Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:64189
This rule triggers on an attempt to download Win.Downloader.Kryptik malware. This rule is specifically matching on known binary patterns required for the malware to execute.
1:64188
This rule looks for bytes known to be specific to Win.Dropper.Xworm variants.
1:64187
This rule looks for bytes known to be specific to Win.Dropper.Xworm variants.
1:64186
This rule looks for bytes known to be specific to Win.Dropper.Xworm variants.
1:64185
This rule looks for bytes known to be specific to Win.Dropper.Xworm variants.
1:64184
This rule looks for bytes known to be specific to Win.Trojan.Remcos variants.