snort-sigs February 2011 archive
Main Archive Page > Month Archives  > snort-sigs archives
snort-sigs: [Snort-sigs] Night Dragon

[Snort-sigs] Night Dragon

From: Matthew Jonkman <jonkman_at_nospam>
Date: Fri Feb 11 2011 - 04:22:23 GMT
To: Emerging Sigs <>,

FYI, we also just added 2 new sigs for the Night Dragon thing:

alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET TROJAN Night Dragon Dropper Download Command"; flow:established,from_server; dsize:5; content:"|01 08 00 00 00|"; depth:5; classtype:trojan-activity; reference:url,; sid:2012308; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Night Dragon CMD Shell"; flow:established,to_server; content:"|68 57 24 13 00 33|Microsoft"; offset:12; depth:15; classtype:trojan-activity; reference:url,; sid:2012307; rev:1;)

The ones you should soil yourself when you see them hitting on your net. :)

Recommend everyone push them, regardless of the ruleset you run!


Matthew Jonkman
Emerging Threats Pro
Open Information Security Foundation (OISF)
Phone 765-807-8630
Fax 312-264-0205


The ultimate all-in-one performance toolkit: Intel(R) Parallel Studio XE:
Pinpoint memory and threading errors before they happen.
Find and fix more than 250 security defects in the development cycle.
Locate bottlenecks in serial and parallel code that limit performance.
Snort-sigs mailing list