TROJAN: Backdoor.Murcy Command and Control Traffic
This signature detects the Command and Control traffic for the Backdoor.Murcy trojan. The source IP host is infected and should be removed from the network for analysis.
References
URL: http://www.commandfive.com/papers/C5_APT_C2InTheFifthDomain.pdf
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3