""ET WEB_SERVER Insomnia Shell Outbound CMD Banner""
SID: 2019900
Revision: 1
Class Type: trojan-activity
Metadata: created_at 2014_12_09, updated_at 2014_12_09
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: !21:23
Destination Network: $EXTERNAL_NET
Destination Port: any
Flow: to_server,established
Contents:
-
Value: "Shell enroute......." Depth: 20
-
Value: "Microsoft Windows "
-
Value: "Copyright |28|c|29| 20"
-
Value: "Microsoft Corp"
Within:
PCRE:
Special Options: