""ET WEB_SERVER Insomnia Shell Outbound CMD Banner""

SID: 2019900

Revision: 1

Class Type: trojan-activity

Metadata: created_at 2014_12_09, updated_at 2014_12_09

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: !21:23

Destination Network: $EXTERNAL_NET

Destination Port: any

Flow: to_server,established

Contents:

  • Value: "Shell enroute......." Depth: 20

  • Value: "Microsoft Windows "

  • Value: "Copyright |28|c|29| 20"

  • Value: "Microsoft Corp"

Within:

PCRE:

Special Options:

source