Project

General

Profile

Actions

Support #3537

closed

<Error> (DetectLoadSigFile) -- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)]

Added by leonardo kasper about 5 years ago. Updated about 5 years ago.

Status:
Closed
Priority:
Normal
Affected Versions:
Label:

Description

<Error> (DetectLoadSigFile) -- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert dns $HOME_NET any -> any any (msg:"ET TROJAN CASHY200 Style DNS Query - Sending Hostname"; dns_query; isdataat:30; content:"61643"; offset:5; depth:5; content:"31303"; distance:7; within:5;pcre:"/^[a-zA-Z0-9]{5}6164(?:3[0-9]){4}31303[0-9](?:[a-f0-9][a-f0-9]){5,}\./"; metadata: former_category MALWARE; reference:url,unit42.paloaltonetworks.com/more-xhunt-new-powershell-backdoor-blocked-through-dns-tunnel-detection/; classtype:trojan-activity; sid:2028667; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2019_10_10, performance_impact Significant, updated_at 2019_10_11;)" from file /etc/suricata/rules/emerging-trojan.rules at line 14135


Files

saida3.txt (8.95 MB) saida3.txt leonardo kasper, 03/25/2020 04:35 PM
informacao.txt (3.74 KB) informacao.txt leonardo kasper, 03/26/2020 05:08 PM
regras.txt (1.49 KB) regras.txt leonardo kasper, 03/26/2020 05:08 PM
suricata.rules.txt (14.4 MB) suricata.rules.txt leonardo kasper, 03/31/2020 05:45 PM
Actions

Also available in: Atom PDF