:"/[?&]selInfoKey1=[^&]*?
([\x27\x22\x3b\x23]|\x2f\x2a|\x2d\x2d)/Ui"; metadata:policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http; reference:cve,2018-8734;
classtype:web-application-attack; sid:46773; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP NagiosXI
SQL injection attempt"; flow:to_server,established;
content:"/nagiosql/admin/helpedit.php"; fast_pattern:only; http_uri;
content:"selInfoKey1="; nocase; http_client_body; pcre:"/(^|&)selInfoKey1=[^&]*?
([\x27\x22\x3b\x23]|\x2f\x2a|\x2d\x2d|%27|%22|%3b|%23|%2f%2a|%2d%2d)/Pim";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2018-8734; classtype:web-application-attack; sid:46774;
rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Nagios
XI command injection attempt"; flow:to_server,established;
content:"/nagiosxi/backend/index.php"; fast_pattern:only; http_uri;
content:"command_data="; nocase; http_uri; pcre:"/[?&]command_data=[^&]*?
([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28)/Ui"; metadata:policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http; reference:cve,2018-8734;
classtype:web-application-attack; sid:46775; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Nagios
XI command injection attempt"; flow:to_server,established;
content:"/nagiosxi/backend/index.php"; fast_pattern:only; http_uri;
content:"command_data="; nocase; http_uri; content:"%26"; http_raw_uri; pcre:"/[?
&]command(\x5f|%5f)data=[^&]*?%26/Ii"; metadata:policy max-detect-ips drop, policy
security-ips drop, ruleset community, service http; reference:cve,2018-8734;
classtype:web-application-attack; sid:46776; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Nagios
XI command injection attempt"; flow:to_server,established;
content:"/nagiosxi/backend/index.php"; fast_pattern:only; http_uri;
content:"command"; nocase; http_client_body; pcre:"/(^|&)command(\x5f|
%5f)data=[^&]*?([\x60\x3b\x7c]|[\x3c\x3e\x24]\x28|%60|%3b|%7c|%26|%3c%28|%3e%28|
%24%28)/Pim"; metadata:policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http; reference:cve,2018-8734; classtype:web-
application-attack; sid:46777; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Nagios
XI command injection attempt"; flow:to_server,established;
content:"/nagiosxi/backend/index.php"; fast_pattern:only; http_uri;
content:"command_data"; nocase; http_client_body; content:"Content-Disposition";
nocase; http_client_body; pcre:"/name\s*=\s*[\x22\x27]?command_data((?!^--).)*?
[\r\n]{2,}((?!^--).)*?([\x60\x3b\x7c\x26]|[\x3c\x3e\x24]\x28)/Psim";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2018-8734; classtype:web-application-attack; sid:46778;
rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Nagios
XI database settings modification attempt"; flow:to_server,established;
content:"/nagiosql/admin/settings.php"; fast_pattern:only; http_uri;
content:"txtDBname=nagiosql"; nocase; metadata:ruleset community, service http;
reference:cve,2018-8734; classtype:web-application-attack; sid:46779; rev:1;)
alert tcp $EXTERNAL_NET [443,8443] -> $HOME_NET any (msg:"MALWARE-CNC
Unix.Trojan.Vpnfilter variant SSL connection attempt"; flow:to_client,established;
content:"|09 4D 69 63 72 6F 73 6F 66 74 31 10 30 0E 06 03 55 04 0B 13 07 53 75 70
70 6F 72 74 31 0B 30 09 06 03 55 04 03 13 02 63 61|"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,blog.talosintelligence.com/2018/05/VPNFilter.html; classtype:trojan-
activity; sid:46782; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET [443,8443] (msg:"MALWARE-CNC
Unix.Trojan.Vpnfilter variant SSL connection attempt"; flow:to_server,established;
content:"|09 4D 69 63 72 6F 73 6F 66 74 31 10 30 0E 06 03 55 04 0B 13 07 53 75 70
70 6F 72 74 31 0B 30 09 06 03 55 04 03 13 02 63 61|"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,blog.talosintelligence.com/2018/05/VPNFilter.html; classtype:trojan-
activity; sid:46783; rev:5;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Downloader.Zebrocy known malicious user-agent string";
flow:to_server,established; content:"User-Agent|3A| Mozilla v5.1";
fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy max-detect-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/#/file/5fab4d08348b4ef080ba91bdb0d769d31797f5092bf
f3b24b3c23d091fccc8a7; classtype:trojan-activity; sid:46785; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Downloader.Zebrocy initial outbound request"; flow:to_server,established;
content:"?fort="; fast_pattern:only; http_uri; content:"pol="; depth:4;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/5fab4d08348b4ef080ba91bdb0d769d31797f5092bf
f3b24b3c23d091fccc8a7; classtype:trojan-activity; sid:46786; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.ZooPark outbound connection attempt"; flow:to_server,established;
content:"/telg/sv/sv.php"; fast_pattern:only; http_uri; content:"id";
http_client_body; content:"data"; http_client_body; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/76fa36d35e0e16b0ea416726b0da2a66dfe7d7b355
04cf6c475eac4cfa95fe3a/analysis; classtype:trojan-activity; sid:46787; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.ZooPark outbound connection attempt"; flow:to_server,established;
content:"/telg/index.php?set=show"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/76fa36d35e0e16b0ea416726b0da2a66dfe7d7b355
04cf6c475eac4cfa95fe3a/analysis; classtype:trojan-activity; sid:46788; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.ZooPark outbound connection attempt"; flow:to_server,established;
content:"/get/index.php"; http_uri; content:"id=Z29nbw=="; fast_pattern:only;
http_uri; content:"user="; http_uri; content:"pass="; http_uri; content:"data=";
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/76fa36d35e0e16b0ea416726b0da2a66dfe7d7b355
04cf6c475eac4cfa95fe3a/analysis; classtype:trojan-activity; sid:46789; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.ZooPark outbound connection attempt"; flow:to_server,established;
content:"/spyMobile/upload.php"; fast_pattern:only; http_uri; content:"iemi=";
http_uri; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/76fa36d35e0e16b0ea416726b0da2a66dfe7d7b355
04cf6c475eac4cfa95fe3a/analysis; classtype:trojan-activity; sid:46790; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Anti-Web
directory traversal attempt"; flow:to_server,established; content:"/cgi-
bin/write.cgi"; fast_pattern:only; http_uri; content:"template="; nocase;
http_client_body; pcre:"/(^|&)template=[^&]*?(\x2e|%2e){2}([\x2f\x5c]|%2f|
%5c)/Pim"; metadata:policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; reference:cve,2017-9097; classtype:web-application-attack;
sid:46802; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Anti-Web
directory traversal attempt"; flow:to_server,established; content:"/cgi-
bin/write.cgi"; fast_pattern:only; http_uri; content:"template="; nocase; http_uri;
content:"../"; http_uri; pcre:"/[?&]template=[^&]*?\x2e\x2e\x2f/Ui";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2017-9097; classtype:web-application-attack; sid:46803;
rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Anti-Web
directory traversal attempt"; flow:to_server,established; content:"/cgi-
bin/write.cgi"; fast_pattern:only; http_uri; content:"template"; nocase;
http_client_body; content:"Content-Disposition"; nocase; http_client_body;
pcre:"/name\s*=\s*[\x22\x27]?template((?!^--).)*?\x2e\x2e[\x2f\x5c]/Psim";
metadata:policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2017-9097; classtype:web-application-attack; sid:46804;
rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP BA Systems
BAS Web information disclosure attempt"; flow:to_server,established;
content:"/isc/get_sid.aspx"; fast_pattern:only; http_uri; metadata:policy balanced-
ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http; reference:cve,2017-17974; classtype:attempted-user; sid:46805;
rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP BA Systems
BAS Web information disclosure attempt"; flow:to_server,established;
content:"/isc/get_sid_js.aspx"; fast_pattern:only; http_uri; metadata:policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; reference:cve,2017-17974; classtype:attempted-user;
sid:46806; rev:1;)
alert udp $HOME_NET any -> any 53 (msg:"MALWARE-OTHER DNS request for known malware
domain toknowall.com - Unix.Trojan.Vpnfilter"; flow:to_server; byte_test:1,!
&,0xF8,2; content:"|09|toknowall|03|com|00|"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service dns;
reference:url,www.virustotal.com/en/domain/toknowall.com/information/;
classtype:trojan-activity; sid:46807; rev:3;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP FLIR
Breakstream 2300 unauthenticated information disclosure attempt";
flow:to_server,established; content:"/getConfigExportFile.cgi"; fast_pattern:only;
http_uri; metadata:policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http; reference:cve,2018-3813; classtype:attempted-user;
sid:46817; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Ransomware.Satan outbound connection"; flow:to_server,established;
content:"/data/token.php"; fast_pattern:only; http_uri; content:"status="; nocase;
http_uri; content:"code="; nocase; http_uri; content:"Winnet Client"; nocase;
http_header; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/b686cba1894f8ab5cec0ce5db195022def00204f6c
d143a325608ec93e8b74ee/analysis/; classtype:trojan-activity; sid:46818; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-OTHER
Win.Ransomware.Satan payload download"; flow:to_server,established;
content:"/cab/sts.exe"; fast_pattern:only; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/b686cba1894f8ab5cec0ce5db195022def00204f6c
d143a325608ec93e8b74ee/analysis/; classtype:trojan-activity; sid:46819; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
DotNetNuke DreamSlider arbitrary file download attempt";
flow:to_server,established;
content:"/DesktopModules/DreamSlider/DownloadProvider.aspx"; fast_pattern:only;
nocase; http_uri; content:"file="; nocase; http_uri; metadata:ruleset community,
service http; classtype:web-application-attack; sid:46824; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Dunihi
outbound connection"; flow:to_server,established; content:"|00 00 A2 30 81 9F 30 0D
06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 00|";
depth:32; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community;
reference:url,www.virustotal.com/en/file/be442a5f8be3bf720236f71a613a534b8aa82b16b0
daf8ff84a59bcb92e19e7d/analysis/; classtype:trojan-activity; sid:46827; rev:2;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.RedLeaves variant outbound connection"; flow:to_server,established;
content:".NET CLR 3.0.30729|3B| .NET4.0C|3B| .NET4.0E)|0D 0A|Content-Length";
fast_pattern:only; http_header; urilen:<20; content:"/index.php"; http_uri;
content:"POST"; http_method; content:"Connection: Keep-Alive|0D 0A|Accept: */*|0D
0A|"; http_header; content:!"Content-Type"; http_header; content:!"Referer";
http_header; content:!"Accept-"; http_header; metadata:impact_flag red, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/f6449e255bc1a9d4a02391be35d0dd37def19b7e20
cfcc274427a0b39cb21b7b/analysis/; classtype:trojan-activity; sid:46839; rev:1;)
# alert udp any 67 -> $HOME_NET 68 (msg:"OS-LINUX Red Hat NetworkManager DHCP
client command injection attempt"; content:"|63 82 53 63 35|"; content:"|FC|";
within:50; pcre:"/([\xfc]).{0,50}([\x27])([\x20\x26\x3b\x7c]|
[\x3c\x3e\x24]\x28)+/i"; metadata:policy max-detect-ips drop, ruleset community,
service dhcp; reference:cve,2018-1111;
reference:url,access.redhat.com/security/cve/cve-2018-1111; classtype:attempted-
user; sid:46847; rev:1;)
alert tcp $EXTERNAL_NET 20480 -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.CowerSnail command and control response detected";
flow:to_client,established; content:"pk"; depth:2; content:"R|00|e|00|q|00|u|00|e|
00|s|00|t|00|"; fast_pattern:only; content:"|00|a|00|r|00|g|00|";
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service irc;
reference:url,www.virustotal.com/#/file/3fb8a4d2ed4f662a4cb4270bb5f488b79c8758aa6fc
5c8b119c78fba38d6b7d1/detection; classtype:trojan-activity; sid:46872; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 20480 (msg:"MALWARE-CNC
Win.Trojan.CowerSnail initial outbound connection attempt";
flow:to_server,established; content:"+CHANNEL|0B|"; fast_pattern:only;
content:"line-client"; metadata:impact_flag red, policy balanced-ips drop, policy
max-detect-ips drop, policy security-ips drop, ruleset community, service irc;
reference:url,www.virustotal.com/#/file/3fb8a4d2ed4f662a4cb4270bb5f488b79c8758aa6fc
5c8b119c78fba38d6b7d1/detection; classtype:trojan-activity; sid:46873; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 25 (msg:"MALWARE-CNC Win.Trojan.Joanap
variant outbound connection"; flow:to_server,established; content:"TO: Joana
<[email protected]>"; fast_pattern:only; content:"SUBJECT: |5B|T|5D|";
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service smtp;
reference:url,www.virustotal.com/#/file/077d9e0e12357d27f7f0c336239e961a7049971446f
7a3f10268d9439ef67885/detection;
reference:url,www.virustotal.com/#/file/4c5b8c3e0369eb738686c8a111dfe460e26eb370083
7c941ea2e9afd3255981e/detection; classtype:trojan-activity; sid:46885; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Nocturnal outbound connection"; flow:to_server,established;
content:"/server/gate.php"; fast_pattern:only; http_uri; content:"name=|22|hwid|
22|"; http_client_body; content:"name=|22|platform|22|"; http_client_body;
content:"name=|22|pcount|22|"; http_client_body; content:"name=|22|cccount|22|";
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/ae7e5a7b34dc216e9da384fcf9868ab2c1a1d731f5
83f893b2d2d4009da15a4e/analysis/; classtype:trojan-activity; sid:46895; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Fareit variant outbound connection"; flow:to_server,established;
content:"/panel/logout.php"; depth:17; http_uri; content:!"Accept"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,virustotal.com/en/file/6de535e8d4b82e5554a138ec1d6c6b530943ff08d5e043
08d695f473e74f9600/analysis/; classtype:trojan-activity; sid:46922; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Dropper outbound connection"; flow:to_server,established; content:"User-
Agent: HTTPREAD|0D 0A|"; fast_pattern:only; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/en/file/782cc4188618cf0c4815f85ea7873a004464095f5e
d459b8d1579fa27ce5810e/analysis/; classtype:trojan-activity; sid:46936; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Danabot outbound connection"; flow:to_server,established;
content:"/index.php?m=S&"; fast_pattern:only; http_uri; content:"&a="; http_uri;
content:"&b="; http_uri; content:"&d="; http_uri; content:"&e="; http_uri;
content:!"Referer"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/f60c6c45ff27d1733d8ab03393ab88e3a2d7c75c7d
9fce3169417e8c9fd3df12/analysis; classtype:trojan-activity; sid:46966; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Danabot outbound connection"; flow:to_server,established;
content:"/index.php?m=F&"; fast_pattern:only; http_uri; content:"&a="; http_uri;
content:"&b="; http_uri; content:"&d="; http_uri; content:"&e="; http_uri;
content:!"Referer"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/f60c6c45ff27d1733d8ab03393ab88e3a2d7c75c7d
9fce3169417e8c9fd3df12/analysis; classtype:trojan-activity; sid:46967; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Danabot outbound connection"; flow:to_server,established;
content:"/index.php?m=T&"; fast_pattern:only; http_uri; content:"&a="; http_uri;
content:"&b="; http_uri; content:"&d="; http_uri; content:"&e="; http_uri;
content:!"Referer"; http_header; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/en/file/f60c6c45ff27d1733d8ab03393ab88e3a2d7c75c7d
9fce3169417e8c9fd3df12/analysis; classtype:trojan-activity; sid:46968; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Autophyte dropper variant outbound connection";
flow:to_server,established; urilen:10; content:"/mainls.cs"; fast_pattern:only;
http_uri; content:"Content-Type: application/octet-stream"; nocase; http_header;
content:!"User-Agent"; nocase; http_header; metadata:impact_flag red, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/086a50476f5ceee4b10871c1a8b0a794e96a3379663
82248a8289598b732bd47/detection; classtype:trojan-activity; sid:46969; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Autophyte RAT variant outbound connection"; flow:to_server,established;
content:"Content-Disposition: form-data|3B| name=|22|board_id|22|";
fast_pattern:only; http_client_body; content:"Content-Disposition: form-data|3B|
name=|22|user_id|22|"; http_client_body; content:"Content-Disposition: form-data|
3B| name=|22|file1|22|"; http_client_body; content:!"Referer"; http_header;
metadata:ruleset community, service http;
reference:url,www.virustotal.com/#/file/c10363059c57c52501c01f85e3bb43533ccc639f0ea
57f43bae5736a8e7a9bc8/detection;
reference:url,www.virustotal.com/#/file/e98991cdd9ddd30adf490673c67a4f8241993f26810
da09b52d8748c6160a292/detection; classtype:trojan-activity; sid:46970; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
Microsoft Office Discovery User-Agent to a potential URL shortener service";
flow:to_server,established; urilen:<10; content:"Host: "; http_header; content:"|0D
0A|"; within:14; http_header; content:"OPTIONS"; http_method; content:"User-Agent:
Microsoft Office "; http_header; content:"Discovery|0D 0A|"; within:25;
http_header; content:!"Accept"; http_header; content:!"Referer|3A|"; http_header;
content:!"Cookie|3A|"; http_header; metadata:ruleset community, service http;
reference:url,virustotal.com/en/file/d615a205d92898896b0f553a027ffd9b7b7cde0c29ebe0
b1f9364e1cf2831236/analysis/; classtype:misc-activity; sid:46979; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE
Microsoft Office Discovery User-Agent to a potential URL shortener service";
flow:to_server,established; urilen:<10; content:"Host: "; http_header; content:"|0D
0A|"; within:14; http_header; content:"HEAD"; http_method; content:"User-Agent:
Microsoft Office "; http_header; content:"Discovery|0D 0A|"; within:25;
http_header; content:!"Accept"; http_header; content:!"Content-"; http_header;
content:!"Referer|3A|"; http_header; content:!"Cookie|3A|"; http_header;
metadata:ruleset community, service http;
reference:url,virustotal.com/en/file/d615a205d92898896b0f553a027ffd9b7b7cde0c29ebe0
b1f9364e1cf2831236/analysis/; classtype:misc-activity; sid:46980; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC Win.Trojan.Orcus RAT
inbound SSL certificate"; flow:to_client,established; content:"|16 03|"; depth:2;
content:"|02|"; within:1; distance:3; content:"|0C|Orcus Server";
fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service ssl;
reference:url,virustotal.com/en/file/8d880758549220154d2ff4ee578f2b49527c5fb76a07d5
5237b61e30bcc09e3a/analysis/; classtype:trojan-activity; sid:46981; rev:1;)
# alert tcp $HOME_NET !21:23 -> $EXTERNAL_NET any (msg:"INDICATOR-COMPROMISE
Microsoft cmd.exe banner"; flow:established; content:"Microsoft Windows"; depth:18;
content:"Microsoft Corp"; within:250; metadata:policy max-detect-ips drop, ruleset
community; reference:nessus,11633; classtype:successful-admin; sid:46983; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET [$HTTP_PORTS,3000,5156,7218]
(msg:"MALWARE-CNC Win.Trojan.SocketPlayer outbound connection";
flow:to_server,established; content:"POST /cl/uplod/"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/de38e74b2cd493d0f014fc6ca5d2834cea213778c2
e056a7c84e9547fe275889/analysis/; classtype:trojan-activity; sid:47005; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET [$HTTP_PORTS,1337,5156] (msg:"MALWARE-CNC
Win.Trojan.SocketPlayer outbound connection"; flow:to_server,established;
content:"/uploads/excutbls/h/"; fast_pattern:only; metadata:impact_flag red, policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/en/file/de38e74b2cd493d0f014fc6ca5d2834cea213778c2
e056a7c84e9547fe275889/analysis/; classtype:trojan-activity; sid:47006; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Spyware.Invisimole CnC outbound connection"; flow:to_server,established;
content:"/www/"; depth:5; fast_pattern; http_uri; content:"/00"; distance:0;
http_uri; content:!"Accept|3A|"; http_header; pcre:"/\/www\/(%[A-F0-9]{2})
{5,}\/00/I"; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-
ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/be554e706f6b8ab8f4bbea209b669e9dca98bf647f
aa55c46756f322dadab32f/analysis/; classtype:trojan-activity; sid:47016; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.TechSupportScam installed binary outbound connection";
flow:to_server,established; content:"/show_new.php?"; fast_pattern:only; http_uri;
content:"code="; nocase; http_uri; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/#/file/c9adabc7516e38ce611cbde5856fbe6b06e8afee442
2d754aa810aec59ecd8d8/detection; classtype:trojan-activity; sid:47067; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.TechSupportScam installed binary outbound connection";
flow:to_server,established; content:"/register.php?"; fast_pattern:only; http_uri;
content:"p="; nocase; http_uri; content:"&code="; nocase; http_uri; content:!"User-
Agent"; http_header; metadata:impact_flag red, policy balanced-ips drop, policy
max-detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/c9adabc7516e38ce611cbde5856fbe6b06e8afee442
2d754aa810aec59ecd8d8/detection; classtype:trojan-activity; sid:47068; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.TechSupportScam installed binary outbound connection";
flow:to_server,established; content:"/update_new.php?"; fast_pattern:only;
http_uri; content:"code="; nocase; http_uri; content:!"User-Agent"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/c9adabc7516e38ce611cbde5856fbe6b06e8afee442
2d754aa810aec59ecd8d8/detection; classtype:trojan-activity; sid:47069; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
Win.Adware.Pbot variant outbound connection"; flow:to_server,established;
content:"/installstarted"; fast_pattern:only; http_uri; content:"de="; nocase;
http_uri; content:"_v="; nocase; http_uri; content:"_s="; nocase; http_uri;
metadata:ruleset community, service http;
reference:url,www.virustotal.com/#/file/5e3dc49c1f4b57ab27000befd128fad77eba9a6e07f
8766c7e1393cae890fdf6/detection; classtype:misc-activity; sid:47093; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
Win.Adware.Pbot variant outbound connection"; flow:to_server,established;
content:"/collect.php"; fast_pattern:only; http_uri; content:"pid="; http_uri;
content:"cid="; http_uri; content:"sid="; http_uri; content:"act="; http_uri;
metadata:ruleset community, service http;
reference:url,www.virustotal.com/#/file/5e3dc49c1f4b57ab27000befd128fad77eba9a6e07f
8766c7e1393cae890fdf6/detection; classtype:misc-activity; sid:47094; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"PUA-ADWARE
Win.Adware.Pbot variant outbound connection"; flow:to_server,established;
content:"/installended"; fast_pattern:only; http_uri; content:"de="; nocase;
http_uri; content:"_v="; nocase; http_uri; content:"_s="; nocase; http_uri;
metadata:ruleset community, service http;
reference:url,www.virustotal.com/#/file/5e3dc49c1f4b57ab27000befd128fad77eba9a6e07f
8766c7e1393cae890fdf6/detection; classtype:misc-activity; sid:47095; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC
Win.Trojan.NukeSped RAT variant outbound communication";
flow:to_server,established; content:"|B0 00 B0 00 B0 00 B0 00 26 00 26 00 26 00|";
depth:15; metadata:impact_flag red, ruleset community;
reference:url,www.virustotal.com/#/file/4a740227eeb82c20286d9c112ef95f0c1380d0e90ff
b39fc75c8456db4f60756/; classtype:trojan-activity; sid:47177; rev:1;)
# alert tcp $HOME_NET any -> $EXTERNAL_NET [9000:] (msg:"MALWARE-CNC
Win.Trojan.NukeSped RAT variant outbound connection"; flow:to_server,established;
content:"|50 00 00 00|"; depth:4; byte_test:1,>,2,0,relative; content:!"|0A|";
within:1; distance:1; isdataat:79,relative; metadata:impact_flag red, ruleset
community;
reference:url,www.virustotal.com/#/file/4a740227eeb82c20286d9c112ef95f0c1380d0e90ff
b39fc75c8456db4f60756/; classtype:trojan-activity; sid:47178; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Js.Trojan.Agent JS Sniffer beacon connection"; flow:established,to_server;
content:".php?"; http_uri; content:"=WyJ1cmw"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http; classtype:trojan-
activity; sid:47320; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ARS VBS loader outbound connection"; flow:to_server,established;
content:"?os="; http_uri; content:"&user="; http_uri; content:"&av="; http_uri;
content:"&fw="; http_uri; content:"&hwid="; http_uri; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http; reference:url,www.flashpoint-intel.com/blog/meet-
ars-vbs-loader/; classtype:trojan-activity; sid:47338; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MALWARE-CNC
Unix.Trojan.Vpnfilter plugin variant connection attempt";
flow:to_client,established; content:"|00 AC D3 62 78 26 76 31 E5 E7 E5 1D C2 3C 15
40 25 2F 90 BD 1F 7F 0E 5E 33 77 EC 0C 1E 6B 61 47|"; fast_pattern:only;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community;
reference:url,blog.talosintelligence.com/2018/05/VPNFilter.html; classtype:trojan-
activity; sid:47377; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7001 (msg:"SERVER-WEBAPP Oracle WebLogic
Server unauthenticated modified JSP access attempt"; flow:to_server,established;
content:"/ws_utc/css/config/keystore/"; fast_pattern:only; http_uri;
content:".jsp"; http_uri; metadata:ruleset community, service http;
reference:bugtraq,104763; reference:cve,2018-2894;
reference:url,www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html;
classtype:attempted-recon; sid:47386; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7001 (msg:"SERVER-WEBAPP Oracle WebLogic
Server potential unauthenticated reconnaissance attempt";
flow:to_server,established; content:"/ws_utc/resources/setting/options/general";
fast_pattern:only; http_uri; metadata:ruleset community, service http;
reference:bugtraq,104763; reference:cve,2018-2894;
reference:url,www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html;
classtype:attempted-recon; sid:47387; rev:1;)
# alert tcp $EXTERNAL_NET any -> $HOME_NET 7001 (msg:"SERVER-WEBAPP Oracle WebLogic
Server potential precursor to keystore attack attempt"; flow:to_server,established;
content:"/ws_utc/resources/setting/keystore"; fast_pattern:only; http_uri;
metadata:ruleset community, service http; reference:bugtraq,104763;
reference:cve,2018-2894; reference:url,www.oracle.com/technetwork/security-
advisory/cpujul2018-4258247.html; classtype:attempted-recon; sid:47388; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Osx.Trojan.Calisto outbound connection"; flow:to_server,established;
content:"/calisto/upload.php"; fast_pattern:only; http_uri; metadata:impact_flag
red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,virustotal.com/en/file/81c127c3cceaf44df10bb3ceb20ce1774f6a9ead0db4bd
991abf39db828661cc/analysis/; classtype:trojan-activity; sid:47414; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Osx.Trojan.Calisto outbound connection"; flow:to_server,established;
content:"/calisto/listenyee.php"; fast_pattern:only; http_uri; metadata:impact_flag
red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,virustotal.com/en/file/81c127c3cceaf44df10bb3ceb20ce1774f6a9ead0db4bd
991abf39db828661cc/analysis/; classtype:trojan-activity; sid:47415; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-CNC Win.Trojan.Mapoyun
variant outbound connection attempt"; flow:to_server,established;
content:"Connection:Close|3B|"; fast_pattern:only; http_header; content:"X-CA-";
nocase; http_header; content:!"User-Agent|3A|"; nocase; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,virustotal.com/en/file/34cbcbbbc4b538f30bc3d57dd587f1b604d29f113c149b
f1ab53898464ad9c80/analysis/; classtype:trojan-activity; sid:47427; rev:2;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.PLEAD
downloader outbound connection"; flow:to_server,established; content:"GET /logo.png
HTTP/1.1|0D 0A|"; depth:24; content:"User-Agent: Mozilla/4.0 (compatible|3B| MSIE
8.0)|0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community;
reference:url,blog.jpcert.or.jp/2018/06/plead-downloader-used-by-blacktech.html;
classtype:trojan-activity; sid:47556; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.PLEAD
downloader outbound connection"; flow:to_server,established; content:"GET
/index.php?id="; depth:18; content:"HTTP/1.1|0D 0A|"; within:10; distance:11;
nocase; content:"Cookie:"; isdataat:50,relative; content:!"="; within:50;
content:!"|3B|"; within:50; metadata:impact_flag red, policy balanced-ips drop,
policy max-detect-ips drop, policy security-ips drop, ruleset community;
reference:url,blog.jpcert.or.jp/2018/06/plead-downloader-used-by-blacktech.html;
classtype:trojan-activity; sid:47557; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"MALWARE-CNC Win.Trojan.Zegost
variant outbound connection"; flow:to_server,established; content:"|2A 00 00 00|";
depth:4; isdataat:37,relative; isdataat:!38,relative; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community;
reference:url,www.virustotal.com/#/file/108bbc4ff7b7da4f0de1225094964d03b19fc38b939
33f739c475f08ae17915e/detection; classtype:trojan-activity; sid:47567; rev:2;)
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Joomla
Proclaim biblestudy backup access attempt"; flow:to_server,established;
content:"/media/com_biblestudy/backup/"; fast_pattern:only; http_uri;
content:".sql"; http_uri; metadata:policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community, service http;
classtype:attempted-recon; sid:47613; rev:1;)
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.KeyPass variant inbound connection attempt"; flow:to_client,established;
file_data; content:"|7B 22|line1|22 3A 22|"; depth:10; fast_pattern; content:"|22|
line2|22 3A 22|"; within:30; distance:30; metadata:impact_flag red, policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,virustotal.com/#/file/901d893f665c6f9741aa940e5f275952/detection;
classtype:trojan-activity; sid:47627; rev:1;)
# alert udp $EXTERNAL_NET 53 -> $HOME_NET any (msg:"INDICATOR-OBFUSCATION DNS TXT
response record tunneling"; flow:to_client; dsize:>300; content:"|00 10 00 01 00 00
00 00 01 00 FF|"; fast_pattern:only; detection_filter:track by_src, count 25,
seconds 1; metadata:ruleset community, service dns;
reference:url,attack.mitre.org/wiki/Technique/T1048; classtype:misc-activity;
sid:47639; rev:1;)
# alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"SERVER-WEBAPP SSL certificate
with null issuer rdnSequence fields detected"; flow:to_client,established;
ssl_state:server_hello; content:"|30 07 06 03 55 04 06 13 00 31 09 30 07 06 03 55
04 08 13 00 31 09 30 07 06 03 55 04 07 13 00 31 09 30 07 06 03 55 04 0A 13 00 31 09
30 07 06 03 55 04 0B 13 00 31 09 30 07 06 03 55 04 03 13 00|"; fast_pattern:only;
metadata:ruleset community, service ssl; classtype:misc-activity; sid:47640;
rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Marap outbound beacon detected"; flow:to_server,established;
content:"/dot.php"; fast_pattern:only; http_uri; content:"param="; depth:6;
http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/bc1fc69f9747dc034ece7d9bb795c5e596d9be6ca7
1efe75c6c0fd18f3cbfbf5/analysis/; classtype:trojan-activity; sid:47650; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.MysteryBot outbound connection"; flow:to_server,established;
content:"/site/gate.php?i=eyAiYWN0aW9uIjog"; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/en/file/334f1efd0b347d54a418d1724d51f8451b7d0bebbd
05f648383d05c00726a7ae/analysis/; classtype:trojan-activity; sid:47723; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.AnubisCrypt variant outbound post detected"; flow:to_server,
established; content:"/private/"; fast_pattern; http_uri; content:".php";
distance:0; http_uri; content:"p="; http_client_body; content:"User-Agent:";
http_header; content:"Android"; within:100; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/#/file/d27034b9f58aa71f08f3c57d893fe07cdd395c9b4e4
94fbcca2a1d1ca3dce88e/detection; classtype:trojan-activity; sid:47876; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Andr.Trojan.AnubisCrypt variant outbound post detected"; flow:to_server,
established; content:"/private/checkPanel.php"; fast_pattern:only; http_uri;
content:"User-Agent:"; http_header; content:"Android"; within:100; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/d27034b9f58aa71f08f3c57d893fe07cdd395c9b4e4
94fbcca2a1d1ca3dce88e/detection; classtype:trojan-activity; sid:47877; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.OilRig variant outbound connection"; flow:to_server,established;
content:"GET /tahw?"; fast_pattern:only; pcre:"/\x2ftahw\x3f[A-F0-9]{3,84}$/U";
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/055b7607848777634b2b17a5c51da7949829ff88084
c3cb30bcb3e58aae5d8e9; classtype:attempted-user; sid:47898; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.OilRig variant outbound connection"; flow:to_server,established;
content:"GET /khc?"; fast_pattern:only; pcre:"/\x2fkhc\x3f[A-F0-9]{3,84}$/U";
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/055b7607848777634b2b17a5c51da7949829ff88084
c3cb30bcb3e58aae5d8e9; classtype:attempted-user; sid:47899; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.OilRig variant outbound connection"; flow:to_server,established;
content:"GET /pser?"; fast_pattern:only; pcre:"/\x2fpser\x3f[A-F0-9]{3,84}(BBZ|
BBY)/U"; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips
drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/055b7607848777634b2b17a5c51da7949829ff88084
c3cb30bcb3e58aae5d8e9; classtype:attempted-user; sid:47900; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.MSDownloader variant outbound connection"; flow:to_server,established;
content:"MS_D0wnl0ad3r"; fast_pattern:only; http_header; metadata:impact_flag red,
policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop,
ruleset community, service http;
reference:url,www.virustotal.com/#/file/c3c5d7961381c202c98badc7ff0739b4f381c10b4e7
6d153ad2a978118a4b505/detection; classtype:trojan-activity; sid:47934; rev:1;)
alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"MALWARE-CNC
Win.Trojan.MSDownloader variant download"; flow:to_client,established; file_data;
content:"Content-Type|3A 20|multipart/form-data|3B| boundary=MS_D0wnl0ad3r";
fast_pattern:44,13; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service ftp-data,
service http, service imap, service pop3;
reference:url,www.virustotal.com/#/file/c3c5d7961381c202c98badc7ff0739b4f381c10b4e7
6d153ad2a978118a4b505/detection; classtype:trojan-activity; sid:47935; rev:1;)
alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"MALWARE-CNC
Win.Trojan.MSDownloader variant download"; flow:to_server,established; file_data;
content:"Content-Type|3A 20|multipart/form-data|3B| boundary=MS_D0wnl0ad3r";
fast_pattern:44,13; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service smtp;
reference:url,www.virustotal.com/#/file/c3c5d7961381c202c98badc7ff0739b4f381c10b4e7
6d153ad2a978118a4b505/detection; classtype:trojan-activity; sid:47936; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.AcridRain outbound connection"; flow:to_server,established;
content:"browser/Vivaldi.txtPK"; fast_pattern:only; http_client_body;
content:"/Upload/"; http_uri; urilen:8; content:!"User-Agent|3A 20|"; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/3d28392d2dc1292a95b6d8f394c982844a9da0cdd84
101039cf6ca3cf9874c1c/analysis/; classtype:trojan-activity; sid:48035; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.AcridRain outbound connection"; flow:to_server,established;
content:"/Libs.zip"; fast_pattern:only; http_uri; urilen:9; content:!"User-Agent|3A
20|"; http_header; metadata:impact_flag red, policy balanced-ips drop, policy max-
detect-ips drop, policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/3d28392d2dc1292a95b6d8f394c982844a9da0cdd84
101039cf6ca3cf9874c1c/analysis/; classtype:trojan-activity; sid:48036; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.MirageFox variant outbound connection"; flow:to_server,established;
content:"/image_download.php?uid="; fast_pattern:only; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/016948ec7743b09e41b6968b42dfade5480774df3ba
f915e4c8753f5f90d1734/analysis; classtype:trojan-activity; sid:48092; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.MirageFox variant outbound connection"; flow:to_server,established;
content:"/search?gid="; fast_pattern:only; http_uri; content:"Accept:*/*";
http_header; content:"POST"; http_method; metadata:impact_flag red, policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/#/file/97813e76564aa829a359c2d12c9c6b824c532de0fc1
5f43765cf6b106a32b9a5/analysis; classtype:trojan-activity; sid:48093; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ITranslator variant outbound connection"; flow:to_server,established;
content:"/dl.itranslator.info/"; fast_pattern:only; http_uri; metadata:impact_flag
red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/b73d436d7741f50d29764367cbecc4ee67412230ff0
d66b7d1d0e4d26983824d/analysis; classtype:trojan-activity; sid:48115; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ITranslator variant outbound connection"; flow:to_server,established;
content:"/gl.php?uid="; fast_pattern:only; http_uri; content:"&v="; http_uri;
content:"&x="; within:20; http_uri; metadata:impact_flag red, policy balanced-ips
drop, policy max-detect-ips drop, policy security-ips drop, ruleset community,
service http;
reference:url,www.virustotal.com/#/file/b73d436d7741f50d29764367cbecc4ee67412230ff0
d66b7d1d0e4d26983824d/analysis; classtype:trojan-activity; sid:48116; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ITranslator variant outbound connection"; flow:to_server,established;
content:"/ufiles/"; fast_pattern:only; http_uri; content:".dll"; http_uri;
content:"UID: "; http_header; metadata:impact_flag red, policy balanced-ips drop,
policy max-detect-ips drop, policy security-ips drop, ruleset community, service
http;
reference:url,www.virustotal.com/#/file/b73d436d7741f50d29764367cbecc4ee67412230ff0
d66b7d1d0e4d26983824d/analysis; classtype:trojan-activity; sid:48117; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ITranslator variant outbound connection"; flow:to_server,established;
content:"User-Agent: ITRANSLATOR|0D 0A|"; fast_pattern:only; http_header;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/b73d436d7741f50d29764367cbecc4ee67412230ff0
d66b7d1d0e4d26983824d/analysis; classtype:trojan-activity; sid:48118; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ITranslator variant outbound connection"; flow:to_server,established;
content:"UID: P002|0D 0A|"; fast_pattern:only; http_header; metadata:impact_flag
red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips
drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/b73d436d7741f50d29764367cbecc4ee67412230ff0
d66b7d1d0e4d26983824d/analysis; classtype:trojan-activity; sid:48119; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.ITranslator variant outbound connection"; flow:to_server,established;
content:"/cfg?cb="; fast_pattern:only; http_uri; content:"&guid="; http_uri;
content:"&uid="; distance:0; http_uri; content:"&ua="; distance:0; http_uri;
metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop,
policy security-ips drop, ruleset community, service http;
reference:url,www.virustotal.com/#/file/b73d436d7741f50d29764367cbecc4ee67412230ff0
d66b7d1d0e4d26983824d/analysis; classtype:trojan-activity; sid:48120; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Downloader.XAgent variant outbound connection"; flow:to_server,established;
content:"&itwm="; fast_pattern:only; http_header; metadata:impact_flag red, policy
balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset
community, service http;
reference:url,www.virustotal.com/#/file/b814fdbb7cfe6e5192fe1126835b903354d75bfb15a
6c262ccc2caf13a8ce4b6; classtype:trojan-activity; sid:48140; rev:1;)

You might also like