TROJAN: Asylum Command
This signature detects commands sent over the Asylum default port, which is used by the Asylum backdoor Trojan. This can indicate that your system in infected with the Asylum Trojan. Remote attackers can access and gain control of an infected system.
Extended Description
A remote attacker can use the Asylum client to gain unauthorized access to the target system.
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
8.8