""ET TROJAN Possible Windows executable sent when remote host claims to send a Text File""

SID: 2008438

Revision: 15

Class Type: trojan-activity

Metadata: created_at 2010_07_30, updated_at 2019_09_05

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "Content-Type|3a| text/plain"

  • Value: "MZ"

  • Value: "PE|00 00|"

Within: 4

PCRE:

Special Options:

  • nocase

  • http_header

  • file_data

  • fast_pattern

source