Home page logo
/

snort logo Snort mailing list archives

Re: Travnet and PCRat sigs
From: Joel Esler <jesler () sourcefire com>
Date: Thu, 16 May 2013 11:27:37 -0400

James, these were added today.  Like this:

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.Travnet Botnet data upload"; 
flow:to_server,established; content:"hostid="; http_uri; content:"|26|hostname="; http_uri; content:"|26|hostip="; 
http_uri; metadata:policy balanced-ips drop, policy security-ips drop, ruleset community, service http; 
reference:url,www.virustotal.com/en/file/F7E9A1A4FC4766ABD799B517AD70CD5FA234C8ACC10D96CA51ECF9CF227B94E8/analysis/; 
classtype:trojan-activity; sid:26656; rev:1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR Win.Backdoor.PCRat data upload"; 
flow:to_server,established; content:"PCRatd"; depth:6; metadata:policy balanced-ips drop, policy security-ips drop, 
ruleset community, service http; 
reference:url,www.virustotal.com/en/file/669DF9DED24D56997D7B1EA6249BB704226DADA09230DC285AE66CA0C9B7247B/analysis/; 
classtype:misc-activity; sid:26655; rev:1;)



On May 14, 2013, at 4:29 PM, James Lay <jlay () slave-tothe-box net> wrote:

Travnet botnet:

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC 
Travnet Botnet data upload"; flow:to_server,established; content:"GET"; 
http_method; content:"hostid="; content:"|26|hostname="; within:16; 
content:"|26|hostip="; metadata:policy balanced-ips drop, policy 
security-ips drop, service http; 
reference:url,http://blogs.mcafee.com/mcafee-labs/travnet-botnet-controls-victims-with-remote-admin-tool; 
classtype:trojan-activity; sid:10000057; rev:1)

PCRat:

alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"MALWARE-BACKDOOR 
PCRat data upload"; flow:to_server,established; content:"PCRatd"; 
depth:6; metadata:policy balanced-ips drop, policy security-ips drop 
reference:url,http://blogs.mcafee.com/mcafee-labs/travnet-botnet-controls-victims-with-remote-admin-tool; 
classtype:misc-activity; sid:10000058; rev:1)

Not real cozy with an any/any rule but eh...didn't seem like a 
different way around this (maybe 1024:65535)?  As usual, comments and 
anything that optimizes or makes these rules useful/better are always 
appreciated.  Danke!

James

------------------------------------------------------------------------------
AlienVault Unified Security Management (USM) platform delivers complete
security visibility with the essential security capabilities. Easily and
efficiently configure, manage, and operate all of your security controls
from a single console and one unified framework. Download a free trial.
http://p.sf.net/sfu/alienvault_d2d
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!


------------------------------------------------------------------------------
AlienVault Unified Security Management (USM) platform delivers complete
security visibility with the essential security capabilities. Easily and
efficiently configure, manage, and operate all of your security controls
from a single console and one unified framework. Download a free trial.
http://p.sf.net/sfu/alienvault_d2d
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]