""ET EXPLOIT PWDump4 Password dumping exe copied to victim""
SID: 2008444
Revision: 3
Class Type: suspicious-filename-detect
Metadata: created_at 2010_07_30, updated_at 2012_04_30
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: [139,445]
Flow: to_server,established
Contents:
- Value: "|4F 00 72 00 69 00 67 00 69 00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 50 00 57 00 44 00 55 00 4D 00 50 00 34 00 2E 00 65 00 78 00 65|"
Within:
PCRE:
Special Options: