""ET TROJAN RDP Brute Force Bot Checkin""

SID: 2018253

Revision: 2

Class Type: trojan-activity

Metadata: created_at 2014_02_14, updated_at 2014_03_12

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: to_server,established

Contents:

  • Value: "POST"

  • Value: "/cmd.php"

  • Value: "User-Agent|3a| Browser|0d 0a|"

  • Value: "name=|22|data|22|"

  • Value: "{ |22|bad|22 20 3a 20|"

  • Value: ", |22|bruting|22 20 3a 20|"

  • Value: ", |22|checked|22 20 3a 20|"

Within:

PCRE:

Special Options:

  • http_method

  • nocase

  • http_uri

  • http_header

  • http_client_body

  • http_client_body

  • http_client_body

  • http_client_body

source