SHELLCODE: Shikata Ga Nai Encoder Routine Over HTTP-STC
This signature detects payloads being transferred over HTTP protocol that have been encoded using Shikata Ga Nai encoder routine. This may be an indication of someone trying to evade anti-virus/IPS solutions and possibly drop malicious code.
Extended Description
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1773, CVE-2014-1783, CVE-2014-1784, CVE-2014-1786, CVE-2014-1795, CVE-2014-1805, CVE-2014-2758, CVE-2014-2759, CVE-2014-2765, CVE-2014-2766, and CVE-2014-2775.
Affected Products
Microsoft internet_explorer
References
BugTraq: 38613 68101 49924 36881 45246 34363 35759 13120 12881
CVE: CVE-2009-1862
URL: http://www.admin-magazine.com/Articles/How-to-Hide-a-Malicious-File http://darkmatters.norsecorp.com/2015/02/24/in-memory-shellcode-detection-using-a-patterns-based-methodology/ http://aluigi.altervista.org/adv/esignal_1-adv.txt http://security.inshell.net/advisory/30 http://secunia.com/advisories/48740/ http://www.visiwave.com/blog/index.php?/archives/4-Version-2.1.9-Released.html http://www.stratsec.net/Research/Advisories/VisiWave-Site-Survey-Report-Trusted-Pointer-%28SS-20 http://www.trapkit.de/advisories/TKADV2008-011.txt http://www.videolan.org/security/sa0810.html http://www.mplayer-ww.com/eng/ http://aluigi.altervista.org/adv/cytel_1-adv.txt http://aluigi.altervista.org/adv/w32dasmbof-adv.txt https://www-304.ibm.com/support/docview.wss?uid=swg21586166 http://freedownload.svn.sourceforge.net/viewvc/freedownload/FDM/vmsBtDownloadManager.cpp?r1=11&r2=18 http://freedownload.svn.sourceforge.net/viewvc/freedownload/FDM/Bittorrent/fdmbtsupp/vmsBtFileImpl.cpp?r1=9&r2=18 http://secunia.com/secunia_research/2009-5/ http://downloads.securityfocus.com/vulnerabilities/exploits/33555-SkD.pl http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-011-orbital-viewer-orb-buffer-overflow/ http://www.scadatec.com/ http://service.real.com/realplayer/security/12202013_player/en/ http://seclists.org/fulldisclosure/2010/dec/110 http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1 http://www.zerodayinitiative.com/advisories/zdi-09-076/ http://www.zerodayinitiative.com/advisories/zdi-12-093/ http://www.symantec.com/security_response/vulnerability.jsp?bid=53848&om_rssid=sr-advisories http://technet.microsoft.com/en-us/security/advisory/2794220 http://securitytracker.com/id?1027930
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
9.3