2 * This an example spamfilter file, it contains several
3 * real and useful spamfilters. This should give you an
4 * idea of how powerful spamfilter can be in real-life
10 /* Guidelines on the 'action' field:
11 * As a general rule we use 'action block' for any newly added
12 * spamfilters at first, later on (after knowing about false
13 * positives) we might change some to viruschan/kill/gline/etc..
17 regex "\x01DCC (SEND|RESUME)[ ]+\"(.+ ){20}";
18 target { private; channel; };
19 reason "mIRC 6.0-6.11 exploit attempt";
24 regex "\x01DCC (SEND|RESUME).{225}";
25 target { private; channel; };
26 reason "Possible mIRC 6.12 exploit attempt";
31 regex "Come watch me on my webcam and chat /w me :-\) http://.+:\d+/me\.mpg";
33 reason "Infected by fyle trojan: see http://www.sophos.com/virusinfo/analyses/trojfylexa.html";
38 regex "Speed up your mIRC DCC Transfer by up to 75%.*www\.freewebs\.com/mircupdate/mircspeedup\.exe";
40 reason "Infected by mirseed trojan: see http://www.sophos.com/virusinfo/analyses/trojmirseeda.html";
45 regex "^http://www\.angelfire\.com/[a-z0-9]+/[a-z0-9]+/[a-z_]+\.jpg <- .*!";
47 reason "Infected by fagot worm: see http://www.f-secure.com/v-descs/fagot.shtml";
52 regex "^FREE PORN: http://free:porn@([0-9]{1,3}\.){3}[0-9]{1,3}:8180$";
54 reason "Infected by aplore worm: see http://www.f-secure.com/v-descs/aplore.shtml";
59 regex "^!login Wasszup!$";
61 reason "Attempting to login to a GTBot";
66 regex "^!login grrrr yeah baby!$";
68 reason "Attempting to login to a GTBot";
73 regex "^!packet ([0-9]{1,3}\.){3}[0-9]{1,3} [0-9]{1,15}";
75 reason "Attempting to use a GTBot";
80 regex "^!icqpagebomb ([0-9]{1,15} ){2}.+";
82 reason "Attempting to use a GTBot";
87 regex "^!pfast [0-9]{1,15} ([0-9]{1,3}\.){3}[0-9]{1,3} [0-9]{1,5}$";
89 reason "Attempting to use a GTBot";
94 regex "^!portscan ([0-9]{1,3}\.){3}[0-9]{1,3} [0-9]{1,5} [0-9]{1,5}$";
96 reason "Attempting to use a GTBot";
101 regex "^.u(dp)? ([0-9]{1,3}\.){3}[0-9]{1,3} [0-9]{1,15} [0-9]{1,15} [0-9]{1,15}( [0-9])*$";
103 reason "Attempting to use an SDBot";
108 regex "^.syn ((([0-9]{1,3}\.){3}[0-9]{1,3})|([a-zA-Z0-9_-]+\.[a-zA-Z0-9_-]+\.[a-zA-Z0-9_.-]+)) [0-9]{1,5} [0-9]{1,15} [0-9]{1,15}";
109 target { channel; private; };
110 reason "Attempting to use a SpyBot";
115 regex "^porn! porno! http://.+\/sexo\.exe";
118 reason "Infected by soex trojan: see http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ%5FSOEX.A";
122 regex "(^wait a minute plz\. i am updating my site|.*my erotic video).*http://.+/erotic(a)?/myvideo\.exe$";
125 reason "Infected by some trojan (erotica?)";
129 regex "^STOP SPAM, USE THIS COMMAND: //write nospam \$decode\(.+\) \| \.load -rs nospam \| //mode \$me \+R$";
132 reason "Infected by nkie worm: see http://www.trojaninfo.com/nkie/nkie.htm";
136 regex "^FOR MATRIX 2 DOWNLOAD, USE THIS COMMAND: //write Matrix2 \$decode\(.+=,m\) \| \.load -rs Matrix2 \| //mode \$me \+R$";
139 reason "Infected by nkie worm: see http://www.trojaninfo.com/nkie/nkie.htm";
143 regex "^hey .* to get OPs use this hack in the chan but SHH! //\$decode\(.*,m\) \| \$decode\(.*,m\)$";
146 reason "Infected by nkie worm: see http://www.trojaninfo.com/nkie/nkie.htm";
150 regex ".*(http://jokes\.clubdepeche\.com|http://horny\.69sexy\.net|http://private\.a123sdsdssddddgfg\.com).*";
153 reason "Infected by LOI trojan"; /* Name is still unsure */
156 /* This is a 'general sig' which might have a tad more false positives, hence just 'block' is used */
158 regex "C:\\\\WINNT\\\\system32\\\\[][0-9a-z_-{|}`]+\.zip";
161 reason "Infected by Gaggle worm?";
165 regex "C:\\\\WINNT\\\\system32\\\\(notes|videos|xxx|ManualSeduccion|postal|hechizos|images|sex|avril)\.zip";
168 reason "Infected by Gaggle worm";
172 regex "http://.+\.lycos\..+/[iy]server[0-9]/[a-z]{4,11}\.(gif|jpg|avi|txt)";
173 target { private; quit; };
175 reason "Infected by Gaggle worm";
179 regex "^Free porn pic.? and movies (www\.sexymovies\.da\.ru|www\.girlporn\.org)";
181 reason "Unknown virus. Site causes Backdoor.Delf.lq infection";
186 regex "^LOL! //echo -a \$\(\$decode\(.+,m\),[0-9]\)$";
188 reason "$decode exploit";
194 regex "//write \$decode\(.+\|.+load -rs";
195 target { private; channel; };
196 reason "Generic $decode exploit";
202 regex "^Want To Be An IRCOp\? Try This New Bug Type: //write \$decode\(.+=.?,m\) \| \.load -rs \$decode\(.+=.?,m\)$";
205 reason "Spamming users with an mIRC trojan. Type '/unload -rs newb' to remove the trojan.";