Advertisement
Neonprimetime

False Positive: Nuclear Exploit Kit

Dec 29th, 2014
486
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 0.81 KB | None | 0 0
  1. False Positive
  2. Reported by neonprimetime security
  3. http://neonprimetime.blogspot.com
  4. NOTES: From what I've seen the Nuclear exploit kit looks like "\/14\d{8}\.swf" but this matches "\.swf\/14\d{8}"
  5. ******
  6.  
  7.     alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"EXPLOIT-KIT Nuclear exploit kit outbound Adobe Flash exploit request"; flow:to_server,established; content:"/14"; fast_pattern:only; http_uri; content:".swf"; http_uri; pcre:"/\/14\d{8}(?:\.swf)?$/U"; flowbits:set,file.exploit_kit.flash; metadata:policy balanced-ips drop, policy security-ips drop, service http; classtype:trojan-activity; sid:32878; rev:1; )
  8.  
  9. *******
  10.  
  11. GET http://ads.img.globo.com/RealMedia/ads/Creatives/globocom/93598-1_5240_GE_Formula_1_Patrocinio_2014_Integrado__Retangulo_M/19538_300x250_Santander_Dezembro.swf/1419014410 HTTP/1.1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement