Hi,

Part of this one workings, is to download the PNScanner and scan next target with a specific payload. The rule maybe considered an indicator since only outbound scan is sig'ed. No pcaps available for this one.

# --------------------
# Date: 2018-05-20
# Title: Anatomy of a Redis mining worm
# Tests: syntax only
# Reference: https://isc.sans.edu/diary/23673, https://gist.github.com/nl5887/f6f8ed67ae95244482b54aa46b530bba#file-worm-sh-L103

alert tcp $HOME_NET any -> $EXTERNAL_NET 6379 (msg:"MALWARE-CNC Linux Redis mining worm outbound target scan"; flow:to_server,established; content:"|2A 31 0D 0A 24 34 0D 0A 69 6E 77 7F 0D 0A|"; fast_pattern:only; metadata:ruleset community; reference:url,isc.sans.edu/diary/23673; classtype:trojan-activity; sid:8000058; rev:1;)

Thanks.
YM