SHELLCODE: X86 PexAlphaNum Encoder Routine Over TCP-CTS

This signature detects payloads being transferred over network that have been using x86 PexAlphaNum Encoder Routine. This may be an indication of someone trying to evade anti-virus/IPS solutions and possibly drop malicious code.

Extended Description

Use of the Metasploit PEX encoder to obfuscate executable code can enable an attacker to evade string-matching intrusion detection systems.

References

URL: http://www.metasploit.com/

Short Name
SHELLCODE:MSF:PEXALPHANUM-CTS
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
SHELLCODE
Keywords
Encoder Over PexAlphaNum Routine TCP-CTS X86
Release Date
03/23/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
Port
TCP/0-79,81-442,444-3127,3129-7999,8001-8079,8081-65535
False Positive
Unknown

Found a potential security threat?