Part of this one workings, is to download the PNScanner and scan next target with
a specific payload. The rule maybe considered an indicator since only outbound
scan is sig'ed. No pcaps available for this one.
# Date: 2018-05-20
# Title: Anatomy of a Redis mining worm
# Tests: syntax only
alert tcp $HOME_NET any -> $EXTERNAL_NET 6379 (msg:"MALWARE-CNC Linux Redis mining worm outbound target scan"; flow:to_server,established; content:"|2A 31 0D 0A 24 34 0D 0A 69 6E 77 7F
0D 0A|"; fast_pattern:only; metadata:ruleset community; reference:url,isc.sans.edu/diary/23673; classtype:trojan-activity; sid:8000058; rev:1;)