[Emerging-Sigs] Win32.Trojan-Dropper.Wlock Checkin Signature

Matthew Jonkman jonkman at emergingthreatspro.com
Tue Oct 11 06:40:22 EDT 2011

I think we're going to get a lot of falses on ad server traffic.

Check out that post with hardware_id= and os_ver= in it. That's more sigable!


On Oct 5, 2011, at 7:55 PM, Micah Kays wrote:

> alert tcp $HOME_NET any -> any $HTTP_PORTS
> (msg:"Win32.Trojan-Dropper.Wlock Checkin"; uricontent:".php?adv=";
> uricontent:"&id="; uricontent:"&c="; nocase;
> classtype:trojan-activity;
> reference:url,http://www.threatexpert.com/report.aspx?md5=881e21645e5ffe1ffb959835f8fdf71d;
> sid:2; rev:1;)
> _______________________________________________
> Emerging-sigs mailing list
> Emerging-sigs at emergingthreats.net
> http://lists.emergingthreats.net/mailman/listinfo/emerging-sigs
> Support Emerging Threats! Subscribe to Emerging Threats Pro http://www.emergingthreatspro.com
> The ONLY place to get complete premium rulesets for Snort 2.4.0 through Current!

Matt Jonkman
Emerging Threats Pro
Open Information Security Foundation (OISF)
Phone 866-504-2523 x110

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4364 bytes
Desc: not available
Url : http://lists.emergingthreats.net/pipermail/emerging-sigs/attachments/20111011/c9f82eb1/smime.bin

More information about the Emerging-sigs mailing list