""ET EXPLOIT PWDump4 Password dumping exe copied to victim""

SID: 2008444

Revision: 3

Class Type: suspicious-filename-detect

Metadata: created_at 2010_07_30, updated_at 2012_04_30

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HOME_NET

Destination Port: [139,445]

Flow: to_server,established

Contents:

  • Value: "|4F 00 72 00 69 00 67 00 69 00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 50 00 57 00 44 00 55 00 4D 00 50 00 34 00 2E 00 65 00 78 00 65|"

Within:

PCRE:

Special Options:

source